{"id":848,"date":"2023-09-05T09:19:27","date_gmt":"2023-09-05T09:19:27","guid":{"rendered":"https:\/\/istic-unesco.org\/v3\/?page_id=848"},"modified":"2025-07-29T03:04:13","modified_gmt":"2025-07-29T03:04:13","slug":"scam-alert","status":"publish","type":"page","link":"https:\/\/istic-unesco.org\/v3\/scam-alert\/","title":{"rendered":"Scam Alert"},"content":{"rendered":"<div  data-label=\"title\" data-id=\"cta--1\" data-export-id=\"cta-centered-bg-section\" data-category=\"cta\" data-section-ov=\"1\" class=\"cta-centered-bg-section content-section content-section-spacing-medium white-text\" data-parallax-depth=\"20\" id=\"title\" style=\"background-color: rgb(245, 250, 253); background-size: cover; background-position: center top; background-image: url(&quot;https:\/\/istic-unesco.org\/v3\/wp-content\/uploads\/2025\/07\/Capture-decran-2025-06-13-a-10.04.52-1.png&quot;);\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  data-type=\"column\" class=\"\">  <h1 class=\"\" >\n<br >SCAM ALERTS\n<br ><br >\n<br ><\/h1><\/div> <\/div><\/div> <\/div><div  data-id=\"initial-content-section\" data-export-id=\"initial-content-section\" data-label=\"Initial Content\" id=\"initial-content-section\" class=\"content-section content-section-spacing\">\n   <div  class=\"gridContainer\">\n     <div  class=\"row\">\n\n        <div  class=\"col-xs-12 col-sm-12\">                <p ><\/p>\n<p ><\/p>\n<p ><\/p>\n<p ><span  style=\"color: rgb(0, 0, 0); font-weight: 600;\"><strong >Be alert to the fact that scams exist<\/strong><\/span><br ><span  style=\"color: rgb(0, 0, 0);\">When dealing with uninvited contacts from people or businesses, whether it\u2019s over the phone, by mail, email, in person or on a social networking site, always consider the possibility that the approach may be a scam. Remember, if it looks too good to be true, it probably is.<\/span><\/p>\n<p ><\/p>\n<p ><\/p>\n<p ><span  style=\"color: rgb(0, 0, 0); font-weight: 600;\"><strong >Be careful of spoofing<\/strong><\/span><br ><span  style=\"color: rgb(0, 0, 0);\">Phone number displayed on incoming call or \u201cFrom\u201d field presented by your email client can be easily spoofed. Never trust them and be careful of disambiguation. Fraudsters often attempt to approach you with a fraudulent email address that looks very similar to the official domain:&nbsp;<a  href=\"mailto:john@unesco.org\" data-cp-link=\"1\">john@istic-unesco.org (link sends e-mail)<\/a>&nbsp;could be a valid email,&nbsp;<a  href=\"mailto:john@unessco.org\" target=\"_blank\" rel=\"noreferrer noopener\" data-cp-link=\"1\">john@istics.org(link sends e-mail)<\/a>&nbsp;is not (note the two \u201cs\u201d in the domain name).&nbsp;<\/span><\/p>\n<p ><\/p>\n<p ><\/p>\n<p ><span  style=\"color: rgb(0, 0, 0); font-weight: 600;\"><strong >Take the time to check<\/strong><\/span><br ><span  style=\"color: rgb(0, 0, 0); font-weight: 400;\">The fraudsters generally request an urgent action and use a combination of authority (\u201cit is an order to do this\u201d), secrecy (\u201cthis project is still secret\/confidential\u2026\u201d), valorization (\u201cI count on you for your efficiency and discretion\u201d) and pressure (\u201cthe success of the operation rests on your shoulders\u201d) to convince to do the action. Take the time to think and check.<\/span><\/p>\n<p ><\/p>\n<p ><\/p>\n<p ><span  style=\"font-weight: 600; color: rgb(0, 0, 0);\"><strong >Respect standard working procedures<\/strong><\/span><br ><span  style=\"font-weight: 400; color: rgb(0, 0, 0);\">Be vigilant to any urgent or confidential request not respecting the standard working procedure. Procedures exist to avoid frauds.<\/span><\/p>\n<p ><\/p>\n<p ><\/p>\n<p ><span  style=\"color: rgb(0, 0, 0); font-weight: 600;\"><strong >Know who you\u2019re dealing with<\/strong><\/span><br ><span  style=\"color: rgb(0, 0, 0); font-weight: 400;\">If you have only ever met someone online or are unsure of the legitimacy of a business, take some time to do a bit more research. Do a Google image search on photos or search the internet for others who may have had dealings with them. If a message or email comes from a friend and it seems unusual or out of character for them, contact your friend directly to check that it was really them that sent it.&nbsp;<\/span><\/p>\n<p ><\/p>\n<p ><\/p>\n<p ><span  style=\"color: rgb(0, 0, 0); font-weight: 600;\"><strong >Do not click on links or attachments in emails without being sure of your contact<\/strong><\/span><br ><span  style=\"color: rgb(0, 0, 0); font-weight: 400;\">If unsure, verify the identity of the contact through an independent source such as a phone book or online search. Do not use the contact details provided in the message sent to you.<\/span><\/p>\n<p ><\/p>\n<p ><\/p>\n<p ><span  style=\"color: rgb(0, 0, 0); font-weight: 600;\"><strong >Keep your personal details secure<\/strong><\/span><br ><span  style=\"color: rgb(0, 0, 0); font-weight: 400;\">It is recommended not to write down your passwords and pin numbers. Be very careful about how much personal information you share on social media sites. Scammers can use your information and pictures to create a fake identity or to target you with a scam.<\/span><\/p>\n<p ><\/p>\n\n          <\/div>\n      <\/div>\n  <\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>SCAM ALERTS Be alert to the fact that scams existWhen dealing with uninvited contacts from people or businesses, whether it\u2019s over the phone, by mail, email, in person or on a social networking site, always consider the possibility that the approach may be a scam. Remember, if it looks too good to be true, it&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/istic-unesco.org\/v3\/scam-alert\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"pro\/page-templates\/full-width-page.php","meta":{"_siteseo_robots_primary_cat":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-848","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/istic-unesco.org\/v3\/wp-json\/wp\/v2\/pages\/848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/istic-unesco.org\/v3\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/istic-unesco.org\/v3\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/istic-unesco.org\/v3\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/istic-unesco.org\/v3\/wp-json\/wp\/v2\/comments?post=848"}],"version-history":[{"count":7,"href":"https:\/\/istic-unesco.org\/v3\/wp-json\/wp\/v2\/pages\/848\/revisions"}],"predecessor-version":[{"id":2146,"href":"https:\/\/istic-unesco.org\/v3\/wp-json\/wp\/v2\/pages\/848\/revisions\/2146"}],"wp:attachment":[{"href":"https:\/\/istic-unesco.org\/v3\/wp-json\/wp\/v2\/media?parent=848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}