Cyber Security Best Practices

Cyber Security Best Practices

Your security is our top priority. With social media, online shopping, and web-based applications being used so widely, how do you ensure your online experience is as secure as possible?

Keep your eyes open for potential scams that are trying spoof or whale phishing (you can Google it) our website and even our email. Below are some examples of the types of things that someone could receive and should be cautious of:

Emails that appear to be from reputable organizations like us, or other trusted vendors or even about COVID-19.  In many situations, fraudsters have crafted emails that appear to come from these sources, but they actually contain malicious phishing links or dangerous attachments. Only open emails from reliable sources.

Emails that ask for crypto payment and the email gives you a list of crypto addresses. We always communicate through  to confirm the exact cryptocurrency or respond to your crypto payment request that you emailed to In a time of crisis and economic downturn and the rise in BTC value, online vendors are most likely experiencing more fraudsters/Hackers often create fake emails that will look similar to our trusted site and other trusted site too in this unique industry.  What can you do?

Remain cautious, and always remember the following to protect yourself from scams like this:

Never click on links or download attachments from an email that you weren’t expecting.

If you receive a suspicious email that appears to come from an official organization, we ask that you report it to us by clicking  and/or call our toll free to leave a message.

As a reminder, we advise all of our members to be alert of suspicious activity online. Please always remember to use safe internet and email practices. Your security remains our top priority during these times and we encourage all members to review our cybersecurity best practices to ensure you stay protected.


Last Updated:  May 7, 2020:  CGLResearch Inc.