Get the mobile Jitbit App - connect it to pacsciorg.jitbit.com

Ceridian Aniti Phishing Tips


In today’s world, where security threats are on the rise, we want to provide you with some suggestions to better protect yourself from Payroll Diversion Fraud, a scam where cyber criminals attempt to steal funds intended for employees’ financial accounts.


Through fraudulent activities, including but not limited to phishing emails, texts, phone calls, or fake websites, cyber adversaries attempt to obtain the login credentials of Dayforce users for the purpose of accessing the Dayforce accounts of these users. The Cyber adversaries then change direct deposit account information and divert pay to other bank accounts that they control. Cyber adversaries may also target the users of Dayforce Wallet and divert pay from Wallet to bank accounts they control.



Educating yourself is one of the most important things you can do to minimize the risk of attack from security threats, including Payroll Diversion Fraud. To keep yourself safe from this emerging type of fraud, we encourage you to read and employ the following tips.





Tip 1

Verify the Dayforce URL:



Cyber criminals continue to create new fake websites and phishing emails, designed to mimic the trusted Dayforce brand, in an attempt to trick individuals into providing their Dayforce login credentials. While Dayforce actively engages in efforts to take them down, scammers continuously launch new attacks with

new fake websites and phishing emails.


Fake Dayforce websites may appear in search engine query results or be sent to you via phishing emails or texts, offering gift cards or requesting urgent action.


To protect yourself, make sure that every time you log in to Dayforce, you are using the correct Dayforce link for your organization. Check the URL and certificate.






We strongly encourage you to bookmark the correct URL for Dayforce, and to not use a search engine, like Google, to find the URL for Dayforce. Below is an example of a search engine query result showing and linking to a fake website.







Another option is to utilize the Dayforce Mobile application which eliminates the need to access a website and ensures you are connected to Dayforce correctly.





Tip 2

Use strong passwords:


Passwords are the first line of defense to protect your accounts. Here are some ways to ensure your

accounts are unique, secure, and protected.

Misspell words, avoid using common words and phrases, use a variety of characters

Switch it up, don’t use the same password for multiple accounts

Don’t share your passwords

Change your password frequently



Tip 3

Protect yourself from phishing attacks:


Protecting yourself from phishing attacks is crucial for safeguarding your personal information and online security. Here are some easy-to-understand steps to help you stay safe:


1. Be Skeptical: Approach all unsolicited messages, emails, or website links with caution. Verify the

source before taking any action.


2. Be Aware: Beware of unexpected emails from HR or senior personnel asking for payroll-related

changes or information.


3. Verify the Sender: Double-check the sender's email address or the URL of a website. Ensure it

matches the legitimate source.


4. Beware of Urgency: Phishing emails often use a sense of urgency to pressure you into taking quick

action. Don't rush; take your time to verify.


5. Don't Click on Suspicious Links: Hover over links in emails or messages to see where they lead. If

you're unsure, type the URL directly into your browser.



Remember, constant vigilance is key. Fraudsters can strike when we least expect it, but by following these security practices, you can significantly reduce the risk of Payroll Diversion Fraud.

If you suspect that you’ve fallen victim to Payroll Diversion Fraud, please contact your HR and IT teams immediately and change the password to your Dayforce account.


For more information, read Dayforce’s blog post: https://www.dayforce.com/blog/payroll-diversion-fraud


Thank you!

Creation date: 7/26/2024 2:53 PM      Updated: 7/26/2024 2:53 PM
Files   
DataImage53.png
44 KB
DataImage27.png
56 KB