Fairy Tales and Cybersecurity: Watch out for the Big Bad Wolf
Arm yourself with solid tools to stop a scam in its tracks. No magic required!

Arm yourself with solid tools to stop a scam in its tracks. No magic required!

Children are taught to root for good and fight evil, because, let’s face it, there are forces in this world that don’t wish you success or safety.
Like cyber criminals.
Cybersecurity has become increasingly important as information technology grows and develops. At Cambrian, we prioritize keeping your financial information safe and secure.
There will always be cyber criminals who try to access your personal information for their own gain. We take every precaution to keep your information safe, and we encourage you to do the same.
Here are two fun and familiar tales we’ve applied to basic cybersecurity principles:
Three goats must cross a bridge to reach the grass on the other side. Mid-bridge, an evil troll materializes and threatens to “gobble them up.” The smallest goat tricks the troll into waiting for a bigger, better meal: the medium goat. The medium goat also promises a bigger meal, the largest sibling! The biggest goat fights the troll head-on, defeating him and reaching the other side safely.
Just like the troll, there are cyber threats lurking under the “bridge” of your life: fake emails, cloned websites, spoofed phone numbers, misleading text messages, and more. These threats could be waiting in the shadows for the moment you let your guard down.
Modern banking systems, like Cambrian’s, use multiple layers of protection to make fraud more difficult. It’s important to be aware of the ones you can set up to be as secure as you possibly can.
Have all your “goats” (cybersecurity features) poised and ready to take on the “troll” (cyber threats).
The two littlest goats are your basic lines of defence against the “troll.” Things like:
The largest goat symbolizes your strongest, most secure methods of defence:
When you educate and arm yourself with the features available to you, you can be confident that your banking information stays secure. With the right “goats,” you’ll reach the green grass on the other side and outsmart the “troll.”
We all know this story: the Big Bad Wolf tricks Red Riding Hood, pretending to be her grandmother so she will get close and he can eat her.
Similarly, cybercriminals can succeed by mimicking familiar organizations and people. Their goal is simple: make you trust them long enough to act without thinking, like Red Riding Hood at the bedside of her “grandmother.”
To appear credible, cyber-attackers use:
Scams sometimes work because they target human nature, not technical weakness.
That’s why it’s important to know the signs when something sinister is in disguise. Common red flags include:
Know the signs and you’ll be well-equipped to keep your information safe.
In one version of Red Riding Hood, the wolf succeeds and eats her. In a different version, a hunter shows up, kills the wolf, and rescues Red Riding Hood.
Don’t let either of those stories come true! Be a Red Riding Hood who knows the risks, knows the signs, and doesn’t listen to the Big Bad Wolf in the first place. That way, you can stay safe, secure, and happy when you visit your grandmother in a cottage in the woods.
Visit our Cybersecurity Centre for resources to learn more about how to protect yourself in this digital age.
We would be happy to discuss your unique situation with you.
Our goal is to make complex topics like this one, simple.