How to verify unusual requests
PURPOSE
Verifying unusual requests helps prevent fraud, data exposure, and account compromise.
WHEN TO VERIFY
Verify requests involving money, passwords, MFA codes, confidential data, urgent approvals, gift cards, payment changes, or unusual file sharing.
HOW TO VERIFY
Use a known trusted phone number, official chat, approved ticket, or existing contact record. Do not rely only on contact information inside the suspicious request.
WHAT TO ASK
Confirm who is requesting it, why it is needed, when it is needed, and whether normal process should apply.
BEST PRACTICE
If someone asks you to bypass procedure, that is exactly when procedure matters most.