Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Different Scams Impact Different Audiences, Which Means You Need to Prepare for All of Them

Different Scams Impact Different Audiences, Which Means You Need to Prepare for All of Them

Back during the holiday season, the Federal Trade Commission shared some data that showed that members of Generation X, Millennials, and Generation Z are all more likely to fall for online shopping scams than those over the age of 60…and not by a little, either. Those under that age are apparently 86 percent more likely to fall for these scams. 

Let’s examine some of the findings of this report, and what they tell us about the state of cybersecurity.

Here’s the Hard Truth: Different Types of Scams are More Effective with Different Age Demographics

According to the FTC, scams are universally effective. However, one form of scam may be more effective to one generational subset, while another might impact a different one.

For instance, the FTC’s research saw that younger generations were far more prone to online shopping fraud, investment scams, and job scams. Meanwhile, older generations were more successfully targeted by tech support scams and sweepstakes scams.

It also needs to be said that different scam victims are frequently targeted using different means, as well. Younger Millennials and members of Generation Z are frequently successfully targeted by scams that begin on social media, while Generation X and Baby Boomers are frequently victimized by phone scams.

It Doesn’t Matter What Age Someone Is, They’re Just as Vulnerable to Cyberattacks and Scams

With so many scams out there, utilizing different mediums and platforms to target their intended victims, it’s important that everyone is prepared to spot potential threats and react to them appropriately…and this is all the more important in the business.

Fortunately, businesses in Western Kentucky can turn to the professionals at Voyage Technology for assistance in preparing their teams to deal with assorted cybersecurity threats. Give us a call at 800.618.9844 to learn more about our cybersecurity services.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Smartphone Data Backup Data Recovery Android AI Disaster Recovery Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Information Holiday Facebook Miscellaneous Automation Cloud Computing Training Covid-19 Gadgets Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Windows 10 Wi-Fi Virtualization Business Technology Apps Data Security Mobile Office Vendor Two-factor Authentication Employer-Employee Relationship Chrome Budget Networking Managed Services Apple Voice over Internet Protocol Mobile Device Management App BYOD Gmail WiFi Tip of the week Office 365 Conferencing Hacker Avoiding Downtime How To BDR Marketing HIPAA Applications Computing Information Technology Access Control Analytics Office Tips Retail Augmented Reality Computers 2FA Storage Managed IT Services Password Bring Your Own Device Website Healthcare Router Operating System Virtual Private Network Risk Management Health Big Data Help Desk Document Management Customer Service Windows 11 Telephone Scam Data loss Excel Cooperation Remote Workers Patch Management Save Money Remote Monitoring End of Support Vulnerability Going Green Firewall Vendor Management Free Resource Project Management Physical Security Windows 7 Cybercrime Display Printer The Internet of Things Microsoft 365 Paperless Office Infrastructure Monitoring Social Solutions Saving Time Customer Relationship Management Outlook Managed IT Service Money Maintenance Holidays Downloads Humor Hacking Antivirus Data Storage Presentation Licensing Supply Chain Video Conferencing Entertainment Sports Managed Services Provider Wireless Technology Mouse Virtual Machines Professional Services Administration Robot Telephone System Word Cost Management iPhone IT Management Vulnerabilities Settings Meetings Data Privacy VPN Printing Wireless Safety Images 101 Content Filtering Modem User Tip Processor YouTube Multi-Factor Authentication Computer Repair Mobile Security Mobility Cryptocurrency Smart Technology Employees Virtual Desktop Integration Data storage LiFi Machine Learning Laptop Screen Reader Managing Costs Amazon Writing Distributed Denial of Service Windows 8 Lenovo Drones Service Level Agreement eCommerce Virtual Reality Computing Infrastructure SSID Virtual Assistant Outsource IT Server Management Surveillance Private Cloud Identity Halloween Identity Theft Smart Tech Virtual Machine Environment Media Competition Superfish Bookmark Reviews Download Twitter Alerts Medical IT Transportation Small Businesses Development Error Browsers Scary Stories Connectivity Hypervisor Displays Social Engineering Break Fix Hacks User Shopping Upload Optimization Fun Remote Computing PowerPoint Employer/Employee Relationships Outsourcing Multi-Factor Security Deep Learning Social Network PCI DSS Tablet IoT Dark Web Navigation IP Address Gig Economy Education Trends Alert Workplace File Sharing Regulations Teamwork Hiring/Firing Dark Data Google Calendar Managed IT Customer Resource management Internet Service Provider Data Analysis Regulations Compliance Star Wars How To Microsoft Excel Evernote Paperless Mobile Computing Recovery Gamification Memes Search Notifications Staff Co-managed IT Travel Social Networking SQL Server Technology Care Legislation Hard Drives Best Practice Net Neutrality Techology Fileless Malware Financial Data Buisness Google Maps History Business Communications Domains Legal Smartwatch IT solutions Content IT Wearable Technology Scams Unified Threat Management Motherboard Azure Hybrid Work Comparison Refrigeration Business Growth Health IT Procurement Unified Threat Management Directions Telework Assessment Cyber security Permissions Tech Human Resources Public Speaking Lithium-ion battery CES Communitications Cortana Cables Network Congestion Specifications Alt Codes Entrepreneur Supply Chain Management User Error Microchip FinTech Downtime Internet Exlporer Fraud Term Google Apps Hosted Solution Username IT Assessment IT Maintenance Point of Sale Value Business Intelligence Black Friday Undo Typing Flexibility Organization Database Shortcuts Google Drive Digital Security Cameras Network Management Smart Devices Knowledge Tech Support IT Technicians Ransmoware Cookies Memory Vendors Monitors Cyber Monday Proxy Server Remote Working Tactics Data Breach 5G Hotspot Google Play Be Proactive Google Docs Application Videos Unified Communications Electronic Health Records Experience Websites Mirgation Workforce Running Cable Nanotechnology Wasting Time Threats Bitcoin Google Wallet SharePoint Addiction Trend Micro Electronic Medical Records Language Security Cameras Workplace Strategies IBM Meta Management Software as a Service Chatbots

Blog Archive