Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Psychology Behind the Scam

The Psychology Behind the Scam

Scams are often so convincing that it’s difficult for even experienced individuals to detect them, but why is this the case? It all boils down to human psychology. Modern security training can help you identify these telltale signs, but it doesn’t really explain the why of things. That’s what we’re out to explore today.

Technology Has Changed the Same Old Scams

You’ve probably heard of the “Nigerian Prince” email scam, where a royal is facing danger and needs a quick escape from his home country, and only you can offer the financial assistance needed—and if you provide it, you’ll be rewarded with riches beyond your wildest dreams.

This is the poster child of cybercrime scams, and for good reason. There are several building blocks of a successful scam on full display here—building blocks that have generated millions of dollars in revenue for scammers. In reality, the Nigerian Prince scam is just one variation of an advance-fee scam from the 1800s, where a scammer claims a wealthy prisoner needs money to bribe the guards holding them hostage, and in exchange provides a reward for assistance.

The same scam that worked back then still works now, just in a different medium, whether it’s a written letter or an email, or a bribe or a plea for help.

The Common Tricks Used By Scammers

There are plenty of tools modern scams use to take advantage of their victims. While most of these scams operate via email, the medium is less important than the actual tactic. Keep a lookout for these warning signs:

A Sense of Urgency

Sometimes a sense of fear can push you to react irrationally out of panic. It doesn’t take much to create this feeling; it could be as simple as a ticking clock or the consequences of being discovered by someone who wants to do you harm. If you think about primal humans, for example, there was a significant fear of being harmed by external threats, like competing tribes or wild animals, hence why fear is such a powerful weapon against us psychologically.

Fake Authority

Humanity (generally) operates via a hierarchical understanding of society, meaning that some individuals are perceived to have greater authority than others. This gives their words and actions more weight, even if they don’t really make sense. Scammers can take advantage of this “fake” authority by posing as executives within your business or as important figures in your business agreements, making you more likely to comply with their request.

Taking Advantage of Your Helpfulness

Humanity progresses by working together, and this comes with the added baggage of people liking to be helpful. When someone is suffering, we generally want to do what we can to alleviate that suffering. That said, when someone makes a suspicious request, it doesn’t always register that we shouldn’t necessarily act. This results in us being too helpful and too willing to share information.

Capturing Curiosity

Ah, the fear of missing out. You might be tempted to download a file even when you know you shouldn’t, just because you can’t resist not knowing what’s on the other side. Be careful and always err on the side of caution, even if it feels somewhat benign.

Identify Scams Before You Become a Victim

Scammers are crafty with the way they go about their activities, so you really can’t take too many risks. That’s where Voyage Technology comes in. We can train your team and help you build policies that transform your average employee into a scammer’s worst nightmare. Learn more by calling us at 800.618.9844 today.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Email Workplace Tips Google Privacy Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Ransomware AI Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Facebook Holiday Automation Artificial Intelligence Cloud Computing Gadgets Compliance Training Covid-19 IT Support Server Remote Work Managed Service Provider Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Business Technology Vendor Bandwidth Windows 10 Managed Services Apps Two-factor Authentication Mobile Office Data Security WiFi Voice over Internet Protocol BYOD Employer-Employee Relationship Tip of the week Chrome Budget Mobile Device Management Apple Networking Gmail App Conferencing Computing Physical Security Information Technology Access Control Office 365 Hacker HIPAA Avoiding Downtime Applications Marketing Password Managed IT Services How To BDR Operating System Big Data Healthcare Virtual Private Network Risk Management Health Analytics Office Tips Computers Augmented Reality Router Retail Website Storage Bring Your Own Device 2FA Help Desk Remote Monitoring The Internet of Things End of Support Managed IT Service Vulnerability Remote Workers Vendor Management Telephone Cybercrime Social Display Cooperation Free Resource Printer Project Management Windows 7 Paperless Office Infrastructure Customer Service Microsoft 365 Solutions Document Management Scam Data loss Windows 11 Monitoring Firewall Excel Going Green Patch Management Save Money Settings Wireless Printing Content Filtering IT Management Downloads iPhone VPN YouTube Meetings Licensing Cryptocurrency Vulnerabilities Entertainment Computer Repair Data Privacy Customer Relationship Management Images 101 Virtual Desktop LiFi Data storage Telephone System Multi-Factor Authentication Mobility Hacking Cost Management Presentation Outlook Machine Learning Money Wireless Technology Humor Employees Integration Maintenance Antivirus User Tip Sports Modem Mobile Security Mouse Processor Word Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Robot Professional Services Saving Time Safety Virtual Machines Alt Codes Regulations Compliance Identity Evernote Paperless Co-managed IT Bookmark Downtime Unified Threat Management Smart Tech Memes Hosted Solution Download Net Neutrality Alerts SQL Server Technology Care Unified Threat Management Typing Financial Data History Business Communications Application Network Congestion Break Fix Scams Browsers Smartwatch Connectivity IT Upload Procurement Knowledge Azure Hybrid Work Google Drive User Error Social Network Telework IBM Cyber security Multi-Factor Security Tech Human Resources 5G Dark Web Cables CES Point of Sale IoT Communitications Unified Communications Trends Supply Chain Management Experience Google Docs Bitcoin Network Management Customer Resource management FinTech Running Cable Tech Support Regulations Google Calendar Term Google Apps Monitors Microsoft Excel IT Maintenance Google Wallet Data Analysis Star Wars IT Assessment Gamification Flexibility Competition Staff Value Business Intelligence Windows 8 Organization Laptop Websites Social Networking Legislation Shortcuts Ransmoware Drones Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Electronic Medical Records Wearable Technology Memory Vendors SharePoint Health IT Halloween Motherboard Data Breach User Comparison Google Play Be Proactive Writing Permissions Workforce Lenovo Directions Videos Assessment Electronic Health Records Virtual Reality Wasting Time Threats Hacks Server Management IP Address Scary Stories Private Cloud Trend Micro Specifications Security Cameras Workplace Strategies Fun Fraud Meta Superfish Microchip Identity Theft Internet Exlporer Software as a Service Deep Learning Username Twitter Managing Costs Amazon Error eCommerce Recovery Black Friday SSID Hard Drives Social Engineering Virtual Assistant Outsource IT Education Database Surveillance Domains Remote Computing IT Technicians Virtual Machine Environment Media Mobile Computing Proxy Server Reviews Cookies Cyber Monday Medical IT Tablet Tactics Development Refrigeration Search Hotspot Transportation Small Businesses Best Practice Public Speaking Alert Mirgation Hypervisor Displays Dark Data PowerPoint Managed IT Shopping Lithium-ion battery Buisness File Sharing Nanotechnology Optimization IT solutions Addiction How To Language Employer/Employee Relationships Outsourcing Entrepreneur Legal Business Growth Management PCI DSS Notifications Chatbots Navigation Distributed Denial of Service Workplace Gig Economy Travel Screen Reader Google Maps Service Level Agreement Internet Service Provider Undo Cortana Computing Infrastructure Teamwork Hiring/Firing Techology

Blog Archive