Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Psychology Behind the Scam

The Psychology Behind the Scam

Scams are often so convincing that it’s difficult for even experienced individuals to detect them, but why is this the case? It all boils down to human psychology. Modern security training can help you identify these telltale signs, but it doesn’t really explain the why of things. That’s what we’re out to explore today.

Technology Has Changed the Same Old Scams

You’ve probably heard of the “Nigerian Prince” email scam, where a royal is facing danger and needs a quick escape from his home country, and only you can offer the financial assistance needed—and if you provide it, you’ll be rewarded with riches beyond your wildest dreams.

This is the poster child of cybercrime scams, and for good reason. There are several building blocks of a successful scam on full display here—building blocks that have generated millions of dollars in revenue for scammers. In reality, the Nigerian Prince scam is just one variation of an advance-fee scam from the 1800s, where a scammer claims a wealthy prisoner needs money to bribe the guards holding them hostage, and in exchange provides a reward for assistance.

The same scam that worked back then still works now, just in a different medium, whether it’s a written letter or an email, or a bribe or a plea for help.

The Common Tricks Used By Scammers

There are plenty of tools modern scams use to take advantage of their victims. While most of these scams operate via email, the medium is less important than the actual tactic. Keep a lookout for these warning signs:

A Sense of Urgency

Sometimes a sense of fear can push you to react irrationally out of panic. It doesn’t take much to create this feeling; it could be as simple as a ticking clock or the consequences of being discovered by someone who wants to do you harm. If you think about primal humans, for example, there was a significant fear of being harmed by external threats, like competing tribes or wild animals, hence why fear is such a powerful weapon against us psychologically.

Fake Authority

Humanity (generally) operates via a hierarchical understanding of society, meaning that some individuals are perceived to have greater authority than others. This gives their words and actions more weight, even if they don’t really make sense. Scammers can take advantage of this “fake” authority by posing as executives within your business or as important figures in your business agreements, making you more likely to comply with their request.

Taking Advantage of Your Helpfulness

Humanity progresses by working together, and this comes with the added baggage of people liking to be helpful. When someone is suffering, we generally want to do what we can to alleviate that suffering. That said, when someone makes a suspicious request, it doesn’t always register that we shouldn’t necessarily act. This results in us being too helpful and too willing to share information.

Capturing Curiosity

Ah, the fear of missing out. You might be tempted to download a file even when you know you shouldn’t, just because you can’t resist not knowing what’s on the other side. Be careful and always err on the side of caution, even if it feels somewhat benign.

Identify Scams Before You Become a Victim

Scammers are crafty with the way they go about their activities, so you really can’t take too many risks. That’s where Voyage Technology comes in. We can train your team and help you build policies that transform your average employee into a scammer’s worst nightmare. Learn more by calling us at 800.618.9844 today.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android AI Data Recovery Upgrade Disaster Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Information Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Training Covid-19 Gadgets Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Virtualization Apps Two-factor Authentication Mobile Office Vendor Data Security Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking Managed Services Voice over Internet Protocol App Computing Hacker Information Technology Avoiding Downtime Access Control HIPAA Marketing Office 365 Applications Conferencing How To BDR Operating System Computers Risk Management Virtual Private Network Website Health Router Analytics Office Tips Augmented Reality Retail Storage 2FA Help Desk Password Bring Your Own Device Managed IT Services Big Data Healthcare Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Customer Service Cooperation Free Resource Vendor Management Project Management Cybercrime Windows 7 Physical Security Display Microsoft 365 Printer Paperless Office Solutions Infrastructure Firewall Document Management Windows 11 Monitoring The Internet of Things Scam Data loss Excel Social Remote Workers Telephone Robot iPhone Customer Relationship Management Licensing Settings Wireless Entertainment Printing Vulnerabilities Data Privacy Content Filtering Hacking IT Management YouTube Meetings Images 101 Presentation VPN Telephone System Multi-Factor Authentication Cryptocurrency Mobility Cost Management Wireless Technology Computer Repair Virtual Desktop Data storage LiFi Employees Word Integration Outlook User Tip Modem Machine Learning Processor Money Mobile Security Humor Holidays Safety Maintenance Data Storage Antivirus Smart Technology Supply Chain Sports Video Conferencing Mouse Managed Services Provider Saving Time Virtual Machines Professional Services Administration Managed IT Service Downloads Travel Browsers Smartwatch Connectivity IT Break Fix Scams Techology Azure Hybrid Work Google Maps Cortana Upload Procurement Social Network Telework Cyber security Alt Codes Multi-Factor Security Tech Human Resources Downtime Unified Threat Management CES IoT Communitications Competition Dark Web Cables Unified Threat Management Hosted Solution Trends Supply Chain Management Customer Resource management FinTech Regulations Typing Google Calendar Term Google Apps Network Congestion Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Google Drive User Error Staff Value Business Intelligence User Knowledge Gamification Flexibility Organization Social Networking Legislation Shortcuts Point of Sale 5G Fileless Malware Digital Security Cameras Smart Devices Ransmoware IP Address Google Docs Wearable Technology Memory Vendors Unified Communications Experience Content Remote Working Health IT Motherboard Data Breach Bitcoin Network Management Comparison Google Play Be Proactive Running Cable Tech Support Monitors Directions Videos Assessment Electronic Health Records Google Wallet Permissions Workforce Wasting Time Threats Recovery Trend Micro Hard Drives Windows 8 Specifications Security Cameras Workplace Strategies Laptop Websites Microchip Internet Exlporer Software as a Service Domains Drones Fraud Meta SharePoint Managing Costs Amazon Electronic Medical Records Username eCommerce Refrigeration Black Friday SSID Halloween Writing Database Surveillance Public Speaking Lenovo Virtual Assistant Outsource IT Lithium-ion battery IT Technicians Virtual Machine Environment Media Virtual Reality Proxy Server Reviews Cookies Hacks Server Management Cyber Monday Medical IT Entrepreneur Scary Stories Private Cloud Identity Theft Fun Tactics Development Superfish Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Deep Learning Twitter Shopping Nanotechnology Optimization Undo PowerPoint Error Education Social Engineering Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Remote Computing Management PCI DSS Gig Economy Screen Reader Mobile Computing Distributed Denial of Service Workplace Tablet Search Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Regulations Compliance Identity Application Best Practice Evernote Paperless Alert Dark Data Bookmark Smart Tech Memes Managed IT Co-managed IT Buisness File Sharing Legal Alerts SQL Server Technology Care IT solutions How To Download Net Neutrality IBM Financial Data History Business Growth Business Communications Notifications

Blog Archive