Articles

Don't Fall Victim to Cyber Scams!

Have you ever received emails or text messages that look suspicious? Learn below about how cyber criminals target people and how to protect yourself.
Updated:
January 20, 2025

According to the FBI Internet Crime Report, the American public reported 791,790 complaints in 2020, representing a 69% increase from 2019, with losses exceeding $4.1 billion (Abbate, 2020). Fraudsters are taking advantage of the COVID-19 pandemic, targeting businesses and individuals. Paul Abbate (2020), FBI Deputy Director, calls it an "internet crime spree." Below you will learn how to recognize and protect yourself from cyber attacks, and how to report cyber complaints to authorities.

Types of Attacks

Phishing Attacks

Phishing is a form of social engineering where attackers pose as trustworthy organizations and try to trick individuals into responding to their email or website requests, where they can gain access to the account user's personal information. Cybercriminals will try to infect devices with malware, steal an individual's identity, and drain their financial assets. Smishing and vishing are other types of phishing attack methods that scammers use to lure victims.

Smishing Attacks

Smishing, also known as SMS phishing, targets mobile device users via text message. The text contains links, email addresses, or phone numbers that lead individuals into traps for malicious activity.

Vishing Attacks

Vishing happens over voice communication by exploiting Voice Over Internet Protocol (VOIP). This form of phishing entices people into giving away their personal information right over the phone.

How to Recognize Attacks

From the Cybersecurity and Infrastructure Security Agency, 2020

  • Attackers will use specific tactics to solicit information from individuals during vulnerable times such as epidemics, natural disasters, and political elections. They will offer items for free, claim there is something wrong with an account, or ask you to verify your information.
  • Cybercriminals try to use altered email addresses, hyperlinks, or websites that are a close match to the trusted organization. Look for misspellings, omitted characters, and different domains such as. com instead of. org.
  • Attachments inserted in emails are a common way of luring individuals. Always examine the sender's information before downloading any attachment.

How to Protect Yourself from Attacks

  • Block or delete phishing emails, texts, or calls immediately.
  • Do not give out your personal information before verifying the identity of the website, link, email, or text. Call a company directly and speak to a customer service representative to determine the credibility of the message.
  • Protect your computer and phone by installing security software that targets phishing and other malicious attacks. Check the software to be sure it is updating automatically.
  • Use multi-step verification factors to log in to your devices to add an extra layer of security. For example, explore apps like Duo or Authy for more information.
  • Back up your information with an external hard drive.

How to Report Phishing Attacks

To help fight scammers, the Federal Trade Commission (2019) encourages victims to report the information as follows:

No one wants to fall victim to phishing attacks, although they are increasing and not going away anytime soon. Do your part to stop scammers and avoid becoming a victim. Stay informed and use common sense to safeguard your personal information.

Works Cited

Abbate, P. (2020). Internet Crime Report 2020 (p. 30). Federal Bureau of Investigation.

Cybersecurity and Infrastructure Security Agency. (2020). Avoiding social engineering and phishing attacks. National Cyber Awareness System.

Federal Trade Commission. (2019). How to recognize and avoid phishing scams. Consumer Information.