Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Best Buy’s Geek Squad Scam is Touring Inboxes

Best Buy’s Geek Squad Scam is Touring Inboxes

Phishing scams are a topic we frequently discuss on this blog. In their simplest form, they are emails or messages sent that are designed to steal from you or gain access to computers or networks. One such scam uses the moniker of the popular IT support company Geek Squad, a subsidiary of Best Buy, to steal from its victims. Here’s how you can avoid falling for these tricks.

The Scam Overview

The scam starts with an email from the supposed Geek Squad informing them that their membership has been renewed. Most people who receive this email are not members, so they will naturally call the toll-free number listed on the email to find out why they have been renewed for a service they do not subscribe to. The person on the other end of the phone call agrees to refund the money, but needs access to your online banking account to do so. They then ask for remote access to your computer to show the user how it can be done.

Unfortunately, the “technician” claims that an error has occurred and informs the user that they have accidentally sent too much money to the user’s account. They then use intimidation and accusations to get the user to withdraw money from the account and send it to an address to settle their debts. Users are then further extorted when the technicians inform them that the package was never received. Hundreds of people forked over hundreds of thousands of dollars in the first half of this year as a result of this scheme.

You might think you wouldn’t fall for such a trick, but the fact of the matter is that these victims didn’t think they would, either. These scams never stop, and there is always a new one to take the place of the old. There are some commonalities amongst them, though. These scams:

  • Use the name of a popular and well-established organization
  • Send emails with attachments or links that, if you look past the frenetic content of the message, seem completely suspect. 
  • Use urgency to stress the user out and make mistakes they normally wouldn’t.

Questions About Phishing You Need to Consider

If you ever suspect that you have received a phishing message, then consider asking the following questions:

  • Who Sent It? – Are there irregularities in the address it came from, are names or suffixes misspelled, or does it come from someone who has never corresponded with you before?
  • What Does the Message Contain? - Are there any links shared in it, does a strange URL appear when you hover your cursor over them, are there any attachments?
  • What Does the Message Actually Say? – Are there spelling and grammar issues in a professional email, is there an excessive sense of urgency or time sensitivity communicated, or is there a request to do something like share data or forward access credentials?

If you can’t stop phishing attacks, the least you can do is be prepared to thwart them. Voyage Technology can help in this effort. To learn more about how we can protect your business, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 11 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Privacy Malware Google Email Computer Phishing Workplace Tips IT Services Users Collaboration Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Cybersecurity Small Business Microsoft Communication Passwords Data Backup Saving Money Smartphone Backup Managed Service Business Management VoIP Smartphones Android Upgrade Mobile Devices communications Disaster Recovery Browser Data Recovery Managed IT Services Social Media Windows Microsoft Office Remote Current Events Network Tech Term Internet of Things Productivity Artificial Intelligence Facebook Automation Covid-19 Gadgets Cloud Computing AI Remote Work Miscellaneous Server Managed Service Provider Holiday Outsourced IT Information Training Employee/Employer Relationship Encryption Spam Compliance Windows 10 Office Data Management Business Continuity Government Windows 10 Bandwidth Business Technology Virtualization Wi-Fi Blockchain Vendor IT Support Apps Data Security Two-factor Authentication Mobile Office Mobile Device Management Chrome Gmail Budget Apple App Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking BYOD Applications Access Control WiFi Tip of the week Conferencing Computing How To Hacker BDR Information Technology Avoiding Downtime Marketing HIPAA Office 365 Router Office Tips Analytics Augmented Reality Virtual Private Network Storage Password Health Help Desk Bring Your Own Device Big Data Retail Healthcare Operating System Managed IT Services Computers Risk Management Website Solutions Physical Security Firewall Display Printer Paperless Office Infrastructure Windows 11 The Internet of Things Monitoring 2FA Document Management Social Excel Going Green Remote Workers Telephone Scam Data loss Customer Service Cybercrime Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Remote Monitoring Microsoft 365 End of Support Vulnerability Vendor Management Meetings Outlook VPN Money Employees Modem Integration Humor User Tip Processor Computer Repair Mobile Security Safety Sports Mouse Holidays Smart Technology Data Storage Supply Chain Administration Machine Learning Video Conferencing Saving Time Managed Services Provider Professional Services Virtual Machines Managed IT Service Maintenance Downloads Customer Relationship Management Antivirus Settings Printing Licensing Wireless iPhone Content Filtering Hacking Entertainment Presentation YouTube Vulnerabilities Cryptocurrency Data Privacy Wireless Technology Robot Images 101 Telephone System Cost Management Virtual Desktop Multi-Factor Authentication Mobility Data storage LiFi IT Management Word Electronic Health Records Workforce Network Congestion Specifications Videos User Error Microchip Refrigeration Internet Exlporer Halloween Wasting Time Threats Fraud Security Cameras Workplace Strategies Public Speaking Username Trend Micro Software as a Service Point of Sale Meta Black Friday Lithium-ion battery Hacks Database Entrepreneur Scary Stories Managing Costs Amazon SSID Network Management eCommerce Tech Support IT Technicians Fun Surveillance Cookies Virtual Assistant Outsource IT Monitors Cyber Monday Proxy Server Deep Learning Undo Tactics Virtual Machine Environment Hotspot Media Medical IT Reviews Education Websites Mirgation Development Nanotechnology Transportation Small Businesses SharePoint Mobile Computing Addiction Hypervisor Displays Electronic Medical Records Language PowerPoint Shopping Management Optimization Chatbots Search Screen Reader Employer/Employee Relationships Outsourcing Writing Distributed Denial of Service Lenovo Application Best Practice PCI DSS Service Level Agreement Buisness Virtual Reality Computing Infrastructure Navigation Workplace IBM Legal Gig Economy Server Management IT solutions Private Cloud Identity Internet Service Provider Identity Theft Smart Tech Teamwork Hiring/Firing Superfish Bookmark Business Growth Regulations Compliance Download Twitter Alerts Evernote Paperless Co-managed IT Memes Error Cortana Net Neutrality Connectivity SQL Server Technology Care Social Engineering Break Fix Browsers Alt Codes Competition Financial Data Upload Downtime History Remote Computing Business Communications Scams Multi-Factor Security Smartwatch Social Network Hosted Solution IT Typing Procurement Tablet IoT Azure Hybrid Work Dark Web Telework Trends Cyber security Alert Tech Human Resources Knowledge Cables Dark Data Google Calendar Google Drive CES Managed IT Customer Resource management User Communitications File Sharing Regulations Supply Chain Management Star Wars How To Microsoft Excel Data Analysis FinTech Gamification Notifications Staff 5G Term Google Apps Experience IT Maintenance Legislation IP Address Google Docs Unified Communications IT Assessment Travel Social Networking Techology Fileless Malware Bitcoin Flexibility Google Maps Running Cable Value Business Intelligence Google Wallet Organization Content Wearable Technology Shortcuts Smart Devices Unified Threat Management Motherboard Ransmoware Comparison Digital Security Cameras Health IT Recovery Unified Threat Management Directions Hard Drives Windows 8 Remote Working Assessment Laptop Memory Vendors Permissions Google Play Be Proactive Domains Drones Data Breach

Blog Archive