Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Psychology Behind the Scam

The Psychology Behind the Scam

Scams are often so convincing that it’s difficult for even experienced individuals to detect them, but why is this the case? It all boils down to human psychology. Modern security training can help you identify these telltale signs, but it doesn’t really explain the why of things. That’s what we’re out to explore today.

Technology Has Changed the Same Old Scams

You’ve probably heard of the “Nigerian Prince” email scam, where a royal is facing danger and needs a quick escape from his home country, and only you can offer the financial assistance needed—and if you provide it, you’ll be rewarded with riches beyond your wildest dreams.

This is the poster child of cybercrime scams, and for good reason. There are several building blocks of a successful scam on full display here—building blocks that have generated millions of dollars in revenue for scammers. In reality, the Nigerian Prince scam is just one variation of an advance-fee scam from the 1800s, where a scammer claims a wealthy prisoner needs money to bribe the guards holding them hostage, and in exchange provides a reward for assistance.

The same scam that worked back then still works now, just in a different medium, whether it’s a written letter or an email, or a bribe or a plea for help.

The Common Tricks Used By Scammers

There are plenty of tools modern scams use to take advantage of their victims. While most of these scams operate via email, the medium is less important than the actual tactic. Keep a lookout for these warning signs:

A Sense of Urgency

Sometimes a sense of fear can push you to react irrationally out of panic. It doesn’t take much to create this feeling; it could be as simple as a ticking clock or the consequences of being discovered by someone who wants to do you harm. If you think about primal humans, for example, there was a significant fear of being harmed by external threats, like competing tribes or wild animals, hence why fear is such a powerful weapon against us psychologically.

Fake Authority

Humanity (generally) operates via a hierarchical understanding of society, meaning that some individuals are perceived to have greater authority than others. This gives their words and actions more weight, even if they don’t really make sense. Scammers can take advantage of this “fake” authority by posing as executives within your business or as important figures in your business agreements, making you more likely to comply with their request.

Taking Advantage of Your Helpfulness

Humanity progresses by working together, and this comes with the added baggage of people liking to be helpful. When someone is suffering, we generally want to do what we can to alleviate that suffering. That said, when someone makes a suspicious request, it doesn’t always register that we shouldn’t necessarily act. This results in us being too helpful and too willing to share information.

Capturing Curiosity

Ah, the fear of missing out. You might be tempted to download a file even when you know you shouldn’t, just because you can’t resist not knowing what’s on the other side. Be careful and always err on the side of caution, even if it feels somewhat benign.

Identify Scams Before You Become a Victim

Scammers are crafty with the way they go about their activities, so you really can’t take too many risks. That’s where Voyage Technology comes in. We can train your team and help you build policies that transform your average employee into a scammer’s worst nightmare. Learn more by calling us at 800.618.9844 today.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Cloud Hackers Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Computer Phishing Google Email Workplace Tips IT Services Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Microsoft Quick Tips Backup Cybersecurity Passwords Saving Money Communication Data Backup Managed Service Smartphone Android Productivity Business Management Smartphones Upgrade VoIP communications Mobile Devices Data Recovery Disaster Recovery Browser Windows Social Media Managed IT Services Microsoft Office AI Current Events Network Remote Tech Term Internet of Things Facebook Automation Artificial Intelligence Cloud Computing Information Covid-19 Holiday Miscellaneous Gadgets Remote Work Training Server Managed Service Provider Outsourced IT Employee/Employer Relationship Spam Compliance Encryption Windows 10 IT Support Office Business Continuity Data Management Government Virtualization Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Vendor Two-factor Authentication Apps Mobile Office Data Security BYOD Employer-Employee Relationship Tip of the week Chrome Managed Services Voice over Internet Protocol Budget Apple Networking Mobile Device Management App Gmail WiFi HIPAA Computing Applications Information Technology Access Control Office 365 Hacker Conferencing Avoiding Downtime Marketing How To BDR Operating System Router Big Data Virtual Private Network Risk Management Health Help Desk 2FA Analytics Office Tips Augmented Reality Computers Retail Storage Password Healthcare Website Bring Your Own Device Managed IT Services Vendor Management Solutions The Internet of Things Cybercrime Physical Security Social Display Printer Paperless Office Infrastructure Windows 11 Monitoring Customer Service Document Management Excel Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Firewall Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Content Filtering IT Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays LiFi Customer Relationship Management Data storage Data Storage Smart Technology Video Conferencing Outlook Hacking Supply Chain Machine Learning Managed Services Provider Professional Services Presentation Money Saving Time Virtual Machines Humor Managed IT Service Wireless Technology Maintenance Antivirus Sports Downloads iPhone Mouse Licensing Vulnerabilities Entertainment Word Administration Data Privacy Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Safety Printing Wireless Permissions Vendors Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Be Proactive Typing Wasting Time Workforce Trend Micro Network Congestion Specifications Security Cameras Internet Exlporer Software as a Service Knowledge Fraud Threats Google Drive User Error Microchip Application Workplace Strategies Username Managing Costs 5G Black Friday SSID Meta Point of Sale eCommerce Unified Communications Database Surveillance Experience Virtual Assistant IBM Amazon Google Docs Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Monitors Cyber Monday Medical IT Outsource IT Google Wallet Proxy Server Reviews Cookies Media Tactics Development Hotspot Transportation Environment Windows 8 Laptop Websites Mirgation Hypervisor PowerPoint Competition Small Businesses Drones Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Displays SharePoint Management PCI DSS Halloween Chatbots Navigation Writing Distributed Denial of Service Outsourcing Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork User Workplace Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Fun Hiring/Firing Superfish Bookmark Identity Theft Smart Tech Memes Paperless Deep Learning Download Net Neutrality Twitter Alerts SQL Server IP Address Co-managed IT Financial Data Error History Social Engineering Break Fix Technology Care Browsers Smartwatch Education Connectivity IT Recovery Business Communications Upload Procurement Remote Computing Azure Hard Drives Scams Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Search Dark Web Domains Hybrid Work CES Tablet IoT Communitications Human Resources Best Practice Trends Supply Chain Management Alert Refrigeration Cables Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term How To Microsoft Excel Public Speaking Legal Data Analysis IT solutions Star Wars IT Assessment Google Apps Business Growth Gamification Flexibility Notifications Staff Value Lithium-ion battery IT Maintenance Organization Entrepreneur Travel Social Networking Legislation Cortana Business Intelligence Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Shortcuts Alt Codes Content Remote Working Wearable Technology Memory Undo Ransmoware Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play

Blog Archive