top of page

Protect Yourself From Imposter Scams

Unfortunately, the rise in digital communication has also led to a surge in imposter scams. These scams involve fraudsters impersonating trusted individuals, businesses, or organizations to convince targets to transfer money or share sensitive information. In this blog post, we will discuss how imposter scams happen and outline steps you can take to protect yourself.

How Imposter Scams Happen

Imposter scams typically involve the following tactics:

  1. You are contacted via phone, email, text, online advertisement, or social media post.

  2. Frequently, the caller claims to be security/technical support for reputable companies, such as Microsoft, or trusted financial institutions.

  3. You will be asked to download software and/or provide remote access to your computer.

  4. They may send you an email or text message with a link or attachment, asking you to approve/deny a transaction, set up new credentials, or take other action regarding your account.

Steps to Prevent Imposter Scams

Preventing imposter scams involves recognizing red flags and taking preventive measures:

  1. Confirm the Legitimacy: Always confirm the legitimacy of the organization or person contacting you, especially if you did not initiate the contact. Hang up and look up the company website with official numbers and call back.

  2. Verify Caller ID: Do not assume you are speaking with an institution based on caller ID. Text messages, emails, and phone calls can appear to come from a trusted institution when they are actually from a fraudster.

  3. Research Urgent Requests: Use caution and take time to research if you receive a request to send money urgently.

  4. Check URL: Validate the website or link sent to you by email to ensure it is a legitimate site address. If the address seems suspicious or doesn’t match the official website, do not proceed. Look for spelling errors. Don't click through from a text or email. Open a browser window and navigate to the proper website.

  5. Be Cautious of Downloads: Be cautious about downloading software or granting remote access to your computer or other devices.

  6. Update Passwords and Enable two-factor authentication (2FA): Regularly update your passwords and enable 2FA wherever possible.

  7. Beware of Unsolicited Requests: Be wary of unsolicited communications asking for personal or financial information.

Remember, it is always better to be safe than sorry. If unsure about the legitimacy of a communication, contact the organization directly using contact information found on their official website or other trusted sources. Err on the side of caution and do not use the contact information provided in the suspicious communication, as it may be fake.

Imposter scams are on the rise and can happen to anyone. However, by being aware of the red flags and taking proactive steps to protect yourself, you can significantly reduce your risk of becoming a victim. Remember to confirm the legitimacy of any communication, be cautious about downloading software or granting remote access, regularly update your passwords, enable two-factor authentication, and be wary of unsolicited communications requesting personal or financial information. Stay safe and secure in the digital world!

At Surenomics, we prioritize mitigating risk. Visit our website,, for more tips and resources to help stay safe and secure digitally.


bottom of page