Scam Call Prevention Strategies

Jul 23, 2025

Overview

This lecture discusses common scam calls involving impersonation, the risks of identity fraud, and strategies to prevent falling victim to these attacks.

Examples of Scam Calls

  • Scammers pretend to be from companies like Microsoft, the US Treasury, or credit card providers.
  • Calls often mention urgent computer problems, legal actions, or enticing offers like lower interest rates.

Impersonation Tactics

  • Impersonation is when attackers pretend to be someone they are not, to earn your trust.
  • Attackers may pose as internal staff (e.g., help desk or executives) or use technical jargon to confuse you.
  • The goal is to obtain sensitive information by making the victim feel comfortable or obligated.

Voice Phishing (Vishing)

  • Vishing uses phone calls to trick people into revealing confidential data, such as bank accounts or social security numbers.
  • Attackers create believable stories to prompt victims to provide personal details.

Identity Fraud

  • Attackers may use your personal information to open credit card accounts or bank accounts in your name.
  • Fraudsters may take loans or acquire government benefits (e.g., tax refunds) under your identity.
  • These fraudulent actions can damage your credit and financial standing.

Prevention Strategies

  • Do not volunteer sensitive information to unsolicited callers, even if they seem legitimate.
  • Never share passwords, social security numbers, or account details via phone or email.
  • Verify caller identity by using official contact information before sharing personal data.
  • Make verification a routine practice, especially for financial or confidential information requests.

Key Terms & Definitions

  • Impersonation โ€” When someone pretends to be another person to deceive and gain trust.
  • Vishing โ€” Voice phishing; using phone calls to obtain personal or financial information fraudulently.
  • Identity Fraud โ€” Using someone elseโ€™s personal information to gain financial benefit or commit fraud.

Action Items / Next Steps

  • Practice caution with unsolicited phone calls or emails requesting personal information.
  • Familiarize yourself with your organization's verification procedures.
  • Review additional resources or reading on cyber security and fraud prevention.