Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Best Buy’s Geek Squad Scam is Touring Inboxes

Best Buy’s Geek Squad Scam is Touring Inboxes

Phishing scams are a topic we frequently discuss on this blog. In their simplest form, they are emails or messages sent that are designed to steal from you or gain access to computers or networks. One such scam uses the moniker of the popular IT support company Geek Squad, a subsidiary of Best Buy, to steal from its victims. Here’s how you can avoid falling for these tricks.

The Scam Overview

The scam starts with an email from the supposed Geek Squad informing them that their membership has been renewed. Most people who receive this email are not members, so they will naturally call the toll-free number listed on the email to find out why they have been renewed for a service they do not subscribe to. The person on the other end of the phone call agrees to refund the money, but needs access to your online banking account to do so. They then ask for remote access to your computer to show the user how it can be done.

Unfortunately, the “technician” claims that an error has occurred and informs the user that they have accidentally sent too much money to the user’s account. They then use intimidation and accusations to get the user to withdraw money from the account and send it to an address to settle their debts. Users are then further extorted when the technicians inform them that the package was never received. Hundreds of people forked over hundreds of thousands of dollars in the first half of this year as a result of this scheme.

You might think you wouldn’t fall for such a trick, but the fact of the matter is that these victims didn’t think they would, either. These scams never stop, and there is always a new one to take the place of the old. There are some commonalities amongst them, though. These scams:

  • Use the name of a popular and well-established organization
  • Send emails with attachments or links that, if you look past the frenetic content of the message, seem completely suspect. 
  • Use urgency to stress the user out and make mistakes they normally wouldn’t.

Questions About Phishing You Need to Consider

If you ever suspect that you have received a phishing message, then consider asking the following questions:

  • Who Sent It? – Are there irregularities in the address it came from, are names or suffixes misspelled, or does it come from someone who has never corresponded with you before?
  • What Does the Message Contain? - Are there any links shared in it, does a strange URL appear when you hover your cursor over them, are there any attachments?
  • What Does the Message Actually Say? – Are there spelling and grammar issues in a professional email, is there an excessive sense of urgency or time sensitivity communicated, or is there a request to do something like share data or forward access credentials?

If you can’t stop phishing attacks, the least you can do is be prepared to thwart them. Voyage Technology can help in this effort. To learn more about how we can protect your business, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 22 February 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Hackers Innovation Cloud Network Security User Tips Internet Hardware Efficiency IT Support Malware Privacy Email Google Phishing Workplace Tips Computer Collaboration IT Services Users Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Microsoft Workplace Strategy Small Business Data Backup Communication Smartphone Passwords Saving Money Android Business Management VoIP Smartphones communications Mobile Devices Backup Managed Service Upgrade Data Recovery Managed IT Services Browser Microsoft Office Disaster Recovery Social Media Windows Tech Term Network Remote Internet of Things Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Remote Work Server Managed Service Provider Miscellaneous Current Events Gadgets Productivity Holiday Outsourced IT Information Employee/Employer Relationship Encryption Spam AI Windows 10 Office Training Data Management Business Continuity Compliance Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Two-factor Authentication Mobile Office Data Security Apps Vendor Mobile Device Management Chrome Managed Services Gmail Budget Voice over Internet Protocol Apple Networking App Employer-Employee Relationship Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Tip of the week Conferencing WiFi How To BDR BYOD Computers Router Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Big Data Managed IT Services Operating System HIPAA Display Printer Paperless Office Infrastructure Monitoring IT Support Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Social Cooperation Free Resource Project Management Windows 11 Windows 7 Going Green Patch Management 2FA Save Money Microsoft 365 Remote Monitoring Vulnerability Excel End of Support Customer Service Vendor Management Solutions Cybercrime Presentation VPN Employees YouTube Meetings Physical Security Integration Cryptocurrency Wireless Technology User Tip Modem Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Data Storage Data Privacy Word Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Managed IT Service Safety Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Entertainment Administration Vulnerabilities Images 101 Telephone System Multi-Factor Authentication Robot Mobility Customer Relationship Management Cost Management Supply Chain Settings Printing Wireless Content Filtering Hacking IT Management Trend Micro Paperless Network Congestion Specifications Security Cameras Google Drive User Error Microchip User Internet Exlporer Software as a Service Co-managed IT Knowledge Fraud Managing Costs Username Technology Care Point of Sale eCommerce Business Communications 5G Black Friday SSID IP Address Google Docs Unified Communications Database Surveillance Scams Experience Virtual Assistant Running Cable Tech Support IT Technicians Virtual Machine Bitcoin Network Management Hybrid Work Google Wallet Proxy Server Reviews Cookies Human Resources Monitors Cyber Monday Medical IT Recovery Tactics Development Cables Hotspot Transportation Laptop Websites Mirgation Hypervisor Hard Drives Windows 8 Domains Drones Shopping Nanotechnology Optimization Google Apps PowerPoint SharePoint Addiction IT Maintenance Electronic Medical Records Language Employer/Employee Relationships Halloween Chatbots Navigation Refrigeration Management PCI DSS Business Intelligence Public Speaking Lenovo Gig Economy Screen Reader Shortcuts Writing Distributed Denial of Service Lithium-ion battery Service Level Agreement Internet Service Provider Ransmoware Virtual Reality Computing Infrastructure Teamwork Entrepreneur Scary Stories Private Cloud Identity Evernote Hacks Server Management Regulations Compliance Vendors Superfish Bookmark Identity Theft Smart Tech Memes Be Proactive Fun Deep Learning Download Net Neutrality Workforce Twitter Alerts SQL Server Error History Undo Financial Data Threats Browsers Smartwatch Education Connectivity IT Workplace Strategies Social Engineering Break Fix Upload Procurement Meta Remote Computing Azure Amazon Cyber security Multi-Factor Security Tech Mobile Computing Social Network Telework CES Tablet IoT Communitications Search Dark Web Application Best Practice Trends Supply Chain Management Outsource IT Alert Managed IT Customer Resource management FinTech Environment Buisness File Sharing Regulations Media Dark Data Google Calendar Term IBM Legal Data Analysis IT solutions Star Wars IT Assessment How To Microsoft Excel Notifications Staff Value Business Growth Gamification Flexibility Small Businesses Organization Displays Travel Social Networking Legislation Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Wearable Technology Memory Alt Codes Content Remote Working Outsourcing Competition Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Workplace Permissions Wasting Time Typing Hiring/Firing

Blog Archive