ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What’s Happening with COVID-19 Scams

What’s Happening with COVID-19 Scams

During the COVID-19 pandemic there have been quite a few different types of scams. At first, most of the scams centered around economic relief money that was doled out to people to help prop up the fledgling economy. More recently however, scammers have focused on vaccines. Today, we will take a closer look at some of these scams, as they are growing in sophistication. 

Opportunists and COVID-19

Everytime something terrible happens, hackers are there to try and take advantage of the desperation people have. It is one of the saddest, most sickening truths that takes place in our digital society. As the pandemic stretches on, more and more scams have been reported that cover all types of parts of people’s lives. They include:

  • Phishing - Phishing scams were here long before COVID-19 and will be here long after it isn’t a threat any longer. Essentially, scammers use emails that are disguised as being from a reputable and legitimate source (like the IRS or the CDC) to get people to take actions they wouldn’t normally take. Typically these messages come from what appears to be a financial institution, but they can literally come from anywhere. 
  • Vishing - Vishing is phishing, but over the telephone. It’s the same strategy, but because the call seems like it is coming from a legitimate source, people will impulsively act. This can have dire consequences. 
  • Smishing - Again, same concept, but this time the message is written via text message. Since people don’t think about the fact that people could be trying to fool them into giving over sensitive financial and personal information through text, they immediately act, leaving them scammed. 
  • Pretexting - This is a less well-known scam, but it has been used a lot over the past year. Basically, someone will contact you directly claiming to be someone they aren’t. They typically claim to be from a government office, a financial institution, or a healthcare organization and ask for personal information to verify your identity.
  • Spoofing - Spoofing can come from any medium, but in the COVID-19 era, we’ve seen a lot of spoofed social media profiles. The scammer will set up a profile with the name of a person you know, they will contact you out of the blue, but since you presumably know this person already, you will help them hack yourself. Spoofing can also be from email addresses, instant messaging accounts, and phone numbers. 
  • Quid Pro Quo - This type of scam has been played up with so many people looking for any way to make ends meet. The scammer will promise the victim something in exchange for information. It may start out as a seemingly legitimate relationship, but after trust has been maintained, the victim is taken for data, money, or worse. 

What Can You Do?

Well, that’s not a simple answer, but there are plenty of things you should be doing to keep your private information out of other people’s hands. Firstly, you will always want to verify the identity of anyone that asks you for anything online. This means anyone. It can be your boss, your partner, your parents, anyone. These days scammers will do anything to get a hold of a little piece of you to take a lot from you. Verify, verify, verify.

Everyone that has an online life should understand the potential pitfalls that are out there. This perspective, along with adhering to best practices can go a long way toward keeping your personal information out of the hands of scammers.

If you would like some help coming up with a comprehensive cybersecurity strategy for your company that includes thorough training and testing, call the IT professionals at ClearView IT today at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Ransomware Data Backup Smartphone communications Microsoft Office Upgrade Smartphones Small Business Mobile Devices Network Data Recovery Communication Managed IT Services Productivity Quick Tips Social Media VoIP Users Mobile Device Tech Term Automation Facebook Business Continuity Windows 10 Disaster Recovery Passwords Covid-19 Holiday Managed Service IT Support Apps Browser Windows 10 Cloud Computing Outsourced IT Miscellaneous Internet of Things Remote Work Managed Service Provider Data Management Government Saving Money Operating System Workplace Strategy Artificial Intelligence Managed IT services Networking Gadgets Windows Business Technology Spam Mobile Device Management Blockchain WiFi Bandwidth Remote Server Encryption Information App Virtualization History Budget Two-factor Authentication Office 365 Apple Information Technology Employee/Employer Relationship Gmail Office Health Analytics Access Control Cybercrime Data Security Conferencing Big Data BDR Wi-Fi Employer-Employee Relationship IT Management Training Hacker Remote Computing Cost Management Compliance Patch Management Document Management Save Money Remote Monitoring Help Desk Voice over Internet Protocol Hacking Vendor Managed Services Retail Vulnerabilities BYOD Alert Computing Vendor Management Hiring/Firing Hard Drive Money Outlook Customer Service Password Unified Threat Management Firewall Data loss Augmented Reality Legal Word Data storage IBM Website Project Management Search... Mobile Office Best Practice Applications Free Resource Cleaning Mobility Meetings Robot Laptop Monitoring How To Google Maps Healthcare Scam User VPN Social Sports SaaS DDoS Twitter Update Chrome Law Enforcement End of Support iPhone Printer Education Cortana Content Filtering Paperless Office Antivirus Mobile Computing Maintenance Windows 11 Marketing Router Travel Running Cable Data Breach Virtual Reality Remote Workers Social Engineering Cryptocurrency The Internet of Things YouTube Black Market Websites Storage Windows 7 Virtual Private Network Vulnerability Wireless Technology Software as a Service Politics Current Events Data Protection Machine Learning eWaste Settings Multi-factor Authentication Solutions Solid State Drive Downtime Safety HIPAA Saving Time Images 101 Integration Display Virtual Desktop Chromebook Drones Computers Experience Bitcoin Automobile Tech Terms Telephone Employees Managed IT Avoiding Downtime Digital How To Holidays Microchip Flexibility Disaster Excel Taxes PowerPoint Cooperation Video Conferencing Administration Hack Lithium-ion battery Identity Theft Virtual Machines Presentation Notifications Unified Communications Computer Repair Specifications Virtual Assistant IT Consultant Physical Security Google Docs Processors Professional Services Bluetooth Customer Relationship Management Distributed Denial of Service Office Tips Co-Managed IT Start Menu Private Cloud Memory Processor Entertainment Downloads Managed Services Provider Computer Care Public Speaking Uninterrupted Power Supply Webcam Flash Navigation Google Apps Addiction email scam Streaming Media Telework Mobile Security Business Mangement Telephone Systems Scams Business Growth User Tip Smartwatch Legislation Communitications News Keyboard Microsoft 365 Tablets Hard Drives Evernote Network Management Procurement FinTech Google Calendar intranet Supercomputer Banking Cables Google Wallet Deep Learning Proxy Server CES Emails Wireless IT Assessment Virus Troubleshooting Fake News Shortcut Messenger Computing Infrastructure Heating/Cooling Value Environment Motion Sickness Service Level Agreement Supply Chain Management Management Windows XP Organization Comparison Device security Cyber security Google Drive Social Networking Business Metrics Point of Sale Hosted Solution Wireless Headphones Smart Devices Microsoft Excel Books Business Cards Corporate Profile Language Tech Shortcuts Society Going Green Remote Working Knowledge Error AI Television Trend Micro Telephony Employer Employee Relationship Monitors Bookmark Digital Security Cameras Visible Light Communication Electronic Health Records Business Owner Transportation Cabling Reading Piracy Wasting Time Tablet G Suite Term Be Proactive Windows 8 Download Mouse HTML eCommerce VoIP Modem Tracking Displays Browsers Videos Advertising Nanotechnology Staffing Surveillance Relocation Software License IP Address Managing Costs Web Server Work/Life Balance Google Play Workplace Strategies Tech Support Upload Social Network SharePoint SSID Digital Payment Data Analysis Media Screen Reader Development Inbound Marketing Employer/Employee Relationships Worker Mobile Technology Virtual Machine Access In Internet of Things Security Cameras Trends Network Congestion Customer Resource management Reviews Devices Optimization Time Management Public Cloud Hacks Reliable Computing Writing Fileless Malware 2FA Recovery Tip of the week Competition Teamwork Audit Electronic Payment Company Culture Hypervisor Spyware Smart Technology Gamification Data Storage Telephone System LiFi Shopping Regulations Entrepreneur Medical IT File Sharing Scalability Directions Paperless Backup and Disaster Recovery Documents Redundancy Application SQL Server Desktop Licensing Cache Phone System Administrator Business Intelligence Text Messaging Proactive IT Content PCI DSS Electronic Medical Records Gig Economy Accountants Humor Unified Threat Management Workers Bring Your Own Device Business Communications Database Securty Internet Service Provider Azure Regulations Compliance Printing Domains Managed IT Service CCTV Supply Chain Music Health IT Equifax Memes Touchscreen Computer Accessories Computer Malfunction Human Resources Tactics Net Neutrality Emergency Hard Drive Disposal Financial Data Vendor Mangement Botnet Workplace Username Micrsooft Risk Management Startup IT Freedom of Information Samsung Rental Service

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?