Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Don’t Get Phished Out of Your Stimulus Payment

Don’t Get Phished Out of Your Stimulus Payment

Wherever there is money, there are scammers. So it may not be a big surprise that scammers are out en masse trying to get between you and your federally mandated stimulus money.  It’s bad enough that we’ve already seen a couple of phishing scams using the COVID-19 pandemic that are designed to help hackers get into accounts they have no business in, now that these scammers know that people are getting cash, the scams are kicked up a notch.

This is not the first time that the U.S. government has distributed checks to everyone, but with online banking being more prevalent now, scammers have a more complete opportunity to steal money. Let’s go through the ways you can ensure that you get your stimulus money:

  1. Avoid anything that has you sign up for stimulus money - Unless you haven’t filed a tax return in the past two years, you will not have to do much to get your stimulus money. If someone wants you to fill out a form to get your stimulus money, you are definitely being scammed.
  2. Scammers don’t just act online - Like traditional phishing, you need to be aware everywhere. Whether you get postcards in the mail with a password printed on it or you get messages over social media, you need to know that being asked to take action to gain “access” or to “verify” your payment information is almost assuredly a scam.
  3. You can’t get your money faster - Some scammers have concocted a scam that “for a small fee” they can get people their stimulus check faster. With tens of millions of people already receiving their check, it's a sign that your money is on its way if you haven’t received it already. No service can help you get your money faster. 
  4. No, you aren’t getting more - What’s better than getting $1,200 tax-free money from your government? Getting more money. Some scammers are actually sending checks for two or three times the amount of the stimulus, the scammer will then apologize for the discrepancy and ask the recipient to reimburse them. The check and their strategy are completely false and should be ignored. 
  5. IRS correspondence - It’s true that some people have had to fill out forms on the IRS website in order to get their checks sent to them or deposited in their bank accounts. Of course, scammers have set up forms that look like it. If the form you filled out isn’t on the IRS’ website, you shouldn’t fill it out.

Knowing what you are up against is the best defense against scammers. If you haven’t yet received your CARES Act stimulus money, you need to go to the official IRS website to find out why (or more likely when) you will receive your stimulus check.

What scams have you been seeing lately? Let us know in the comments section below and return to our blog for more great technology-related information.

For Many Businesses, Working From Home Might Stick
Efficient IT Goes a Long Way
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, May 30 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Backup Data IT Support Privacy Network Security Hosted Solutions Cloud IT Services Data Recovery Efficiency Software Internet Email Managed IT Services Outsourced IT Malware Innovation Business Tech Term Small Business Hackers Upgrade Cloud Computing Cybersecurity Windows 10 Collaboration Microsoft User Tips Business Management Computer Business Continuity Google Mobile Devices Hardware Phishing Communication Ransomware VoIp Managed Service Workplace Tips Smartphones Backup Managed Service Provider Android Paperless Office Office 365 Communications Server Encryption Quick Tips Disaster Recovery Mobile Device Remote Monitoring Data Management Managed IT Business Technology Vulnerability Windows 7 Network Saving Money Holiday BDR Wi-Fi Browser Internet of Things Passwords Healthcare Artificial Intelligence Compliance Social Media Facebook Document Management Government Remote Work Managed IT services Help Desk Save Money Miscellaneous Smartphone Laptops Applications Blockchain Avoiding Downtime Two-factor Authentication Redundancy Users Employer-Employee Relationship Scam Antivirus Virtualization Information Bandwidth Microsoft Office Processor Data Security Tip of the week Automation Health Project Management Vendor Management IT Management Website Infrastructure Data Loss Customer Relationship Management Software as a Service Maintenance Company Culture OneDrive VPN IoT Chrome RMM Analytics Access Control Proactive Virtual Private Network Storage Meetings Windows Router Mobility BYOD Machine Learning Gadgets Electronic Health Records Risk Management Payment Cards Employees Cooperation Consulting Downtime Recycling Assessment Alert Net Neutrality Employee-Employer Relationship Network Management Managed Services Provider Managed Services Tablet Professional Services Training Consultation Dark Web Augmented Reality Apps Internet Exlporer Remote Workers Networking Regulations Smart Technology Search Time Management Management Computing Hard Drive File Sharing Social Network Files Password Unified Threat Management Monitoring Flexibility Mobile Security Covid-19 HIPAA Utility Computing Unified Communications Bring Your Own Device Financial Word Remote Monitoring and Management Operating System File Management Server Management Patch Management Gmail Co-Managed IT Office The Internet of Things Address WiFi Smart Tech Procurement Solid State Drives Outsourcing WPA3 Mobile Black Friday Voice over Internet Protocol Projects Development Money Value of Managed Services IT Websites Instant Messaging Mouse Language PowerPoint Display Break Fix Teamwork Information Technology Optimization IT Technicians Cost Management Bookmarks ROI Cybercrime Cyber security Laptop Techology Motherboard Chromebook Return on Investment Connectivity Cyberattacks Social Permissions Options Telephone Video Conferencing Fleet Tracking Zero-Day Threat Cyber Monday Staff Cookies Cables Mobile Device Management Microsoft Excel Business Telephone SaaS Migration eWaste Customer Service Computing Infrastructure Technology Laws Shared resources Going Green Virtual Machines Emergency Multi-Factor Security Favorites Database Management Remote Working Outlook Disaster Resistance Vulnerabilities Wireless Settings Personal Information Printer Read Only Security Cameras Google Calendar Fraud 5G Mobile VoIP Biometric Touchscreen Hacking Asset Tracking Managing Stress Backup and Disaster Recovery Nanotechnology Point of Sale Wires Tech Terms Manufacturing Vendor IT Assessment Chatbots MSP Finance Alerts Virtual Assistant Bitcoin Unified Threat Management Virtual Reality Batteries Credit Cards Heating/Cooling Mirgation Conferencing Travel GDPR Budget Shortcut Proactive IT Mobile Computing Transportation Active Directory Wearable Technology Star Wars Printing Wireless Internet Big Data Gamification Trending Spam Enterprise Content Management Human Error Firewall App E-Commerce Theft Smart Devices Digitize Lenovo Statistics Identity Theft Enterprise Resource Planning Authentication Comparison Licensing Wasting Time Current Events Geography Electronic Medical Records Data Warehousing CIO applications Computers Samsung Servers Cache Technology Tips IT Consulting Distributed Denial of Service Windows Server Windows Server 2008 SharePoint Remote Worker Legislation Employer/Employee Relationships Apple Mobile Office Social Networking OneNote Permission Mail Merge User Error Recovery Screen Reader Features Hard Disk Drives Sensors Shadow IT Superfish Bluetooth Identity Authorization Specifications Database Modem High-Speed Internet Operations Holidays Remote Computing Politics Digital Payment Hotspot Notes Data Breach Managed IT Service User Management Downloads Tech Support Private Cloud Proactive Maintenance Solid State Drive Outsource IT How To G Suite Test Daniel Stevens Regulation Twitter Printers Education CEO Students Marketing

Latest Blog

While all a business’ technology solutions are important, some are bound to take priority over the others, especially when certain ones become an industry-wide focus. A recent survey evaluated the top concerns of small-to-medium-sized businesses for the coming year. The resu...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...