Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Don’t Get Phished Out of Your Stimulus Payment

Don’t Get Phished Out of Your Stimulus Payment

Wherever there is money, there are scammers. So it may not be a big surprise that scammers are out en masse trying to get between you and your federally mandated stimulus money.  It’s bad enough that we’ve already seen a couple of phishing scams using the COVID-19 pandemic that are designed to help hackers get into accounts they have no business in, now that these scammers know that people are getting cash, the scams are kicked up a notch.

This is not the first time that the U.S. government has distributed checks to everyone, but with online banking being more prevalent now, scammers have a more complete opportunity to steal money. Let’s go through the ways you can ensure that you get your stimulus money:

  1. Avoid anything that has you sign up for stimulus money - Unless you haven’t filed a tax return in the past two years, you will not have to do much to get your stimulus money. If someone wants you to fill out a form to get your stimulus money, you are definitely being scammed.
  2. Scammers don’t just act online - Like traditional phishing, you need to be aware everywhere. Whether you get postcards in the mail with a password printed on it or you get messages over social media, you need to know that being asked to take action to gain “access” or to “verify” your payment information is almost assuredly a scam.
  3. You can’t get your money faster - Some scammers have concocted a scam that “for a small fee” they can get people their stimulus check faster. With tens of millions of people already receiving their check, it's a sign that your money is on its way if you haven’t received it already. No service can help you get your money faster. 
  4. No, you aren’t getting more - What’s better than getting $1,200 tax-free money from your government? Getting more money. Some scammers are actually sending checks for two or three times the amount of the stimulus, the scammer will then apologize for the discrepancy and ask the recipient to reimburse them. The check and their strategy are completely false and should be ignored. 
  5. IRS correspondence - It’s true that some people have had to fill out forms on the IRS website in order to get their checks sent to them or deposited in their bank accounts. Of course, scammers have set up forms that look like it. If the form you filled out isn’t on the IRS’ website, you shouldn’t fill it out.

Knowing what you are up against is the best defense against scammers. If you haven’t yet received your CARES Act stimulus money, you need to go to the official IRS website to find out why (or more likely when) you will receive your stimulus check.

What scams have you been seeing lately? Let us know in the comments section below and return to our blog for more great technology-related information.

For Many Businesses, Working From Home Might Stick
Efficient IT Goes a Long Way


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, November 28 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data IT Support Data Backup Network Security Privacy Hosted Solutions Cloud IT Services Efficiency Internet Email Data Recovery Software Managed IT Services Business Malware User Tips Outsourced IT Phishing Innovation Collaboration Google Hackers Small Business Cloud Computing Mobile Device Tech Term Upgrade Business Management Cybersecurity Managed Service Hardware Computer Smartphone Windows 10 Business Continuity Microsoft Mobile Devices Workplace Tips Android Quick Tips VoIp Communication Smartphones Covid-19 Ransomware Backup Managed Service Provider Paperless Office Disaster Recovery Communications Remote Work Encryption Wi-Fi Office 365 Business Technology Network Data Management Server Browser Saving Money Remote Monitoring Managed IT BDR Users Help Desk Social Media Windows 7 Save Money Document Management Artificial Intelligence Internet of Things Healthcare Vulnerability Passwords Compliance Holiday Chrome Data Security Facebook Government Managed IT services Automation Applications Blockchain Miscellaneous Laptops Microsoft Office Analytics Office Project Management Bandwidth Virtualization Two-factor Authentication Tip of the week Redundancy Mobile Office Scam Health Processor Vendor Management Avoiding Downtime Information Antivirus Employer-Employee Relationship Windows Router Storage OneDrive Managed Services Training Machine Learning Employee-Employer Relationship Data Loss Mobility Maintenance Website BYOD Wireless Apps VPN Company Culture IT Management Networking Gadgets RMM Remote Infrastructure Regulations IoT Customer Relationship Management Software as a Service Files Access Control Proactive Meetings Hard Drive Virtual Private Network Information Technology Smart Technology Financial Remote Monitoring and Management Time Management Computing Operating System Word Bring Your Own Device Data Storage HIPAA Utility Computing Professional Services Patch Management Data Breach Electronic Health Records Employees WiFi Unified Threat Management Consulting Downtime Social Network Instant Messaging Mobile Security Flexibility Alert Unified Communications Managed Services Provider Recycling Server Management Remote Workers Password Gmail The Internet of Things Cooperation Co-Managed IT Risk Management Search Assessment Money File Management Net Neutrality Network Management Management Tablet Monitoring File Sharing Payment Cards Consultation Internet Exlporer Dark Web Augmented Reality Remote Worker Display Enterprise Resource Planning Teamwork SharePoint Touchscreen Remote Working Hacking Features App Cybercrime Cyber security Virtual Machines Google Calendar Fraud Authorization Identity Theft Biometric Alerts Geography Options Telephone Superfish Reviews Politics Cache Return on Investment Mail Merge User Error Travel How To Test Social Networking Virtual Reality Private Cloud IT Assessment Heating/Cooling Identity Shared resources Going Green Downloads Budget Trending Firewall Procurement Screen Reader Database Management Credit Cards WPA3 Gamification Statistics Comparison Licensing Modem High-Speed Internet 5G Mobile VoIP End of Support Remote Computing Settings Personal Information Address Technology Tips G Suite Manufacturing Vendor CRM Data Warehousing Bookmarks ROI Tech Support Virtual Assistant Bitcoin Digitize Servers Mobile Batteries Distributed Denial of Service Cyberattacks Social Smart Tech GDPR Techology Computers Legislation Fleet Tracking Zero-Day Threat Bluetooth Specifications Mobile Device Management Development Wireless Internet Big Data Windows Server 2008 Recovery Customer Service Transportation Active Directory Shadow IT Digital Payment Hotspot Motherboard Chromebook Smart Devices Content Filtering Favorites Operations IT Technicians Cost Management Wasting Time Current Events Technology Laws CIO applications Emergency Multi-Factor Security Managed IT Service Read Only Security Cameras Connectivity Outlook Disaster Resistance Holidays Asset Tracking Backup and Disaster Recovery Windows Server Printer Outsource IT Black Friday Point of Sale Tech Terms Cookies Cables Employer/Employee Relationships Apple MSP Finance Migration eWaste Outsourcing Websites Mouse Language Vulnerabilities Hard Disk Drives Sensors Conferencing Database Unified Threat Management Human Error Managing Stress Peripheral Break Fix Printing Notes Shortcut Proactive IT IT User Management Laptop Cyber Monday E-Commerce Staff Theft Nanotechnology Wires Proactive Maintenance Solid State Drive Optimization Permissions Authentication Chatbots Video Conferencing SaaS Computing Infrastructure Electronic Medical Records Mobile Computing Solid State Drives Lenovo Banking Microsoft Excel Mirgation Voice over Internet Protocol Projects OneNote Permission Spam Enterprise Content Management Value of Managed Services Samsung PCI DSS Wearable Technology Star Wars PowerPoint IT Consulting Business Telephone Regulation Marketing Education Twitter CEO Printers Students Daniel Stevens

Latest Blog

We realize that it’s one thing for us to tell you how important it is to update your software. After all, we’re tech guys, so we worry about that kind of thing all the time. Hopefully, it’s quite another matter when Homeland Security does it, which is why we’re really hoping...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...