What are impersonation scams?

Impersonation scams happen when cybercriminals pretend to be someone you know and trust. They use urgency, realistic details, and familiar names to pressure you into acting fast, often before you have time to think or verify.

Which of the following BEST describes impersonation scams?

View Options Again

How impersonation scams work

Impersonation scams are designed to trick you when you least expect it. These scams work by impersonating a known contact, creating a false sense of urgency, using realistic details to seem legitimate, and pressuring you to share sensitive information. Let’s explore how they work in more detail.

They Pretend To Be Someone You Trust

Scammers often pretend to be someone you know or recognize, like your manager, a colleague, a bank, or even a government agency. By mimicking familiar names and official roles, they gain instant credibility, making you more likely to share information or take action without questioning it.

Why do impersonation scammers often pretend to be someone you know?

View Options Again

They Create Urgency

Impersonation scammers don’t want you to think; they want you to act fast. By creating a sense of urgency, they pressure you into making quick decisions without taking time to verify the request. Quick decisions leave no time for critical thinking.

They Use Realistic Details

To make their scams believable, attackers include real names, job titles, company logos, email signatures, voice cloning, and other technologies. These elements make the impersonation attempt look official, even if it’s completely fake. The more convincing it looks, the more likely you are to fall for it.

Why do scammers create a false sense of urgency?

View Options Again

Is the following statement True or False:
A professional message with a company logo is always safe to trust.

View Options Again

They Ask For Something Sensitive

Once the scammer has your trust, they ask you to perform an action. This could be providing login credentials, sending money, or asking for other forms of confidential data. The request often sounds sincere and perfectly reasonable, which is exactly why it works.

What type of information do impersonation scammers commonly ask for?

View Options Again

What To Look Out For

Even convincing scams leave subtle clues. Watch for unusual language, strange timing, formatting issues, or requests that feel out of place. If a message seems off or doesn’t match how someone usually communicates, pause and verify before acting.

Your manager emails asking for payroll data, but it feels suspicious. What should you do?

View Options Again

A caller says they’re from your bank and want you to move money. What should you do?

View Options Again

Additional Tips To Stay Safe

Always take a cautious approach. Don’t trust unexpected requests for sensitive info, even if they look legitimate. Use official channels to confirm, like calling directly or checking in person. Go with your gut. Never share sensitive information without double-checking first.

Wrapping Up

Knowing the telltale signs of an impersonation scam is the first step to stopping it. These scams thrive on pressure, realism, and the appearance of legitimacy to catch you off guard. By staying alert, verifying requests, and trusting your instincts, you can protect yourself and your organization.