Settings
Language
Color Theme
What are impersonation scams?
Impersonation scams happen when cybercriminals pretend to be someone you know and trust. They use urgency, realistic details, and familiar names to pressure you into acting fast, often before you have time to think or verify.
Which of the following BEST describes impersonation scams?
In impersonation scams, attackers pretend to be someone you know such as a boss, colleague, or family member to trick you into sharing sensitive information or sending money.
View Options Again
A scam where malware is installed through fake downloads
A scam where attackers exploit website vulnerabilities
A scam where attackers pretend to be someone you know and trust
A scam where automated systems send spam from unknown numbers
How impersonation scams work
Impersonation scams are designed to trick you when you least expect it. These scams work by impersonating a known contact, creating a false sense of urgency, using realistic details to seem legitimate, and pressuring you to share sensitive information. Let’s explore how they work in more detail.
They Pretend To Be Someone You Trust
Scammers often pretend to be someone you know or recognize, like your manager, a colleague, a bank, or even a government agency. By mimicking familiar names and official roles, they gain instant credibility, making you more likely to share information or take action without questioning it.
Why do impersonation scammers often pretend to be someone you know?
By posing as a familiar individual, scammers lower your guard and make their requests seem believable, increasing the chance you’ll act without verifying.
View Options Again
To gain your trust
Because they don’t know how to create fake identities
To make their messages look more professional
To avoid detection by antivirus software
They Create Urgency
Impersonation scammers don’t want you to think; they want you to act fast. By creating a sense of urgency, they pressure you into making quick decisions without taking time to verify the request. Quick decisions leave no time for critical thinking.
They Use Realistic Details
To make their scams believable, attackers include real names, job titles, company logos, email signatures, voice cloning, and other technologies. These elements make the impersonation attempt look official, even if it’s completely fake. The more convincing it looks, the more likely you are to fall for it.
Why do scammers create a false sense of urgency?
Scammers use urgency to push you into reacting before you can think or verify. By making you feel rushed, they increase the chances you’ll follow instructions without questioning them.
View Options Again
To speed up their daily scam quota
Because fake emergencies are trending
To stop you from thinking clearly or verifying the request
To help you build decision-making confidence
Is the following statement True or False:
A professional message with a company logo is always safe to trust.
Just because a message looks polished doesn’t mean it’s real. Scammers often go out of their way to make emails, texts, and even phone calls look and sound legitimate. They copy real company logos, use professional-looking email signatures, and mimic the tone and formatting of official communications.
View Options Again
True
False
They Ask For Something Sensitive
Once the scammer has your trust, they ask you to perform an action. This could be providing login credentials, sending money, or asking for other forms of confidential data. The request often sounds sincere and perfectly reasonable, which is exactly why it works.
What type of information do impersonation scammers commonly ask for?
Scammers typically ask for sensitive information they can exploit, like passwords or sensitive company information.
View Options Again
Your thoughts on the new company logo
Feedback on the company newsletter
Login credentials or sensitive company information
Your weekend plans
What To Look Out For
Even convincing scams leave subtle clues. Watch for unusual language, strange timing, formatting issues, or requests that feel out of place. If a message seems off or doesn’t match how someone usually communicates, pause and verify before acting.
Your manager emails asking for payroll data, but it feels suspicious. What should you do?
Even if an email looks legit, it could still be a scam. Always verify requests through a secondary trusted communication channel, like calling a known and verified phone number, internal chat, or face-to-face check.
View Options Again
Provide partial information to see if they really are your manager
Immediately send the records, you work for them
Call the phone number listed in the email to verify the request
Verify the request through official channels and known contact details
A caller says they’re from your bank and want you to move money. What should you do?
Scammers often pretend to be your bank and create urgency to trick you into moving money. Don’t trust the caller ID, it can be spoofed. Hang up and call your bank using a verified number, like the one on their website, to confirm the request is legitimate.
View Options Again
Hang up and call your bank directly using a verified number
Ask for their LinkedIn to check if they’re legit
Transfer the funds immediately to avoid loss
Ask them to verify the last 3 digits of your account, then trust them
Additional Tips To Stay Safe
Always take a cautious approach. Don’t trust unexpected requests for sensitive info, even if they look legitimate. Use official channels to confirm, like calling directly or checking in person. Go with your gut. Never share sensitive information without double-checking first.
Wrapping Up
Knowing the telltale signs of an impersonation scam is the first step to stopping it. These scams thrive on pressure, realism, and the appearance of legitimacy to catch you off guard. By staying alert, verifying requests, and trusting your instincts, you can protect yourself and your organization.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Language translation for this training module has been disabled and explicitly set to the following language
[88, "Language translation for this training module has been disabled and explicitly set to the following language", "Language translation for this training module has been disabled and explicitly set to the following language"],
Impersonation-Scams
[89, "Impersonation-Scams", "Impersonation-Scams"],
What are impersonation scams?
[90, "What are impersonation scams?", "What are impersonation scams?"],
Impersonation scams happen when cybercriminals pretend to be someone you know and trust. They use urgency, realistic details, and familiar names to pressure you into acting fast, often before you have time to think or verify.
[91, "Impersonation scams happen when cybercriminals pretend to be someone you know and trust. They use urgency, realistic details, and familiar names to pressure you into acting fast, often before you have time to think or verify. ", "Impersonation scams happen when cybercriminals pretend to be someone you know and trust. They use urgency, realistic details, and familiar names to pressure you into acting fast, often before you have time to think or verify. "],
Which of the following BEST describes impersonation scams?
[92, "Which of the following BEST describes impersonation scams?", "Which of the following BEST describes impersonation scams?"],
A scam where attackers exploit website vulnerabilities
[93, "A scam where attackers exploit website vulnerabilities ", "A scam where attackers exploit website vulnerabilities "],
A scam where malware is installed through fake downloads
[94, "A scam where malware is installed through fake downloads", "A scam where malware is installed through fake downloads"],
A scam where automated systems send spam from unknown numbers
[95, "A scam where automated systems send spam from unknown numbers", "A scam where automated systems send spam from unknown numbers"],
A scam where attackers pretend to be someone you know and trust
[96, "A scam where attackers pretend to be someone you know and trust", "A scam where attackers pretend to be someone you know and trust"],
In impersonation scams, attackers pretend to be someone you know such as a boss, colleague, or family member to trick you into sharing sensitive information or sending money.
[97, "In impersonation scams, attackers pretend to be someone you know such as a boss, colleague, or family member to trick you into sharing sensitive information or sending money.", "In impersonation scams, attackers pretend to be someone you know such as a boss, colleague, or family member to trick you into sharing sensitive information or sending money."],
How impersonation scams work
[98, "How impersonation scams work", "How impersonation scams work"],
Impersonation scams are designed to trick you when you least expect it. These scams work by impersonating a known contact, creating a false sense of urgency, using realistic details to seem legitimate, and pressuring you to share sensitive information. Let’s explore how they work in more detail.
[99, "Impersonation scams are designed to trick you when you least expect it. These scams work by impersonating a known contact, creating a false sense of urgency, using realistic details to seem legitimate, and pressuring you to share sensitive information. Let’s explore how they work in more detail.", "Impersonation scams are designed to trick you when you least expect it. These scams work by impersonating a known contact, creating a false sense of urgency, using realistic details to seem legitimate, and pressuring you to share sensitive information. Let’s explore how they work in more detail."],
They Pretend To Be Someone You Trust
[100, "They Pretend To Be Someone You Trust ", "They Pretend To Be Someone You Trust "],
Scammers often pretend to be someone you know or recognize, like your manager, a colleague, a bank, or even a government agency. By mimicking familiar names and official roles, they gain instant credibility, making you more likely to share information or take action without questioning it.
[101, "Scammers often pretend to be someone you know or recognize, like your manager, a colleague, a bank, or even a government agency. By mimicking familiar names and official roles, they gain instant credibility, making you more likely to share information or take action without questioning it.", "Scammers often pretend to be someone you know or recognize, like your manager, a colleague, a bank, or even a government agency. By mimicking familiar names and official roles, they gain instant credibility, making you more likely to share information or take action without questioning it."],
Why do impersonation scammers often pretend to be someone you know?
[102, "Why do impersonation scammers often pretend to be someone you know? ", "Why do impersonation scammers often pretend to be someone you know? "],
To avoid detection by antivirus software
[103, "To avoid detection by antivirus software ", "To avoid detection by antivirus software "],
To make their messages look more professional
[104, "To make their messages look more professional", "To make their messages look more professional"],
To gain your trust
[105, "To gain your trust", "To gain your trust"],
Because they don’t know how to create fake identities
[106, "Because they don’t know how to create fake identities", "Because they don’t know how to create fake identities"],
By posing as a familiar individual, scammers lower your guard and make their requests seem believable, increasing the chance you’ll act without verifying.
[107, "By posing as a familiar individual, scammers lower your guard and make their requests seem believable, increasing the chance you’ll act without verifying.", "By posing as a familiar individual, scammers lower your guard and make their requests seem believable, increasing the chance you’ll act without verifying."],
They Create Urgency
[108, "They Create Urgency", "They Create Urgency"],
Impersonation scammers don’t want you to think; they want you to act fast. By creating a sense of urgency, they pressure you into making quick decisions without taking time to verify the request. Quick decisions leave no time for critical thinking.
[109, "Impersonation scammers don’t want you to think; they want you to act fast. By creating a sense of urgency, they pressure you into making quick decisions without taking time to verify the request. Quick decisions leave no time for critical thinking.", "Impersonation scammers don’t want you to think; they want you to act fast. By creating a sense of urgency, they pressure you into making quick decisions without taking time to verify the request. Quick decisions leave no time for critical thinking."],
They Use Realistic Details
[110, "They Use Realistic Details ", "They Use Realistic Details "],
To make their scams believable, attackers include real names, job titles, company logos, email signatures, voice cloning, and other technologies. These elements make the impersonation attempt look official, even if it’s completely fake. The more convincing it looks, the more likely you are to fall for it.
[111, "To make their scams believable, attackers include real names, job titles, company logos, email signatures, voice cloning, and other technologies. These elements make the impersonation attempt look official, even if it’s completely fake. The more convincing it looks, the more likely you are to fall for it.", "To make their scams believable, attackers include real names, job titles, company logos, email signatures, voice cloning, and other technologies. These elements make the impersonation attempt look official, even if it’s completely fake. The more convincing it looks, the more likely you are to fall for it."],
Why do scammers create a false sense of urgency?
[112, "Why do scammers create a false sense of urgency?", "Why do scammers create a false sense of urgency?"],
Because fake emergencies are trending
[113, "Because fake emergencies are trending ", "Because fake emergencies are trending "],
To help you build decision-making confidence
[114, "To help you build decision-making confidence ", "To help you build decision-making confidence "],
To speed up their daily scam quota
[115, "To speed up their daily scam quota ", "To speed up their daily scam quota "],
To stop you from thinking clearly or verifying the request
[116, "To stop you from thinking clearly or verifying the request", "To stop you from thinking clearly or verifying the request"],
Scammers use urgency to push you into reacting before you can think or verify. By making you feel rushed, they increase the chances you’ll follow instructions without questioning them.
[117, "Scammers use urgency to push you into reacting before you can think or verify. By making you feel rushed, they increase the chances you’ll follow instructions without questioning them.", "Scammers use urgency to push you into reacting before you can think or verify. By making you feel rushed, they increase the chances you’ll follow instructions without questioning them."],
A professional message with a company logo is always safe to trust.
[118, "A professional message with a company logo is always safe to trust.", "A professional message with a company logo is always safe to trust."],
Just because a message looks polished doesn’t mean it’s real. Scammers often go out of their way to make emails, texts, and even phone calls look and sound legitimate. They copy real company logos, use professional-looking email signatures, and mimic the tone and formatting of official communications.
[119, "Just because a message looks polished doesn’t mean it’s real. Scammers often go out of their way to make emails, texts, and even phone calls look and sound legitimate. They copy real company logos, use professional-looking email signatures, and mimic the tone and formatting of official communications.", "Just because a message looks polished doesn’t mean it’s real. Scammers often go out of their way to make emails, texts, and even phone calls look and sound legitimate. They copy real company logos, use professional-looking email signatures, and mimic the tone and formatting of official communications."],
They Ask For Something Sensitive
[120, "They Ask For Something Sensitive", "They Ask For Something Sensitive"],
Once the scammer has your trust, they ask you to perform an action. This could be providing login credentials, sending money, or asking for other forms of confidential data. The request often sounds sincere and perfectly reasonable, which is exactly why it works.
[121, "Once the scammer has your trust, they ask you to perform an action. This could be providing login credentials, sending money, or asking for other forms of confidential data. The request often sounds sincere and perfectly reasonable, which is exactly why it works.", "Once the scammer has your trust, they ask you to perform an action. This could be providing login credentials, sending money, or asking for other forms of confidential data. The request often sounds sincere and perfectly reasonable, which is exactly why it works."],
What type of information do impersonation scammers commonly ask for?
[122, "What type of information do impersonation scammers commonly ask for?", "What type of information do impersonation scammers commonly ask for?"],
Login credentials or sensitive company information
[123, "Login credentials or sensitive company information", "Login credentials or sensitive company information"],
Your weekend plans
[124, "Your weekend plans ", "Your weekend plans "],
Feedback on the company newsletter
[125, "Feedback on the company newsletter", "Feedback on the company newsletter"],
Your thoughts on the new company logo
[126, "Your thoughts on the new company logo ", "Your thoughts on the new company logo "],
Scammers typically ask for sensitive information they can exploit, like passwords or sensitive company information.
[127, "Scammers typically ask for sensitive information they can exploit, like passwords or sensitive company information.", "Scammers typically ask for sensitive information they can exploit, like passwords or sensitive company information."],
What To Look Out For
[128, "What To Look Out For", "What To Look Out For"],
Even convincing scams leave subtle clues. Watch for unusual language, strange timing, formatting issues, or requests that feel out of place. If a message seems off or doesn’t match how someone usually communicates, pause and verify before acting.
[129, "Even convincing scams leave subtle clues. Watch for unusual language, strange timing, formatting issues, or requests that feel out of place. If a message seems off or doesn’t match how someone usually communicates, pause and verify before acting.", "Even convincing scams leave subtle clues. Watch for unusual language, strange timing, formatting issues, or requests that feel out of place. If a message seems off or doesn’t match how someone usually communicates, pause and verify before acting."],
Your manager emails asking for payroll data, but it feels suspicious. What should you do?
[130, "Your manager emails asking for payroll data, but it feels suspicious. What should you do?", "Your manager emails asking for payroll data, but it feels suspicious. What should you do?"],
Immediately send the records, you work for them
[131, "Immediately send the records, you work for them", "Immediately send the records, you work for them"],
Verify the request through official channels and known contact details
[132, "Verify the request through official channels and known contact details", "Verify the request through official channels and known contact details"],
Provide partial information to see if they really are your manager
[133, "Provide partial information to see if they really are your manager", "Provide partial information to see if they really are your manager"],
Call the phone number listed in the email to verify the request
[134, "Call the phone number listed in the email to verify the request", "Call the phone number listed in the email to verify the request"],
Even if an email looks legit, it could still be a scam. Always verify requests through a secondary trusted communication channel, like calling a known and verified phone number, internal chat, or face-to-face check.
[135, "Even if an email looks legit, it could still be a scam. Always verify requests through a secondary trusted communication channel, like calling a known and verified phone number, internal chat, or face-to-face check.", "Even if an email looks legit, it could still be a scam. Always verify requests through a secondary trusted communication channel, like calling a known and verified phone number, internal chat, or face-to-face check."],
A caller says they’re from your bank and want you to move money. What should you do?
[136, "A caller says they’re from your bank and want you to move money. What should you do? ", "A caller says they’re from your bank and want you to move money. What should you do? "],
Transfer the funds immediately to avoid loss
[137, "Transfer the funds immediately to avoid loss", "Transfer the funds immediately to avoid loss"],
Hang up and call your bank directly using a verified number
[138, "Hang up and call your bank directly using a verified number", "Hang up and call your bank directly using a verified number"],
Ask for their LinkedIn to check if they’re legit
[139, "Ask for their LinkedIn to check if they’re legit", "Ask for their LinkedIn to check if they’re legit"],
Ask them to verify the last 3 digits of your account, then trust them
[140, "Ask them to verify the last 3 digits of your account, then trust them", "Ask them to verify the last 3 digits of your account, then trust them"],
Scammers often pretend to be your bank and create urgency to trick you into moving money. Don’t trust the caller ID, it can be spoofed. Hang up and call your bank using a verified number, like the one on their website, to confirm the request is legitimate.
[141, "Scammers often pretend to be your bank and create urgency to trick you into moving money. Don’t trust the caller ID, it can be spoofed. Hang up and call your bank using a verified number, like the one on their website, to confirm the request is legitimate.", "Scammers often pretend to be your bank and create urgency to trick you into moving money. Don’t trust the caller ID, it can be spoofed. Hang up and call your bank using a verified number, like the one on their website, to confirm the request is legitimate."],
Additional Tips To Stay Safe
[142, "Additional Tips To Stay Safe ", "Additional Tips To Stay Safe "],
Always take a cautious approach. Don’t trust unexpected requests for sensitive info, even if they look legitimate. Use official channels to confirm, like calling directly or checking in person. Go with your gut. Never share sensitive information without double-checking first.
[143, "Always take a cautious approach. Don’t trust unexpected requests for sensitive info, even if they look legitimate. Use official channels to confirm, like calling directly or checking in person. Go with your gut. Never share sensitive information without double-checking first. ", "Always take a cautious approach. Don’t trust unexpected requests for sensitive info, even if they look legitimate. Use official channels to confirm, like calling directly or checking in person. Go with your gut. Never share sensitive information without double-checking first. "],
Wrapping Up
[144, "Wrapping Up ", "Wrapping Up "],
Knowing the telltale signs of an impersonation scam is the first step to stopping it. These scams thrive on pressure, realism, and the appearance of legitimacy to catch you off guard. By staying alert, verifying requests, and trusting your instincts, you can protect yourself and your organization.
[145, "Knowing the telltale signs of an impersonation scam is the first step to stopping it. These scams thrive on pressure, realism, and the appearance of legitimacy to catch you off guard. By staying alert, verifying requests, and trusting your instincts, you can protect yourself and your organization.", "Knowing the telltale signs of an impersonation scam is the first step to stopping it. These scams thrive on pressure, realism, and the appearance of legitimacy to catch you off guard. By staying alert, verifying requests, and trusting your instincts, you can protect yourself and your organization."],
[146, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.