Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Don’t Get Phished Out of Your Stimulus Payment

Don’t Get Phished Out of Your Stimulus Payment

Wherever there is money, there are scammers. So it may not be a big surprise that scammers are out en masse trying to get between you and your federally mandated stimulus money.  It’s bad enough that we’ve already seen a couple of phishing scams using the COVID-19 pandemic that are designed to help hackers get into accounts they have no business in, now that these scammers know that people are getting cash, the scams are kicked up a notch.

This is not the first time that the U.S. government has distributed checks to everyone, but with online banking being more prevalent now, scammers have a more complete opportunity to steal money. Let’s go through the ways you can ensure that you get your stimulus money:

  1. Avoid anything that has you sign up for stimulus money - Unless you haven’t filed a tax return in the past two years, you will not have to do much to get your stimulus money. If someone wants you to fill out a form to get your stimulus money, you are definitely being scammed.
  2. Scammers don’t just act online - Like traditional phishing, you need to be aware everywhere. Whether you get postcards in the mail with a password printed on it or you get messages over social media, you need to know that being asked to take action to gain “access” or to “verify” your payment information is almost assuredly a scam.
  3. You can’t get your money faster - Some scammers have concocted a scam that “for a small fee” they can get people their stimulus check faster. With tens of millions of people already receiving their check, it's a sign that your money is on its way if you haven’t received it already. No service can help you get your money faster. 
  4. No, you aren’t getting more - What’s better than getting $1,200 tax-free money from your government? Getting more money. Some scammers are actually sending checks for two or three times the amount of the stimulus, the scammer will then apologize for the discrepancy and ask the recipient to reimburse them. The check and their strategy are completely false and should be ignored. 
  5. IRS correspondence - It’s true that some people have had to fill out forms on the IRS website in order to get their checks sent to them or deposited in their bank accounts. Of course, scammers have set up forms that look like it. If the form you filled out isn’t on the IRS’ website, you shouldn’t fill it out.

Knowing what you are up against is the best defense against scammers. If you haven’t yet received your CARES Act stimulus money, you need to go to the official IRS website to find out why (or more likely when) you will receive your stimulus check.

What scams have you been seeing lately? Let us know in the comments section below and return to our blog for more great technology-related information.

For Many Businesses, Working From Home Might Stick
Efficient IT Goes a Long Way
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, July 05 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Privacy Hosted Solutions Network Security IT Services Data Backup Email Internet Malware Hackers Software Efficiency IT Support Business Outsourced IT Innovation Microsoft Mobile Devices Productivity Computer Hardware Data Recovery Managed IT Services Google Upgrade Business Continuity Small Business IT Support Cloud Computing Ransomware Backup Cybersecurity Collaboration Tech Term User Tips Communication Phishing Managed IT Services Managed Service Provider Smartphone Workplace Tips Disaster Recovery Windows 10 Business Management VoIP Internet of Things Smartphones Mobile Device Android Data Management Remote Monitoring Social Media Paperless Office communications Facebook Browser Quick Tips Encryption Managed IT Managed Service Network Server Office 365 Windows 10 Windows Save Money Artificial Intelligence Miscellaneous Saving Money BDR Virtualization Compliance BYOD Risk Management Business Technology Passwords Help Desk Holiday Wi-Fi Document Management Windows 7 Users Health Healthcare Vendor Management Microsoft Office Training Automation Password Remote Work Apps Mobile Device Management Government App Unified Threat Management Big Data Robot Chrome Employer-Employee Relationship Bring Your Own Device Laptops Office Going Green Bandwidth Data Security Recovery Analytics Gmail Applications Avoiding Downtime Firewall Redundancy Two-factor Authentication Tip of the week Processor Scam SaaS Project Management Telephone Systems Antivirus Money Data storage Regulations Computing Blockchain Infrastructure Computers Hosted Solution Information Technology Wireless Website Storage Data loss Vulnerability Mobility File Sharing Content Filtering Information Apple IT Management Gadgets Company Culture Virtual Reality Social Router Politics RMM OneDrive Maintenance Work/Life Balance Unified Communications VPN Proactive IT Service Customer Relationship Management Downtime Employee-Employer Relationship Budget Virtual Private Network Access Control Operating System Printing Machine Learning Remote Computing Hard Drive Tablet Meetings IoT Flexibility Settings Covid-19 Files Customer Service Software as a Service Upgrades Tech Support Hacker Solid State Drive Smart Technology Mobile Office Twitter Co-Managed IT Recycling Wireless Technology Legal Current Events Net Neutrality Utility Computing Consulting Digital Payment Display Professional Services Managed Services Websites Identity Theft Licensing Spam End of Support WiFi Time Management Networking Internet Exlporer YouTube Managed Services Provider Patch Management Monitors Data Storage HIPAA Management Electronic Medical Records Remote Worker Bitcoin Remote Monitoring and Management Alert Data Breach Cooperation Administration Network Management Mobile Security Education Assessment Outlook LiFi Remote Workers Mouse How To How To Samsung Server Management Google Drive IT solutions Social Network Chromebook Consultation Uninterrupted Power Supply File Management Dark Web Business Growth Augmented Reality Sports Electronic Health Records Employees Mobile Computing Payment Cards The Internet of Things Private Cloud Monitoring Word Search Network Congestion Conferencing Cabling PowerPoint Value of Managed Services Backups Data Warehousing Peripheral Buisness Asset Tracking Bluetooth 5G Drones IT Operations Spyware Course Windows Server Technology Assurance Group ’s 18 MSP Proactive IT Deep Learning Computing Infrastructure Computer Repair Cyberattacks Video Conferencing Technology Tips Chatbots Retail Development Cortana Point of Sale Zero-Day Threat Telephone Physical Security Shortcut Managing Stress Cybercrime Instant Messaging Firefox Microsoft Excel Modem PCI DSS 3D Printing OneNote Alt Codes Wireless Internet Business Telephone Multi-Factor Security Wearable Technology eWaste Sync Read Only Security Cameras Cryptocurrency User Management Distributed Denial of Service Annual Convention Outsource IT Telephony Processors Tech Terms Heating/Cooling IT Consulting Manufacturing Optimization Printer Alerts Biometric Comparison Identity Law Enforcement Cables Backup and Disaster Recovery Transportation Mobile VoIP Office Tips Public Cloud WannaCry Enterprise Content Management Update Travel Finance Virtual Assistant Hacks Vendor Cookies Unsupported Software Botnet Virus Hacking Typing Employer/Employee Relationships IT Assessment Google Calendar Mobile Device Managment Software Tips Batteries Managed IT Service San Diego Laptop Theft Servers Best Practice Hard Disk Drives Virtual Machines Projects Gamification Specifications Social Engineering Gadget Wires USB Human Error Cyber security Cost Management Automobile E-Commerce Computer Care Vulnerabilities Authentication Wasting Time Smart Devices Permissions Nanotechnology Connectivity Mobile Data Disaster Trending Proactive Maintenance Digitize Legislation IT Technicians Virtual Desktop Enterprise Resource Planning Bookmarks Mail Merge ROI Windows 8 Save Time Break Fix Social Networking Remote Working WPA3 GPS Financial Technology Laws Solid State Drives Credit Cards SharePoint Staff Identities Return on Investment Black Friday Roanoke — Central Technology Solutions Safety Permission Touchscreen Techology Teamwork Unified Threat Management Hotspot Dark Data Personal Information Features VoIP Sponsor Mirgation Crowdsourcing Geography Authorization Lenovo Database Sensors Fraud Screen Reader Supercomputer Database Management Shadow IT Mobile G Suite Favorites History Address Notes Motherboard Fleet Tracking Notifications Tracking Procurement Statistics Options Google Wallet Holidays Downloads Obstacle Hard Drives Active Directory Google Docs Cyber Monday technology services provider Black Market Taxes Test Disaster Resistance Shared resources Windows Server 2008 User Error Language Cache Google Maps Digital Outsourcing Migration Marketing Writing High-Speed Internet Emoji Superfish Voice over Internet Protocol Humor Smart Tech Star Wars IT Budget GDPR IT Consultant Error Hard Disk Drive Web Server Emergency Printers CrashOverride Cameras Students Motion Sickness CRM CCTV Administrator Relocation Regulation Webcam