Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

5 reasons why scams survive, thrive, and succeed

By Stu Sjouwerman
December 29, 2020

Computer fraud, or cyber-scamming, is a multi-billion-dollar industry that affects people and organizations around the world. Since the pandemic started, cybersecurity experts have tracked a 400% rise in online scams. The world is evolving at a rapid pace and with everything getting connected and automated scammers are bound to adapt, thrive and succeed. Let’s understand the top five reasons:

 

The more you scam, the better your odds of success

Scamming is a numbers game. To succeed a scammer exploits human vulnerabilities finding ideal targets by cycling through large groups of people. For every thousand emails sent out, the cybercriminal may get only a handful of responses, but only one or two replies is enough to translate to hundreds or thousands of dollars.

Like car-sales people, scammers are a persistent lot. They churn through a number of sales pitches, looking for that one window of opportunity when a customer takes the bait and accidentally clicks or replies to a bogus email or download. Like any other business, variety is important to a criminal enterprise. A single culprit can run several scams in parallel, casting wide nets across various pools of people. In one scam, they might send phishing emails; in another, they might commit wire transfer fraud; in a third scam, they could con a purchasing agent through bogus B2B websites.

The global nature of the internet also works in favor of cybercriminals. A crook in Uzbekistan, Iran, or Romania can target hundreds of thousands of Americans without having to worry about getting caught as violations for online crimes might be loosely enforced locally.

 

A successful scam leads to countless imitations

Bernard Madoff did not invent the Ponzi scheme, instead he simply institutionalized the crime by conning investors out of billions of dollars using the same technique that someone would use to steal a thousand dollars. The famous 419 scam or the advanced fee scam has been around for decades, and it is widely believed that a lot of it still originates from Nigeria, but in reality, research suggests that 61% of these scams actually originate from the United States.

Much of the scams that emerged in times of the pandemic are also old wine in new bottles. The concept is age-old -- using fear and financial incentives to create urgency and coaxing users to respond. Cybercriminals used Covid-19 to their advantage and impersonated governments with the pretext of stimulus payments, fake charities with the pretext of donations, fake insurance companies providing fake coronavirus insurance and more in exchange for financial information from victims.

“Pump and dump” financial schemes have always been prevalent since the times of the stock market and these have also now proliferated even in the cryptocurrency market. Not to mention, the internet itself serves as a potent medium of reaching large numbers of investors through spam email, social media, and misinformation.

 

Simple technology tricks reap major outcomes

Faking an online presence is pretty simple these days. A cybercriminal with moderate skills can craft a convincing bank sign-in page or even a fake website and social media identity that appears credible. Cybercrime-as-a-service models facilitate cybercriminals to carry out sophisticated ransomware attacks -- even without advanced technical knowledge. Some scams are poorly constructed and contain warning signs like bad grammar, poor spelling and suspicious URLs. Professional scams on the other hand, are complex, convincing, highly targeted and may involve multiple criminals in numerous countries. Profiling victims has also become extremely easy online. An attacker can study a victim’s blog, social media posts and access other publicly available information before starting a campaign.

 

Lack of cybersecurity knowledge can be a dangerous thing

Humans are creatures of habit and some are notoriously easy to fool. Many chose passwords that favor convenience over security. Many use the same password for all their online accounts including bank accounts.

Some people are often too trusting in what they reveal and share online to an almost anonymous audience. Simple, well-crafted search terms can uncover a wealth of personal information that can easily assist cybercrooks with victimization.

Absence of cybersecurity hygiene and knowledge and can be dangerous, especially at a time when so many are working remotely and given how 75% are doing so without any security guidance or training. Knowing too little about online safety can be costly for businesses and individuals, while on the other hand, a little insight into human nature often makes scammers successful.

 

To err is human

It’s human to be trusting and sometimes gullible and fraudsters are students of human nature. They understand common thought processes, habits, and behaviors. They know how to manipulate emotional vulnerabilities to pull off all types of scams. Success at one scam builds criminal experience that leads to another scam. Finding a victim is simply a matter of cycling through groups of people and singling out a vulnerable one to exploit. Covid-19 scams are a perfect indicator of how fraudsters exploit a crisis, times when we are most confused, panicked, distracted and impulsive.

KEYWORDS: cyber security fraud risk management scams

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

New stu sjouwerman ceo knowbe4

Stu Sjouwerman is founder and CEO of KnowBe4, developer of security awareness training and simulated phishing platforms. He was co-founder of Sunbelt Software, the anti-malware software company acquired in 2010. He is the author of four books, including “Cyberheist: The Biggest Financial Threat Facing American Businesses.” He can be reached at ssjouwerman@knowbe4.com.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • phishing-freepik1170x658v4.jpg

    5 tips for building a positive anti-phishing behavior management program

    See More
  • cyberattack

    Smishing and vishing: Explained and explored

    See More
  • cyber-password-freepik1170x658v4.jpg

    Four ways cybercriminals can hack passwords

    See More

Related Products

See More Products
  • High-Rise Security and Fire Life Safety, 3rd edition

  • operations center.jpg

    Security Operations Center Guidebook

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing