Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

5 reasons why scams survive, thrive, and succeed

By Stu Sjouwerman
Virus Detected
December 29, 2020

Computer fraud, or cyber-scamming, is a multi-billion-dollar industry that affects people and organizations around the world. Since the pandemic started, cybersecurity experts have tracked a 400% rise in online scams. The world is evolving at a rapid pace and with everything getting connected and automated scammers are bound to adapt, thrive and succeed. Let’s understand the top five reasons:

 

The more you scam, the better your odds of success

Scamming is a numbers game. To succeed a scammer exploits human vulnerabilities finding ideal targets by cycling through large groups of people. For every thousand emails sent out, the cybercriminal may get only a handful of responses, but only one or two replies is enough to translate to hundreds or thousands of dollars.

Like car-sales people, scammers are a persistent lot. They churn through a number of sales pitches, looking for that one window of opportunity when a customer takes the bait and accidentally clicks or replies to a bogus email or download. Like any other business, variety is important to a criminal enterprise. A single culprit can run several scams in parallel, casting wide nets across various pools of people. In one scam, they might send phishing emails; in another, they might commit wire transfer fraud; in a third scam, they could con a purchasing agent through bogus B2B websites.

The global nature of the internet also works in favor of cybercriminals. A crook in Uzbekistan, Iran, or Romania can target hundreds of thousands of Americans without having to worry about getting caught as violations for online crimes might be loosely enforced locally.

 

A successful scam leads to countless imitations

Bernard Madoff did not invent the Ponzi scheme, instead he simply institutionalized the crime by conning investors out of billions of dollars using the same technique that someone would use to steal a thousand dollars. The famous 419 scam or the advanced fee scam has been around for decades, and it is widely believed that a lot of it still originates from Nigeria, but in reality, research suggests that 61% of these scams actually originate from the United States.

Much of the scams that emerged in times of the pandemic are also old wine in new bottles. The concept is age-old -- using fear and financial incentives to create urgency and coaxing users to respond. Cybercriminals used Covid-19 to their advantage and impersonated governments with the pretext of stimulus payments, fake charities with the pretext of donations, fake insurance companies providing fake coronavirus insurance and more in exchange for financial information from victims.

“Pump and dump” financial schemes have always been prevalent since the times of the stock market and these have also now proliferated even in the cryptocurrency market. Not to mention, the internet itself serves as a potent medium of reaching large numbers of investors through spam email, social media, and misinformation.

 

Simple technology tricks reap major outcomes

Faking an online presence is pretty simple these days. A cybercriminal with moderate skills can craft a convincing bank sign-in page or even a fake website and social media identity that appears credible. Cybercrime-as-a-service models facilitate cybercriminals to carry out sophisticated ransomware attacks -- even without advanced technical knowledge. Some scams are poorly constructed and contain warning signs like bad grammar, poor spelling and suspicious URLs. Professional scams on the other hand, are complex, convincing, highly targeted and may involve multiple criminals in numerous countries. Profiling victims has also become extremely easy online. An attacker can study a victim’s blog, social media posts and access other publicly available information before starting a campaign.

 

Lack of cybersecurity knowledge can be a dangerous thing

Humans are creatures of habit and some are notoriously easy to fool. Many chose passwords that favor convenience over security. Many use the same password for all their online accounts including bank accounts.

Some people are often too trusting in what they reveal and share online to an almost anonymous audience. Simple, well-crafted search terms can uncover a wealth of personal information that can easily assist cybercrooks with victimization.

Absence of cybersecurity hygiene and knowledge and can be dangerous, especially at a time when so many are working remotely and given how 75% are doing so without any security guidance or training. Knowing too little about online safety can be costly for businesses and individuals, while on the other hand, a little insight into human nature often makes scammers successful.

 

To err is human

It’s human to be trusting and sometimes gullible and fraudsters are students of human nature. They understand common thought processes, habits, and behaviors. They know how to manipulate emotional vulnerabilities to pull off all types of scams. Success at one scam builds criminal experience that leads to another scam. Finding a victim is simply a matter of cycling through groups of people and singling out a vulnerable one to exploit. Covid-19 scams are a perfect indicator of how fraudsters exploit a crisis, times when we are most confused, panicked, distracted and impulsive.

KEYWORDS: cyber security fraud risk management scams

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

New stu sjouwerman ceo knowbe4

Stu Sjouwerman is founder and CEO of KnowBe4, developer of security awareness training and simulated phishing platforms. He was co-founder of Sunbelt Software, the anti-malware software company acquired in 2010. He is the author of four books, including “Cyberheist: The Biggest Financial Threat Facing American Businesses.” He can be reached at ssjouwerman@knowbe4.com.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • phishing-freepik1170x658v4.jpg

    5 tips for building a positive anti-phishing behavior management program

    See More
  • cyberattack

    Smishing and vishing: Explained and explored

    See More
  • cyber-password-freepik1170x658v4.jpg

    Four ways cybercriminals can hack passwords

    See More

Related Products

See More Products
  • highriseproductphoto

    High-Rise Security and Fire Life Safety, 3rd edition

  • operations center.jpg

    Security Operations Center Guidebook

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing