Cybercriminals are relentless and often find new ways to steal from victims. Losses from cybercrime continue to climb, with a record $12.5 billion in 2023 according to the FBI’s Internet Crime Complaint Center (IC3).[1] It is likely that the number may be higher due to some individuals not reporting fraudulent instances to the FBI.
FBI Internet Crime Complaint Center Statistics
*Source: Federal Bureau of Investigation Internet Crime Complaint Center. Accessed September 18, 2024
The good news is that with education and a few relatively straightforward best practices, you can significantly strengthen your cybersecurity defenses. To protect yourself from becoming a victim of cybercrime, here are common scams to watch for and recommended best practices for avoiding them.
Common Scams
Though methods vary, cybercrimes usually share a common theme: the victim shares their personal information (either intentionally or unintentionally) with an unknown person or entity over the phone, on a computer, or through a mobile device.
According to the U.S. Cybersecurity and Infrastructure Security Agency, here are some of the most common schemes criminals use to solicit information from their targets and how to minimize your risk of falling victim to them.[2]
1. Email Phishing
Cybercriminals design emails that mimic those coming from legitimate sources, including banks, government agencies, mortgage companies, and other services and businesses. They use these emails to collect personal and financial information and/or infect your device with malware or viruses.
Examples
How to Avoid
2. Imposter Scams
Criminals impersonate a government official, family member, colleague, or friend asking you to wire money, often using personal information they have collected about you to sound more convincing.
Examples
How to Avoid
3. “You’ve Won” Scams
Cybercriminals sometimes send emails, calls, or texts claiming that you have won a prize, sweepstakes, or lottery. You are told that to receive the prize, you must first pay a fee or tax. The call or message is usually full of congratulations and excitement.
Examples
How to Avoid
4. Health Care Scams
Criminals call, email, or send a letter to promise big savings on your insurance, prescriptions, or other healthcare-related expenses. The communication usually requests you to send your Medicare or insurance information, Social Security number, or other pieces of personal information.
Examples
How to Avoid
5. Tech Support Scams
Criminals call you or reach you via online popups and claim to be from a technology company contacting you to diagnose or fix a problem with your computer, software, or other technology. The scammer is typically trying to gain remote access to your device or online account.
Examples
How to Avoid
6. Identity Theft
Criminals use your personal information (e.g., your name, credit card number, Social Security number, etc.) to obtain money or credit. Usually, this is made possible by the criminal obtaining multiple pieces of information unbeknownst to you.
Examples
How to Avoid
Best Practices
Defending against cybercrime and identity theft also includes following best practices as you set up and interact with your devices, including:
1. Understand common signs of scams, including messages that:
2. Use multi-factor authentication whenever possible: Usernames and passphrases are not enough to protect important accounts such as those for email, banking, and social media. Strengthen the security of your online accounts by using multi-factor authentication (MFA) tools — like biometrics, security keys, or a unique, one-time code through an application on your phone — whenever offered.
3. Protect your phone number: Another common ploy of cybercriminals is to take control of your phone number. Once they do this, they can receive your incoming calls and messages, discover information about your contacts, and even access your private bank accounts. There are several ways to protect your phone number, such as setting a PIN for account access, using strong passwords on your phone, and using additional safeguards your carrier may offer. Keeping your phone number protected also stops it from being used by hackers and spammers for robocalls.
4. When in doubt, delete: Links in social media posts (and private messages), emails and online advertising are often how cybercriminals attempt to compromise your information. If there is any doubt in your mind about a link’s security, even if you know the source, delete it or mark it as junk.
5. Keep your machine clean: Cybercriminals use viruses, botnets, malware, and spyware to infect or take over your machine. Use antivirus software to defend against these technical attacks; most new machines come with preinstalled antivirus software that you can trial and then purchase. Keep this software — and all other software on your internet-connected devices (and those of family members), including personal computers, phones, and tablets — current to reduce the risk of infection from cyberattacks.
6. Connect with caution: Avoid conducting any sensitive transactions, including purchases, when on a public Wi-Fi network. Also, avoid using free charging stations in airports, hotels, or other public places. Cybercriminals use these public USB ports to introduce malware and monitoring software onto devices that access them.[3]
7. Adjust your online privacy settings: Companies and websites track your online activity. Ads, social media platforms, and websites collect information about your location, browsing habits, and more. The more information available and shared about you, the more vulnerable you become to cyberattacks. Keep this in mind, and set the privacy and security settings on websites accordingly — based on your comfort level for information sharing and with the understanding that ultimately the best way to contain your personal information is by not sharing it in the first place.
8. Use caution on social media: Think before posting about yourself or others online. Consider what a post reveals, who might see it, and how it might affect you or others. Encourage your family to do the same.
9. Back it up: Even the best computers and devices may become compromised and crash. Regular backups to an external hard drive and/or secure cloud provider will help you recover your valuable work, music, photos, and other digital information in the aftermath of these stressful situations.
Vigilance Makes the Difference
As the above practices highlight, cyber criminals may be relentless, but their methods can be thwarted with continual awareness and caution. Please also know that we continue to evolve our defenses to help keep your data safe as we communicate with you.
[1] Federal Bureau of Investigation: Internet Crime Report 2024. (2024). Federal Bureau of Investigation. Retrieved September 18, 2024, from https://www.ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf
[2] U.S. Cybersecurity and Infrastructure Security Agency, https://www.cisa.gov/be-cyber-smart/common-scams. Accessed September 13, 2023.
[3] FBI, “The Cyber Threat,” retrieved from https://www.fbi.gov/investigate/cyber#What-You%20Should%20Know. Accessed September 9, 2023.
HT|TC Wealth Partners is a group comprised of investment professionals registered with Hightower Advisors, LLC, an SEC registered investment adviser. Some investment professionals may also be registered with Hightower Securities, LLC, member FINRA and SIPC. Advisory services are offered through Hightower Advisors, LLC. Securities are offered through Hightower Securities, LLC. All information referenced herein is from sources believed to be reliable. HT|TC Wealth Partners and Hightower Advisors, LLC have not independently verified the accuracy or completeness of the information contained in this document. HT|TC Wealth Partners and Hightower Advisors, LLC or any of its affiliates make no representations or warranties, express or implied, as to the accuracy or completeness of the information or for statements or errors or omissions, or results obtained from the use of this information. HT|TC Wealth Partners and Hightower Advisors, LLC or any of its affiliates assume no liability for any action made or taken in reliance on or relating in any way to the information. This document and the materials contained herein were created for informational purposes only; the opinions expressed are solely those of the author(s), and do not represent those of Hightower Advisors, LLC or any of its affiliates. HT|TC Wealth Partners and Hightower Advisors, LLC or any of its affiliates do not provide tax or legal advice. This material was not intended or written to be used or presented to any entity as tax or legal advice. Clients are urged to consult their tax and/or legal advisor for related questions.
Legal & Privacy | Web Accessibility Policy
Form Client Relationship Summary ("Form CRS") is a brief summary of the brokerage and advisor services we offer.
HTA Client Relationship Summary
HTS Client Relationship Summary
Securities offered through Hightower Securities, LLC, Member FINRA/SIPC, Hightower Advisors, LLC is a SEC registered investment adviser. brokercheck.finra.org
© 2025 Hightower Advisors. All Rights Reserved.