Cybersecurity
1 minute read
As technology has brought many positive changes into our lives, it’s also brought a new danger: Cybercriminals can use technology to deceive people. They often gain their footing with “social engineering”—convincing someone to share information or allowing access to their accounts or personal information.
The elderly, who are often not as familiar with newer technologies, and who can be more trusting of “official-looking” communications, are their primary targets. Scammers will try to lull their chosen targets into a false sense of security in sharing information. From there, they excel at making them feel isolated and under pressure.
Anyone, of any age or background, can fall for these tactics and get scammed. While this may be unsettling to hear, it’s important to know that community is the best defense. No one needs to face scammers alone, and you have resources and people on your side. These can include trusted friends or family members, as well as your J.P. Morgan team.
With this overview of the dangers and defenses in mind, let’s take a look at how two common types of scams can work.
Jane, a retired CEO and entrepreneur, enjoyed being a benefactor to her favorite charities. She managed her wealth carefully to ensure her family’s prosperity, provide a comfortable retirement and support charitable causes.
One day, Jane received an email that seemed to be from a reputable charity she had supported in the past. The message appeared sincere yet urgent, detailing a new program aimed at providing immediate relief to communities affected by a recent natural disaster. The email included compelling stories and images of those in need, tugging at Jane’s heartstrings.
The charity was launching a campaign where every dollar contributed would be doubled by a group of anonymous benefactors. It included links to a website with testimonials and endorsements. Moved by the cause and convinced of its authenticity, Jane decided to make a significant donation. She entered her financial details into what appeared to be a secure portal.
The portal was part of a sophisticated scam, designed to steal funds directly from her account. The financial impact, though buffered by her overall wealth, disrupted her philanthropic plans, requiring a strategic reevaluation. Afterward, Jane felt betrayed and vulnerable, questioning her judgment and the integrity of the charitable world she had long supported.
She’d fallen for a sophisticated phishing email scam. These scams tend to be extremely detailed, and are nearly undetectable by the human eye. Other phishing scams include posing as tech support, government officials or relatives in distress, as well as fake investment schemes and sweepstakes. Other scams include romance scams, robocalls and a host of others that attempt to steal money and personal information.
Or take Gerald, a retired engineer who received a call from “Amazon” stating that his account had been misused by criminals and the FBI was looking into the matter. Gerald was skeptical at first, but he slowly became convinced as “Amazon” provided a case number, identification numbers for the FBI agents and other information that seemed official.
The scammers told Gerald he had to pay a fine or he would be arrested, and they stayed on the phone with him while he withdrew cash from the bank. Only when they asked him to convert his money to Bitcoin did he finally realize he was being scammed. While he avoided financial loss, Gerald felt deeply ashamed he’d been tricked.
As a first line of defense, here are some approaches frequently used by scammers. Recognizing them can help safeguard your wealth, and that of your loved ones.
Jane and Gerald were emotionally manipulated, and failed to recognize their own blind spots. They each assumed they would be able to recognize a scam, so they didn’t consider that the email or phone call might be fraudulent. They placed implicit trust in the system and acted alone. Let’s go over what they should have done before sending in a payment.
Whether it’s a suspicious email or an unexpected phone call, knowing how to respond can make all the difference. Here are some immediate steps you or your loved onea can take if you are ever in their position. We call it “Stop, drop and call.”
1. STOP what you are doing
2. DROP: Do not engage
3. CALL a trusted source
Adopting these habits can help you create a robust first line of defense against potential threats and build up their recognition—making it more likely you can pick up on future scams. By making these practices part of your daily life, you’ll be protecting your finances and personal data, as well as contributing to a safer digital environment for everyone.
Don’t wait until it’s too late—we can help. We study the constantly evolving ways scammers operate, and our Behavioral Science team studies how emotions influence decisions—and how to make better ones.
As cybercrime continues to grow, one of the first and best preventative steps you can take is to call your J.P. Morgan team and register a Trusted Contact Person on your account. For more cyber information and resources to better secure yourself, your family and your business, ask your J.P. Morgan team about our Cyber Advisory team, which has the resources to provide guidance.
We can help you navigate a complex financial landscape. Reach out today to learn how.
Contact usLEARN MORE About Our Firm and Investment Professionals Through FINRA BrokerCheck
To learn more about J.P. Morgan’s investment business, including our accounts, products and services, as well as our relationship with you, please review our J.P. Morgan Securities LLC Form CRS and Guide to Investment Services and Brokerage Products.
JPMorgan Chase Bank, N.A. and its affiliates (collectively "JPMCB") offer investment products, which may include bank-managed accounts and custody, as part of its trust and fiduciary services. Other investment products and services, such as brokerage and advisory accounts, are offered through J.P. Morgan Securities LLC ("JPMS"), a member of FINRA and SIPC. Insurance products are made available through Chase Insurance Agency, Inc. (CIA), a licensed insurance agency, doing business as Chase Insurance Agency Services, Inc. in Florida. JPMCB, JPMS and CIA are affiliated companies under the common control of JPMorgan Chase & Co. Products not available in all states.
Please read the Legal Disclaimer for J.P. Morgan Private Bank regional affiliates and other important information in conjunction with these pages.
Bank deposit products, such as checking, savings and bank lending and related services are offered by JPMorgan Chase Bank, N.A. Member FDIC.
Not a commitment to lend. All extensions of credit are subject to credit approval.