Common Authority Scams — And Why You Should Care

23 days ago
10

This video breaks down the most common authority-based social engineering scams and how to protect yourself. In this episode of the Learn Online Security Podcast Heroes Portion, Richard Bankert and Chris Howells share real-world examples like CEO fraud, business email compromise, fake IT support (Microsoft/Apple scams), government or law enforcement impersonation, and utility bill scams—including one that netted scammers a 70% success rate.

The key takeaway: validate, verify, then proceed before acting on any request from an "authority" figure.

What are my next steps?
📖 Start learning for free at https://learnonlinesecurity.com/start-here
🔐 Become a superhero and support the channel https://learnonlinesecurity.com/heroes/superheroes
🏢 Learn more about our social engineering training for employees & business certification courses https://learnonlinesecurity.com/business-training

Follow Learn Online Security:
Facebook: https://www.facebook.com/LearnOnlineSec
Instagram: https://www.instagram.com/learnonlinesecurity
Website: https://www.learnonlinesecurity.com

⌚Time Stamps ⌚
00:00 – Introduction: What Are Authority-Based Social Engineering Scams
01:02 – CEO Fraud & Business Email Compromise Explained (Cybersecurity Awareness)
02:25 – How Hackers Use LinkedIn & Social Media for Impersonation Scams
02:44 – Fake IT Support Scams: Microsoft, Apple & Geek Squad Impersonators
03:45 – Browser Notification & Extension Hacks That Deliver Malware
04:28 – Government & Law Enforcement Impersonation Scams (CRA, IRS, Police)
05:24 – How to Verify a Government Caller’s Identity Safely
06:02 – Payment Scam Red Flags: Gift Cards, Crypto, & Offshore Accounts
06:40 – Utility Company Scam Threats: Fake Disconnection Notices
07:13 – Real $9 Utility Bill Scam That Stole Thousands (Case Study)
09:28 – Scam Prevention Tip: Buy Time Before Acting on Urgent Requests
10:20 – How to Safely Verify an Authority Figure’s Claim
10:58 – Final Cybersecurity Advice: Validate, Verify, Then Proceed

🎯 Perfect for:
Small business owners • IT professionals • Corporate security teams • Anyone wanting to protect themselves from cybercrime & social engineering scams

Loading comments...