August 2024, Make Your Plan -
Cyberfraud refers to illegal activities carried out using digital technologies—particularly the internet—to deceive, manipulate, and steal from individuals and organizations. Cybercriminals can perpetrate scams via email (phishing), text messages (smishing), telephone (vishing), and social media platforms. Under the guise of legitimate communications from trusted sources, they aim to trick targets into revealing sensitive information so that they can ultimately gain unauthorized access to data or funds. When it comes to protecting yourself, knowledge is the key to prevention.
The threat of cyberfraud has become increasingly difficult to ignore in today’s interconnected world. Complaints to the FBI’s Internet Crime Complaint Center (IC3) nearly doubled between January 2019 and December 2023. Perhaps even more concerning, the reported financial losses resulting from suspected scams over this five-year period grew by over 350% from USD 3.5 billion to USD 12.5 billion (See Fig 1). Experts believe these numbers to be underestimated since many scams go unreported.
While cybercrimes have grown in number and sophistication, there are steps you can take to reduce your risk of becoming a victim. Here are several basic but powerful security measures T. Rowe Price recommends for protecting yourself and your financial accounts.
See Additional Disclosure.
Source: https://www.ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf
In addition to securing your accounts, there are several actions you can take to further reduce your exposure.
Often, engaging online is a choice. The following tactics can help to protect you.
Social engineering is a technique utilized by cybercriminals to manipulate, influence, or deceive people into making security mistakes, performing an action, and disclosing sensitive information. The following steps can help to minimize your risk:
Unfortunately, adults over age 60 are the most common targets of cyberattacks, likely because they are viewed as having the largest savings balances. (See “Seniors and cyberfraud.”) Luckily, there are resources available to keep the public informed. The U.S. Department of Justice’s Transnational Elder Fraud Strike Force keeps an ongoing list of common elder fraud scams: https://www.justice.gov/elderjustice/senior-scam-alert. To further educate our customers, we have compiled a list of these and other scams—and actions you should take if you suspect you’re being targeted.
If you suspect any of the below scams, do not send money or provide sensitive, personal, or financial information. Disconnect immediately and call IC3 to report the scam.
Common scams: |
What the scammers want: |
What you should do: |
Social Security Administration (SSA)* Imposter Scam SSA imposters may contact you by telephone and falsely claim that your Social Security number (SSN) has been compromised and your accounts will be seized if you fail to act quickly. |
Sensitive personal information (such as your SSN) or bank account number so that they can withdraw funds for “safekeeping” until the issue is resolved. |
Disconnect immediately and call the SSA and IC3 to report the scam. |
IRS* Imposter Scam Scammers may claim to be an IRS employee urgently informing you that you owe back taxes and will face arrest if you fail to pay. |
Money transfer via wire, mobile payment app, or gift card purchase.† |
Disconnect immediately and call the IRS and IC3 to report the scam. |
Tech Support Scam Fraudsters may claim to be a computer technician who has detected a virus, malware, or hacking attempt on your computer. The scam may be initiated by a phone call, text message, email, or internet pop-up box. |
Remote access to your computer, sensitive personal/financial information, and/or money transfer to pay for information technology help. |
Disconnect the phone and/or close out the pop-up box immediately. |
Lottery or Inheritance Scam Fraudulent telemarketers from outside the U.S. call claiming that you have won a sweepstakes, foreign lottery, or inheritance. They may claim to be an attorney or a public official. |
Money transfers to pay fees for shipping, insurance, customs duties, or taxes associated with claiming your “winnings.” |
Disconnect immediately and call IC3 to report the scam. |
Romance Scam Scammers build fake profiles and contact victims through legitimate dating or social media sites. |
After spending some time building trust, they eventually ask for money in the name of love. |
An online love interest who asks for money is almost certainly a scammer. |
Timeshare or Real Estate Sale Scam Scammers may use public records to find targets and then impersonate real estate agents, claiming to help sell the timeshare or other property for a very attractive price. |
Sensitive information and money transfers to pay fees and taxes associated with facilitation of the sale. |
Disconnect immediately and call IC3 to report the scam. |
Grandparent Voice Scam (aka Emergency Scam) Callers may use voice cloning technology to sound like a loved one, usually a grandchild, in distress. |
They may claim to be in an accident, injured, or in jail and that they need money sent urgently via wire transfer or mobile payment app to pay for something such as bail, a tow truck, a lawyer, or a ride share. |
Disconnect immediately and call IC3 to report the scam. |
* Government agencies, such as the SSA and IRS, will never call or email you to request personal information or payment.
† Gift cards are commonly requested by scammers because they are easy to purchase and load; difficult to trace; and once the scammer has the gift card number and personal identification number, they can convert the funds to cash or purchases.
Individuals over age 60 have reported over twice as much in financial losses as compared with any other age group (see Figure 2).
Not all complaints include an associated age range—those without this information are excluded from this table.
See Additional Disclosure.
Source: https://www.ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf
Seniors can reduce their vulnerability by following the technology use best practices outlined in this article and recognizing red flags that clearly indicate “this is a scam.”
According to the Federal Trade Commission:1
A good rule of thumb: Ignore unexpected requests for money. Just hang up.
If you suspect that you’ve been victimized, let your loved ones and impacted account providers know. Many cybercrimes go unreported (and unresolved) because seniors are too ashamed to report the incident and explore a remedy.
Although vigilance on behalf of individuals is key, companies should also have cybersecurity safeguards in place. At T. Rowe Price, helping to protect our clients’ online security and privacy is a high priority. We use strict security controls to help ensure that your online communications and transactions are safe and reliable. We also maintain rigorous internal procedures for ongoing oversight and employee cybersecurity awareness training.
To help protect your information, T. Rowe Price employs a range of security measures, including:
This program provides customers with assurance that their T. Rowe Price account is protected in the event that it is compromised due to fraud. Under this program, T. Rowe Price will restore eligible account losses due to unauthorized activity if certain requirements are met. Account holders are automatically enrolled in the program but must follow these four security best practices in order to be eligible for coverage:
While cybercrimes have grown in number and sophistication, the red flags and similarities across scams have largely remained the same. Cybercriminals often aim to create a sense of urgency through fear or the promise of something that sounds too good to be true. They often pressure their targets into acting fast and they almost always ask for money—but via odd methods such as through gift card or gold bar purchases, cryptocurrency transfers, or mobile payment apps. To protect yourself, take your time, ask questions, and trust that if something feels suspicious, it probably is. Take proactive measures to secure your accounts, and remember that if there is an urgent matter that must be resolved, trusted institutions will contact you through appropriate, formal business channels.
We recommend that investors of all ages add a trusted contact to their T. Rowe Price and other financial accounts. A trusted contact is a person we might reach out to in the case that we suspect you might be the target of a scam.
Learn more about how T. Rowe Price helps protect your security.
To become a more educated and aware online consumer, visit OnGuard Online, a service of the U.S. Federal Trade Commission and other federal agencies. OnGuard Online provides information about avoiding scams, understanding mobile apps and Wi-Fi networks, securing your home computer, and protecting family members. For additional information about actions you can take to protect yourself, speak with your trusted financial professional.
If you become a victim of cybercrime, do not feel ashamed. Let your loved ones and impacted financial institutions know, then report it to IC3 (a service of the U.S. Federal Bureau of Investigation). For additional guidance on steps to take if you suspect you’ve been scammed, visit the Federal Trade Commission’s website.
Lindsay Theodore is a thought leadership senior manager in Advisory Services within Individual Investors. She is a subject matter expert on retirement and personal finance topics and helps to articulate the firm’s perspectives. She is a vice president of T. Rowe Price Associates, Inc.
Consider these five ways to be better prepared during periods of stock market volatility.
1 https://consumer.ftc.gov/consumer-alerts/2024/01/did-someone-tell-you-move-or-transfer-your-money-it-could-be-scam
Additional Disclosure
As appropriate, complaints are reviewed by IC3 analysts, who apply a crime type and adjust the total loss. Crime Types and losses can be variable and can evolve based upon investigative or analytical proceedings. Complainant/Entity is identified as the individual filing a complaint. Some complainants may have filed more than once, creating a possible duplicate complaint. Complaint counts represent the number of individual complaints received from each state and do not represent the number of individuals filing a complaint.
Important Information
This material is provided for informational purposes only and is not intended to be investment advice or a recommendation to take any particular investment action.
The views contained herein are those of the authors as of August 2024 and are subject to change without notice; these views may differ from those of other T. Rowe Price associates.
This information is not intended to reflect a current or past recommendation concerning investments, investment strategies, or account types, advice of any kind, or a solicitation of an offer to buy or sell any securities or investment services. The opinions and commentary provided do not take into account the investment objectives or financial situation of any particular investor or class of investor. Please consider your own circumstances before making an investment decision.
Information contained herein is based upon sources we consider to be reliable; we do not, however, guarantee its accuracy. Actual future outcomes may differ materially from any estimates or forward-looking statements provided.
Past performance is not a reliable indicator of future performance. All investments are subject to market risk, including the possible loss of principal. All charts and tables are shown for illustrative purposes only.
T. Rowe Price Investment Services, Inc., distributor. T. Rowe Price Associates, Inc., investment adviser. T. Rowe Price Investment Services, Inc., and T. Rowe Price Associates, Inc., are affiliated companies.
© 2024 T. Rowe Price. All Rights Reserved. T. ROWE PRICE, INVEST WITH CONFIDENCE, and the Bighorn Sheep design are, collectively and/or apart, trademarks of T. Rowe Price Group, Inc.