top of page

Business Email Compromise

Image by Priscilla Du Preez 🇨🇦

Business Email Compromise (BEC) is a sophisticated scam in which cybercriminals impersonate trusted contacts using hacked or spoofed email accounts to deceive businesses or individuals. These emails often request unauthorized payments, sensitive information, or access to internal systems. BEC schemes can lead to substantial financial losses and serious disruptions to business operations. Preventing these attacks requires vigilance, secure communication practices, and swift action when suspicious emails are identified. Verify request for payments and sensitive information directly with the requesting party.

  • Your Financial Institution

    • Contact your bank or credit union directly

  • Colorado Springs Police Department

  • The Better Business Bureau of Southern Colorado

Local

  • Attorney General's Office (Colorado)

  • Stop Fraud Colorado 

  • Colorado Bureau of Investigation (CBI)

State

Federal

  • AARP

  • Identity Theft Resource Center

  • Crime Stoppers USA 

National

Image by Markus Spiske

Ransomware

Ransomware is a form of malicious software that encrypts a victim’s data, making it inaccessible until a ransom is paid—often in cryptocurrency. These attacks commonly target businesses, government agencies, and individuals, and may also include threats to publicly release stolen data. To defend against ransomware, it’s critical to maintain regular data backups, implement strong cybersecurity practices, and avoid paying the ransom, as doing so encourages and sustains criminal activity.

Local

  • Your Financial Institution

    • Contact your bank or credit union directly

  • Colorado Springs Police Department

  • The Better Business Bureau of Southern Colorado

State

  • Colorado Bureau of Investigation (CBI)

Federal

  • Internet Crime Complaint Center (IC3)

  • Cybersecurity and Infrastructure Security Agency

  • Federal Trade Commission (FTC)​

National

Tech Support Scams

Image by Vagaro

Tech support scams involve fraudsters pretending to be legitimate technical support representatives from well-known companies, such as Microsoft, Geek Squad or Apple. They contact victims through phone calls, emails, or pop-ups, claiming that the victim’s computer has a virus or issue. The scammers then request remote access, payment for fake services, or sensitive personal information. These scams often result in financial loss, identity theft, or compromised devices. To protect yourself, never grant remote access or make payments to unsolicited tech support contacts. If you happen to provide access to your computer, please take it to a reputable Computer/Electronic store to have your computer professionally cleaned.

  • Your Financial Institution

    • Contact your bank or credit union directly

  • Colorado Springs Police Department

  • The Better Business Bureau of Southern Colorado

Local

  • Attorney General's Office (Colorado)

  • Stop Fraud Colorado 

  • Colorado Bureau of Investigation (CBI)

State

Federal

National

Phone Call

Deep Fake Voice Fraud

Deepfake voice fraud is a cyber-enabled scam in which criminals use artificial intelligence to clone someone’s voice and impersonate them in phone calls or messages. These scams often target family members, employees, or executives, and are used to requesting urgent financial transfers or sensitive information. Fraudsters may claim a loved one is in danger or impersonate a manager requesting immediate action. The realism of AI-generated voices can make these schemes difficult to detect, resulting in significant emotional and financial harm. To protect yourself, be cautious of unexpected or urgent requests for money or data conveyed by voice, and always verify their authenticity through a separate, trusted communication channel.

Local

  • Your Financial Institution

    • Contact your bank or credit union directly

  • Colorado Springs Police Department

  • The Better Business Bureau of Southern Colorado

State

  • Colorado Bureau of Investigation (CBI)

Federal

  • Federal Trade Commission (FTC)​
  • Federal Bureau of Investigation (FBI)

  • Internet Crime Complaint Center (IC3)

  • Federal Communications Commission (FCC)​​

National

bottom of page