Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Best Buy’s Geek Squad Scam is Touring Inboxes

Best Buy’s Geek Squad Scam is Touring Inboxes

Phishing scams are a topic we frequently discuss on this blog. In their simplest form, they are emails or messages sent that are designed to steal from you or gain access to computers or networks. One such scam uses the moniker of the popular IT support company Geek Squad, a subsidiary of Best Buy, to steal from its victims. Here’s how you can avoid falling for these tricks.

The Scam Overview

The scam starts with an email from the supposed Geek Squad informing them that their membership has been renewed. Most people who receive this email are not members, so they will naturally call the toll-free number listed on the email to find out why they have been renewed for a service they do not subscribe to. The person on the other end of the phone call agrees to refund the money, but needs access to your online banking account to do so. They then ask for remote access to your computer to show the user how it can be done.

Unfortunately, the “technician” claims that an error has occurred and informs the user that they have accidentally sent too much money to the user’s account. They then use intimidation and accusations to get the user to withdraw money from the account and send it to an address to settle their debts. Users are then further extorted when the technicians inform them that the package was never received. Hundreds of people forked over hundreds of thousands of dollars in the first half of this year as a result of this scheme.

You might think you wouldn’t fall for such a trick, but the fact of the matter is that these victims didn’t think they would, either. These scams never stop, and there is always a new one to take the place of the old. There are some commonalities amongst them, though. These scams:

  • Use the name of a popular and well-established organization
  • Send emails with attachments or links that, if you look past the frenetic content of the message, seem completely suspect. 
  • Use urgency to stress the user out and make mistakes they normally wouldn’t.

Questions About Phishing You Need to Consider

If you ever suspect that you have received a phishing message, then consider asking the following questions:

  • Who Sent It? – Are there irregularities in the address it came from, are names or suffixes misspelled, or does it come from someone who has never corresponded with you before?
  • What Does the Message Contain? - Are there any links shared in it, does a strange URL appear when you hover your cursor over them, are there any attachments?
  • What Does the Message Actually Say? – Are there spelling and grammar issues in a professional email, is there an excessive sense of urgency or time sensitivity communicated, or is there a request to do something like share data or forward access credentials?

If you can’t stop phishing attacks, the least you can do is be prepared to thwart them. Voyage Technology can help in this effort. To learn more about how we can protect your business, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 30 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Artificial Intelligence Facebook Miscellaneous Holiday Automation Compliance Gadgets Cloud Computing Covid-19 Training Outsourced IT Server Remote Work Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Managed Services Data Security Apps Vendor Two-factor Authentication Mobile Office Mobile Device Management Tip of the week Chrome Gmail Budget Voice over Internet Protocol WiFi Apple Networking App Employer-Employee Relationship BYOD Conferencing Managed IT Services How To BDR HIPAA Computing Physical Security Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Analytics Office Tips Augmented Reality 2FA Retail Storage Password Bring Your Own Device Big Data Healthcare Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Windows 11 Firewall Document Management Managed IT Service Excel Telephone The Internet of Things Scam Data loss Remote Workers Social Cooperation Free Resource Going Green Patch Management Save Money Project Management Windows 7 Remote Monitoring End of Support Vulnerability Vendor Management Customer Service Microsoft 365 Cybercrime Solutions Display Printer Paperless Office Infrastructure Monitoring Outlook Holidays Machine Learning Data Storage Money Saving Time Supply Chain Humor Video Conferencing Managed Services Provider Safety Professional Services Maintenance Virtual Machines Downloads Antivirus Sports Mouse Licensing Administration Entertainment iPhone Vulnerabilities Robot Data Privacy Telephone System Cost Management Customer Relationship Management Settings Images 101 Wireless Printing Content Filtering Multi-Factor Authentication Mobility Hacking IT Management Presentation VPN YouTube Meetings Cryptocurrency Wireless Technology User Tip Modem Computer Repair Mobile Security Employees Processor Integration Virtual Desktop Data storage LiFi Smart Technology Word Medical IT SharePoint Addiction Electronic Medical Records Language Reviews Development Transportation Small Businesses Refrigeration Management Halloween Chatbots Screen Reader Writing Distributed Denial of Service Hypervisor Displays Public Speaking Lenovo Lithium-ion battery PowerPoint Service Level Agreement Virtual Reality Computing Infrastructure Shopping Optimization Employer/Employee Relationships Outsourcing Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Identity Theft Smart Tech Fun PCI DSS Navigation Superfish Bookmark Workplace Deep Learning Download Twitter Alerts Gig Economy Internet Service Provider Teamwork Hiring/Firing Undo Error Education Connectivity Social Engineering Break Fix Regulations Compliance Evernote Paperless Browsers Co-managed IT Upload Remote Computing Memes Multi-Factor Security Net Neutrality SQL Server Technology Care Mobile Computing Social Network Tablet IoT Search Dark Web Financial Data History Business Communications Scams Application Best Practice Trends Alert Smartwatch IT Dark Data Google Calendar Procurement Azure Hybrid Work Managed IT Customer Resource management Buisness File Sharing Regulations IT solutions Star Wars How To Microsoft Excel Telework Cyber security IBM Tech Human Resources Legal Data Analysis Cables Business Growth Gamification Notifications Staff CES Communitications Legislation Supply Chain Management Travel Social Networking Google Maps Cortana FinTech Term Google Apps Techology Fileless Malware IT Maintenance Alt Codes Content Wearable Technology IT Assessment Comparison Flexibility Value Business Intelligence Competition Health IT Downtime Unified Threat Management Motherboard Hosted Solution Assessment Permissions Organization Shortcuts Unified Threat Management Directions Ransmoware Typing Digital Security Cameras Smart Devices Network Congestion Specifications Remote Working Memory Vendors User Internet Exlporer Knowledge Fraud Data Breach Google Play Be Proactive Google Drive User Error Microchip Workforce Username Videos Electronic Health Records 5G Black Friday Wasting Time Threats Point of Sale Unified Communications Database Experience Trend Micro IP Address Security Cameras Workplace Strategies Google Docs Software as a Service Meta Bitcoin Network Management Running Cable Tech Support IT Technicians Monitors Cyber Monday Managing Costs Amazon Google Wallet Proxy Server Cookies SSID Recovery Tactics Hotspot eCommerce Surveillance Virtual Assistant Outsource IT Hard Drives Windows 8 Laptop Websites Mirgation Nanotechnology Virtual Machine Environment Domains Media Drones

Blog Archive