{"id":297338,"date":"2025-10-06T11:00:43","date_gmt":"2025-10-05T23:00:43","guid":{"rendered":"https:\/\/www.reckon.com\/au\/?p=297338"},"modified":"2025-10-15T12:07:36","modified_gmt":"2025-10-15T00:07:36","slug":"cybersecurity-scams","status":"publish","type":"post","link":"https:\/\/www.reckon.com\/au\/blog\/cybersecurity-scams\/","title":{"rendered":"How to spot a cyber scam: A guide for small businesses"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_3,2_3&#8243; _builder_version=&#8221;4.23&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; module_class=&#8221;table-contents&#8221; _builder_version=&#8221;4.23&#8243; background_color=&#8221;#f3f2f6&#8243; custom_padding=&#8221;25px||25px||true|false&#8221; sticky_position=&#8221;top&#8221; sticky_limit_bottom=&#8221;section&#8221; sticky_position_tablet=&#8221;top&#8221; sticky_position_phone=&#8221;none&#8221; sticky_position_last_edited=&#8221;on|desktop&#8221; pac_dcm_carousel_specific_module_num=&#8221;0&#8243; border_radii=&#8221;on|24px|24px|24px|24px&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.23&#8243; text_font=&#8221;||||||||&#8221; global_colors_info=&#8221;{}&#8221; background__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; pac_dcm_carousel_specific_module_num=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Intro&#8221; _builder_version=&#8221;4.27.4&#8243; header_2_font_size=&#8221;32px&#8221; hover_enabled=&#8221;0&#8243; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Discerning between what is and isn\u2019t a scam these days is getting harder and harder, as cybercriminals refine their tactics and leverage\/use AI. Using <a href=\"https:\/\/www.reckon.com\/au\/blog\/small-business-cybersecurity-tips\/\">cybersecurity tools and methods<\/a> will only get you so far; you need to know when you&#8217;re getting scammed or when something is legitimate.<\/p>\n<p>To protect your business, let\u2019s look at ways scammers try to trick you and get access to your information and accounts.<\/p>\n<h2>Phishing Vs Spear Phishing<\/h2>\n<p>When encountering cyber scams, you will hear a lot about phishing or spear phishing. These terms are used to specify the scope of a <a href=\"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\">cybercrime<\/a>, whether it is a broad opportunistic attack or targeted against a specific individual.<\/p>\n<h3>Phishing scams<\/h3>\n<p>A phishing scam is a trap used by cybercriminals with no specific target in mind. A \u2018wide net\u2019 is used to lure a group of people, and isn\u2019t particularly sophisticated in approach. While it has a lower success rate, phishing scams are often employed by cybercriminals due to the large number of people they target. For scammers, phishing tactics are a numbers game; the more people they target, the bigger pool of unsuspecting victims they\u2019ll capture. It only takes one misclick to succeed.<\/p>\n<h4>Phishing characteristics:<\/h4>\n<ul>\n<li><strong>Goal:<\/strong> Target a large group of people to increase the odds of success (unspecified)<\/li>\n<li><strong>Method:<\/strong> Use a range of messaging platforms (email, phone, sms, social media) and impersonate a legitimate source (government and businesses)<\/li>\n<li><strong>Success rates:<\/strong> low success rate, but due to a large number of targets a significant number of people can fall victim.<\/li>\n<\/ul>\n<h3>Spear phishing scams<\/h3>\n<p>Spear phishing attacks are tactics used to target a specific individual or organisation. These scams are more sophisticated in approach since the scammer, in most cases, has researched their target.<\/p>\n<h4>Spear phishing characteristics:<\/h4>\n<ul>\n<li><strong>Goal:<\/strong> target scam directed toward a specific individual or business\/organisation<\/li>\n<li><strong>Method:<\/strong> Scammers typically use multiple forms of communication to impersonate a supplier or coworker, gaining further access to a company or requesting money.<\/li>\n<li><strong>Success rates:<\/strong> High success rates are achieved as targets are specified and information is more detailed.<\/li>\n<\/ul>\n<h2>Social engineering<\/h2>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; custom_margin=&#8221;-50px|||275px|false|false&#8221;]<script src=\"https:\/\/fast.wistia.com\/embed\/medias\/adka6uf8sa.jsonp\" async><\/script><script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script><\/p>\n<div class=\"wistia_embed wistia_async_adka6uf8sa seo=true videoFoam=false\" style=\"height:400px;position:relative;width:225px\">&nbsp;<\/div>\n<p>[\/et_pb_code][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.27.4&#8243; header_2_font_size=&#8221;32px&#8221; hover_enabled=&#8221;0&#8243; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Scammers use psychological manipulation to deceive people into falling for their scams. This is what social engineering is in cybercrime: creating a sense of urgency or pressure to coerce a victim into complying. For instance, a common phishing scam on WhatsApp is the \u2018Hi Mum\u2019 trick, where scammers impersonate the recipient&#8217;s child, pretending to have broken their phone to solicit money.<\/p>\n<p>By exploiting the fears of their victims, scammers increase their chances of success. To reduce your chances of falling victim to manipulation, do the following:<\/p>\n<ol>\n<li>Stop and think about the message you have received that is pressuring you to do something, and<\/li>\n<li>Look into their claims. You\u2019ll find their ploy falls apart with simple research.<\/li>\n<\/ol>\n<h2>Scams aimed at businesses<\/h2>\n<p>Since 2020, Aussie small businesses have lost approximately $10 million per year to <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/business-scam-stats\/\">cyber scams<\/a>, with an estimated $4,443 cost per loss reported in 2024. These losses add up for businesses as the cost of a cyber scam can seriously cripple a business. For instance, in 2024, 50 investment scams were reported to ScamWatch, resulting in a combined total of $3,714,097 in losses. This reinforces the need to be aware of what scams are used against businesses.<\/p>\n<p>[\/et_pb_text][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<iframe id=\"datawrapper-chart-ybUzG\" style=\"width: 0; min-width: 100% !important; border: none;\" title=\"Self Employing, Micro and Small Business Scams by Category Jan 1 - Nov 30 2024<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->&#8221; src=&#8221;https:\/\/datawrapper.dwcdn.net\/ybUzG\/3\/&#8221; height=&#8221;619&#8243; frameborder=&#8221;0&#8243; scrolling=&#8221;no&#8221; aria-label=&#8221;Table&#8221; data-external=&#8221;1&#8243;><\/iframe><script type=\"text\/javascript\">!function(){\"use strict\";window.addEventListener(\"message\",(function(a){if(void 0!==a.data[\"datawrapper-height\"]){var e=document.querySelectorAll(\"iframe\");for(var t in a.data[\"datawrapper-height\"])for(var r=0;r<e.length;r++)if(e[r].contentWindow===a.source){var i=a.data[\"datawrapper-height\"][t]+\"px\";e[r].style.height=i}}}))}();<!-- [et_pb_line_break_holder] --><\/script>[\/et_pb_code][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Investment scams<\/h3>\n<p>Investment scams are by far the most costly, as cybercriminals will entice their victims with the promise of recouping their money and more by simply investing more. What scammers do is they advertise (phishing) or contact you impersonating a friend or business (spear phishing) and promise great returns with convincing marketing about a new technology or opportunity.<\/p>\n<h4>Investment scams red flags:<\/h4>\n<ul>\n<li>Fake news and ads claiming legitimacy by a well-known figure<\/li>\n<li>Online contact you have never met reaches out about investment opportunities<\/li>\n<li>Over-the-top testimonials sent via email, text or advertised<\/li>\n<li>Social engineering pressure: \u201cDon\u2019t miss out\u201d, \u201conce in a lifetime\u201d, and \u201cYou can\u2019t pass this up\u201d.<\/li>\n<li>\u2018Advisers\u2019 that claim they don\u2019t need an Australian financial services licence (AFS) to sell you the investment<\/li>\n<li>You are pressured to increase your investment through collecting money from family and friends<\/li>\n<\/ul>\n<p>Common investment scams involve Ponzi schemes, online dating scams, superannuation scams and more recently, crypto scams. To avoid these or spot them, remember that these scams are too good to be true and that Australia has stringent regulations around investment advice. Research and look into the legitimacy of these scams. Also, when in doubt, <a href=\"https:\/\/moneysmart.gov.au\/\" target=\"_blank\" rel=\"noopener\">MoneySmart<\/a> is a financial education agency in Australia that helps businesses spot scams. If the company being sold to you is on their list, it\u2019s a scam.<\/p>\n<h3>False billing<\/h3>\n<p>False billing is another scam that targets many small businesses, as the scam is designed to catch a billing or invoice department off guard. Scammers pose as buyers or sellers, using fake websites or impersonating a supplier, and ask for payment for a bogus invoice or for an item that is too good to be true. These scams often work because of the nature of paying invoices and how we have automated the process. We assume that the bill we received is legitimate until we take a moment to think.<\/p>\n<h4>False billing red flags:<\/h4>\n<ul>\n<li>Getting an invoice for goods and services you haven\u2019t ordered or bought<\/li>\n<li>No terms and conditions, ABN, and or privacy policy on their website<\/li>\n<li>Overpaying for and requesting a refund for the difference, then the payment bounces due to fake credentials<\/li>\n<li>Payment details don\u2019t match the business or person you&#8217;re talking to<\/li>\n<li>Requesting payment via payids, pre-loaded cards or several accounts<\/li>\n<\/ul>\n<p>False billing scams are common because they are effective. To avoid these scams, be diligent when running your accounts payable, billing and invoices. For instance, cybercriminals can \u2018intercept\u2019 invoices from companies, take the details and change them, and then send them to the original destination to scam payment. No one is the wiser until the invoicing company notices that no payment has been made.<\/p>\n<p>Make sure to check ABNs, be wary of new social media stores with very low prices, double-check payment details, and also research the \u2018businesses\u2019 you are buying from. To verify the legitimacy of a website, scan its URL for red flags and assess its credibility. You can do this on sites like <a href=\"https:\/\/lookup.icann.org\/en\" target=\"_blank\" rel=\"noopener\">ICANN<\/a>. If it\u2019s not registered, it isn\u2019t legitimate.<\/p>\n<p>[\/et_pb_text][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|||275px|false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/5uehcygiyt.js\" async type=\"module\"><\/script><\/p>\n<style>wistia-player[media-id='5uehcygiyt']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/5uehcygiyt\/swatch'); display: block; filter: blur(5px); }<\/style>\n<p> <wistia-player media-id=\"5uehcygiyt\" aspect=\"0.5625\" style=\"width: 225px;height: 400px;\"><\/wistia-player>[\/et_pb_code][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Protecting your small business from cyber scams<\/h2>\n<p>To protect your business from scams, you need to know how to spot one. By educating yourself on the latest cyber grifts on MoneySmart and ScamWatch, you\u2019ll have the tools to know when something isn\u2019t right. With knowledge about the red flags for scams and effective cybersecurity measures, your personal and business information, as well as your accounts, will be all the safer.<\/p>\n<p>[\/et_pb_text][ba_social_share icon_bg=&#8221;#03002e&#8221; icon_padding=&#8221;10px|12px|10px|12px|true|true&#8221; layout=&#8221;classic&#8221; show_text=&#8221;off&#8221; btn_padding=&#8221;0px|0px|0px|0px|false|false&#8221; btn_bg_color=&#8221;RGBA(255,255,255,0)&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;50px||||false|false&#8221; custom_padding=&#8221;25px||||false|false&#8221; custom_css_before=&#8221; content: %22SHARE THIS%22;|| font-size: 16px;|| font-weight: 700;|| line-height: 22px;|| letter-spacing: 0em;|| text-align: center;|| color: #ff5447;|| margin-bottom: 10px;|| display: inline-flex;|| position: absolute;|| margin-top: 10px;&#8221; border_width_top_main=&#8221;1px&#8221; border_color_top_main=&#8221;#e4e4e4&#8243; border_radii_icon=&#8221;on|5px|5px|5px|5px&#8221; global_colors_info=&#8221;{}&#8221; custom_css_before_last_edited=&#8221;off|desktop&#8221;][ba_social_share_child _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][ba_social_share_child network_type=&#8221;facebook&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][ba_social_share_child network_type=&#8221;linkedin&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][ba_social_share_child network_type=&#8221;email&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][\/ba_social_share][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unsure what a cyber scam is? Learn and see how cybercriminals try to trick you with our guide for small businesses.<\/p>\n","protected":false},"author":36,"featured_media":297344,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>Tired of success? Sick to the back teeth with all talk of stability and strong cash flow? Dreading strong growth, healthy profits, and excellent brand recognition? Then listen up! It\u2019s time to run your business right into the dirt.<\/p><p>It\u2019s easy, let\u2019s get you started.<\/p><h2>1) Ignore reporting<\/h2><p>One of the best ways to ruin your business beyond repair is to ignore reporting. When you use business tools like accounting software to run reports on <a href=\"https:\/\/www.reckon.com\/au\/glossary\/cash-flow\/\">cash flow<\/a>, <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/starting-a-small-business\/what-is-and-how-calculate-cost-of-goods-sold\/\">COGS<\/a>, budget <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/starting-a-small-business\/budgeting-and-forecasting-for-small-businesses\/\">forecasting<\/a> and <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/bookkeeping\/managing-accounts-receivable\/\">accounts receivable<\/a>, you gain actionable insights through hard data.<\/p><p>Instead of steering your business on gut feel, running reports, and then taking the information onboard will help you make better business decisions. We can\u2019t have that.<\/p><h2>2) Neglect your website<\/h2><p>Old websites are good websites. If you really want to curb your capacity for growth and profits, you should never update your website.<\/p><p>Ensure you have:<\/p><ul><li>Slow speeds.<\/li><li>Terrible <a href=\"https:\/\/www.reckon.com\/reckon-blog\/basic-seo-checklist-for-dummies\/\">SEO<\/a>.<\/li><li>No <a href=\"https:\/\/www.reckon.com\/reckon-blog\/a-discussion-with-our-digital-marketing-manager-what-can-you-learn-for-your-own-business\/\">mobile-first strategy<\/a>.<\/li><li>Hard-to-navigate menus.<\/li><li>Woeful <a href=\"https:\/\/www.reckon.com\/reckon-blog\/lets-talk-about-branding-a-discussion-with-our-senior-digital-designer\/\">branding<\/a>.<\/li><li>No visible <a href=\"https:\/\/www.reckon.com\/reckon-blog\/the-importance-of-a-crm\/\">path to sales<\/a>.<\/li><li>Busy and cluttered pages.<\/li><\/ul><p>By keeping your website stuck firmly in the early 2000s you will make great progress in diminishing your business and becoming unappealing to customers.<\/p><h2>3) Don\u2019t ask for customer feedback<\/h2><p>Don\u2019t ever listen to your customers or request feedback. What would they know?<\/p><p>Understanding feedback leads to a deeper understanding of your client base and increases your capacity to <a href=\"https:\/\/www.reckon.com\/reckon-blog\/why-is-customer-service-the-top-priority-for-any-business\/\">make your customers happy<\/a>.<\/p><p>When you ask for feedback and then act on it to make changes to your business model, you may run the risk of making and retaining more customers and increasing your profits. Avoid at all costs, (as this will only make your business stronger and <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/resilience\/business-resilience-taking-care-of-yourself\/\">more resilient<\/a>.)<\/p><h2>4) Do it all yourself and never ask for advice<\/h2><p>Nobody knows more than you, so never ask for advice or consult with a business advisor. Business advisors are adept professionals, skilled in analysing your data and making sage suggestions on how to improve many facets of your business.<\/p><p>Business advisors and accountants can help you:<\/p><ul><li><a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/starting-a-small-business\/budgeting-tips\/\">Budget and forecast<\/a>.<\/li><li>Rejig your <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/business-plan-template\/\">business plan<\/a>.<\/li><li>Analyse <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/cashflow-forecast-template\/\">cash flow<\/a>.<\/li><li>Cut down on expenses.<\/li><li>Implement better <a href=\"https:\/\/www.reckon.com\/reckon-blog\/the-future-of-automation-in-small-businesses-predictions-and-trends\/\">workflows<\/a>.<\/li><li>Help with <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/single-touch-payroll\/stp-phase-2\/\">payroll<\/a> and taxes.<\/li><\/ul><p>Such professional advice and assistance will only lead to a healthier business geared toward growth.<\/p><h2>5) Leave everything until the last minute<\/h2><p>If you\u2019d like to generate a tight ball of stress in your chest and make hasty decisions, you\u2019re best off leaving everything until the very last minute. Wait until the final chance to do your:<\/p><ul><li>taxes<\/li><li><a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/bas\/\">BAS<\/a><\/li><li><a href=\"https:\/\/www.reckon.com\/au\/accounting-software\/payroll\/\">payroll<\/a><\/li><li><a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/inventory\/accounting\/\">stock orders<\/a><\/li><li><a href=\"https:\/\/www.reckon.com\/reckon-blog\/how-to-reach-your-customers-with-journeys-communications-and-campaigns\/\">customer communication<\/a><\/li><li>expense payments.<\/li><\/ul><p>If you plan and work toward getting tasks done with a calm mind and a chance to do things consciously and correctly, you\u2019re only going to run a tighter ship.<\/p><h2>6) Mix up your personal and business finances<\/h2><p>Another surefire way to erode your business is to muddle up your <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/business-finances\/benefits-of-decoupling\/\">personal and business finances<\/a>. By using business funds for personal purchases and paying for business expenses with personal accounts you\u2019ll generate a wild financial tangle.<\/p><p>This nest of interwoven finances will make it an absolute nightmare to tease out your real financial position and truly mess with your reporting and tax compliance. So, if you want to spend inordinate hours trying to <a href=\"https:\/\/www.reckon.com\/reckon-blog\/the-golden-rules-to-avoid-a-massive-tax-bill-as-a-sole-trader\/\">separate your business finances<\/a> down the track, go right ahead and make it nice and messy.<\/p><h2>7) Never adjust course<\/h2><p>If you want to run your ship into a reef, make sure you never adjust course.<\/p><p>There are a lot of successful business owners out there who keep a finger on the pulse, research the market, listen to feedback, and interpret data to adjust their offerings and business models.<\/p><p>These business owners tend to benefit from avoiding obsolescence and will make shifts to correspond to the changing tastes of their customers and prevailing market conditions.<\/p><p>If you want to see diminishing returns, however, don\u2019t be like them \u2013 just remain static.<\/p><h2>8) Create hostile relationships with your employees<\/h2><p>Another fantastic way to damage your business is to take employees for granted. It\u2019s often said that a business is <a href=\"https:\/\/www.reckon.com\/reckon-blog\/fruitful-staff-wellbeing-trends-you-can-activate-in-your-business-now\/\">only as good as its employees<\/a>, so take advantage of that and neglect your staff. Nothing will demotivate an employee faster than neglect.<\/p><p>A few ways to do this include underpayments, never giving praise or encouragement, fostering a negative <a href=\"https:\/\/www.reckon.com\/reckon-blog\/why-is-it-so-important-to-make-your-business-a-great-place-to-work\/\">work culture<\/a>, never offering <a href=\"https:\/\/www.reckon.com\/reckon-blog\/7-reasons-why-you-need-to-train-and-continue-educating-your-employees\/\">training or education<\/a>, deploying a harsh and unforgiving attitude, and having a general lack of respect. Your business will be suffering in no time!<\/p>","_et_gb_content_width":"","inline_featured_image":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[343],"tags":[],"class_list":["post-297338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to spot a cyber scam: A guide for small businesses | Reckon Blog<\/title>\n<meta name=\"description\" content=\"Unsure what a cyber scam is? Learn and see how cybercriminals try to trick you with our guide for small businesses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.reckon.com\/au\/blog\/cybersecurity-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to spot a cyber scam: A guide for small businesses | Reckon\" \/>\n<meta property=\"og:description\" content=\"Unsure what a cyber scam is? Learn and see how cybercriminals try to trick you with our guide for small businesses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.reckon.com\/au\/blog\/cybersecurity-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"Reckon\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/reckonhq\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-05T23:00:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-15T00:07:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/09\/How-to-spot-a-cyber-scam-header.png\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Oliver Gye\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ReckonHQ\" \/>\n<meta name=\"twitter:site\" content=\"@ReckonHQ\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Oliver Gye\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/cybersecurity-scams\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/cybersecurity-scams\\\/\"},\"author\":{\"name\":\"Oliver Gye\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/person\\\/b5625a73d7f24764f35bc6a9ec05d579\"},\"headline\":\"How to spot a cyber scam: A guide for small businesses\",\"datePublished\":\"2025-10-05T23:00:43+00:00\",\"dateModified\":\"2025-10-15T00:07:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/cybersecurity-scams\\\/\"},\"wordCount\":848,\"publisher\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/cybersecurity-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/How-to-spot-a-cyber-scam-header.png\",\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/cybersecurity-scams\\\/\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/cybersecurity-scams\\\/\",\"name\":\"How to spot a cyber scam: A guide for small businesses | Reckon Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/cybersecurity-scams\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/cybersecurity-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/How-to-spot-a-cyber-scam-header.png\",\"datePublished\":\"2025-10-05T23:00:43+00:00\",\"dateModified\":\"2025-10-15T00:07:36+00:00\",\"description\":\"Unsure what a cyber scam is? Learn and see how cybercriminals try to trick you with our guide for small businesses.\",\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/cybersecurity-scams\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/cybersecurity-scams\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/How-to-spot-a-cyber-scam-header.png\",\"contentUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/How-to-spot-a-cyber-scam-header.png\",\"width\":950,\"height\":500,\"caption\":\"ow to spot a cyber scam header\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#website\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/\",\"name\":\"Reckon\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#organization\",\"name\":\"Reckon\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/reckon-logo-yoast.png\",\"contentUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/reckon-logo-yoast.png\",\"width\":300,\"height\":237,\"caption\":\"Reckon\"},\"image\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/reckonhq\\\/\",\"https:\\\/\\\/x.com\\\/ReckonHQ\",\"https:\\\/\\\/www.instagram.com\\\/reckonhq\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/reckon\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/Reckonltd\\\/\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Reckon_(company)\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/person\\\/b5625a73d7f24764f35bc6a9ec05d579\",\"name\":\"Oliver Gye\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Aliver-Gye-150x150-1.png\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Aliver-Gye-150x150-1.png\",\"contentUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Aliver-Gye-150x150-1.png\",\"caption\":\"Oliver Gye\"},\"description\":\"Content Writer Oliver Gye is a content writer and publisher who is passionate about creating engaging content for the small business community. He specialises in UX, business support &amp; compliance, and small business journalism in fintech and accounting.\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/author\\\/oliver-gye\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to spot a cyber scam: A guide for small businesses | Reckon Blog","description":"Unsure what a cyber scam is? Learn and see how cybercriminals try to trick you with our guide for small businesses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.reckon.com\/au\/blog\/cybersecurity-scams\/","og_locale":"en_US","og_type":"article","og_title":"How to spot a cyber scam: A guide for small businesses | Reckon","og_description":"Unsure what a cyber scam is? Learn and see how cybercriminals try to trick you with our guide for small businesses.","og_url":"https:\/\/www.reckon.com\/au\/blog\/cybersecurity-scams\/","og_site_name":"Reckon","article_publisher":"https:\/\/www.facebook.com\/reckonhq\/","article_published_time":"2025-10-05T23:00:43+00:00","article_modified_time":"2025-10-15T00:07:36+00:00","og_image":[{"width":950,"height":500,"url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/09\/How-to-spot-a-cyber-scam-header.png","type":"image\/png"}],"author":"Oliver Gye","twitter_card":"summary_large_image","twitter_creator":"@ReckonHQ","twitter_site":"@ReckonHQ","twitter_misc":{"Written by":"Oliver Gye","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.reckon.com\/au\/blog\/cybersecurity-scams\/#article","isPartOf":{"@id":"https:\/\/www.reckon.com\/au\/blog\/cybersecurity-scams\/"},"author":{"name":"Oliver Gye","@id":"https:\/\/www.reckon.com\/au\/#\/schema\/person\/b5625a73d7f24764f35bc6a9ec05d579"},"headline":"How to spot a cyber scam: A guide for small businesses","datePublished":"2025-10-05T23:00:43+00:00","dateModified":"2025-10-15T00:07:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.reckon.com\/au\/blog\/cybersecurity-scams\/"},"wordCount":848,"publisher":{"@id":"https:\/\/www.reckon.com\/au\/#organization"},"image":{"@id":"https:\/\/www.reckon.com\/au\/blog\/cybersecurity-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/09\/How-to-spot-a-cyber-scam-header.png","articleSection":["Insights"],"inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/www.reckon.com\/au\/blog\/cybersecurity-scams\/","url":"https:\/\/www.reckon.com\/au\/blog\/cybersecurity-scams\/","name":"How to spot a cyber scam: A guide for small businesses | Reckon Blog","isPartOf":{"@id":"https:\/\/www.reckon.com\/au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.reckon.com\/au\/blog\/cybersecurity-scams\/#primaryimage"},"image":{"@id":"https:\/\/www.reckon.com\/au\/blog\/cybersecurity-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/09\/How-to-spot-a-cyber-scam-header.png","datePublished":"2025-10-05T23:00:43+00:00","dateModified":"2025-10-15T00:07:36+00:00","description":"Unsure what a cyber scam is? Learn and see how cybercriminals try to trick you with our guide for small businesses.","inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.reckon.com\/au\/blog\/cybersecurity-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.reckon.com\/au\/blog\/cybersecurity-scams\/#primaryimage","url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/09\/How-to-spot-a-cyber-scam-header.png","contentUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/09\/How-to-spot-a-cyber-scam-header.png","width":950,"height":500,"caption":"ow to spot a cyber scam header"},{"@type":"WebSite","@id":"https:\/\/www.reckon.com\/au\/#website","url":"https:\/\/www.reckon.com\/au\/","name":"Reckon","description":"","publisher":{"@id":"https:\/\/www.reckon.com\/au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.reckon.com\/au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.reckon.com\/au\/#organization","name":"Reckon","url":"https:\/\/www.reckon.com\/au\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.reckon.com\/au\/#\/schema\/logo\/image\/","url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/05\/reckon-logo-yoast.png","contentUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/05\/reckon-logo-yoast.png","width":300,"height":237,"caption":"Reckon"},"image":{"@id":"https:\/\/www.reckon.com\/au\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/reckonhq\/","https:\/\/x.com\/ReckonHQ","https:\/\/www.instagram.com\/reckonhq\/","https:\/\/www.linkedin.com\/company\/reckon\/","https:\/\/www.youtube.com\/user\/Reckonltd\/","https:\/\/en.wikipedia.org\/wiki\/Reckon_(company)"]},{"@type":"Person","@id":"https:\/\/www.reckon.com\/au\/#\/schema\/person\/b5625a73d7f24764f35bc6a9ec05d579","name":"Oliver Gye","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/09\/Aliver-Gye-150x150-1.png","url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/09\/Aliver-Gye-150x150-1.png","contentUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/09\/Aliver-Gye-150x150-1.png","caption":"Oliver Gye"},"description":"Content Writer Oliver Gye is a content writer and publisher who is passionate about creating engaging content for the small business community. He specialises in UX, business support &amp; compliance, and small business journalism in fintech and accounting.","url":"https:\/\/www.reckon.com\/au\/author\/oliver-gye\/"}]}},"modified_by":"Oliver Gye","_links":{"self":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/posts\/297338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/comments?post=297338"}],"version-history":[{"count":0,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/posts\/297338\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/media\/297344"}],"wp:attachment":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/media?parent=297338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/categories?post=297338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/tags?post=297338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}