Dell Technologies
BMS-center-logo
 

 

By Debbie Gregory.

LinkedIN Debbie Gregory VAMBOA VAMBOA Facebook VAMBOA Twitter

 

We hope that you have found the prior article on Business Loan Scams helpful.   It so important to be aware so you and your Small Veteran Owned Business do not fall prey to a scammer.  Remember that scammers often will contact you online or by phone.  Below we will provide you additional types of Business Loan Scams.

  • Ghost Investors: You can receive a call about a “potential investor” lined up to provide you huge amounts of funding immediately and asking for a transaction fee.   Keep in mind when anything sounds to good to be true, it usually is a scam.  Ghost investors are more of a con trying to go after those who might be in the market for business loans and/or funding.   The scammer will act as the “agent” for a large investor, foundation, angel investor or fund who wants to give you money and make an investment in your business.

They are not too interested in hearing your plan or ideas but want to collect your private financial information online such as your social security number or tax identification number for your business.   They will say they need this private information to conduct a background check.  They also will try to obtain an advance fee of some type from you.  They want to hook you and then do a double whammy of taking your personal information and obtaining your money in advance fees.   Legitimate investors take a considerable amount of time to investigate you and they do not ask for fees.

  • Loan Broker Swindlers: These scammers will promise to connect you with a reputable lender in the role of consultant of sorts.   They want your sensitive information and advance fees.

Yes, there are legitimate loan brokers out there, but the real ones will not ask you to pay upfront for their services.   Most ethical loan brokers work on a commission basis and are not paid their commission until the deal closes.  Please beware of any loan brokers who ask for their fees upfront.  If someone wants to buy your business or make a loan, there is a process and it should not cost you upfront.

  • After Financing Business Loan Scams: Stay alert because after you have your loan, there are scammers who will come out of the woodwork.  Below are some of the scams after you obtain your loan:
  1. Debt Relief Scam: It usually goes like this: “If you are struggling with loan payments, get out of debt with affordable monthly payments and we guarantee 48-hour approval”.   The target are people who have trouble keeping up with their loan payments.  The scammer often promises to significantly cut your loan payment or forgive all or part of it.  Once again, they will try to obtain your sensitive information and even your bank account info.   Anyone who promises you a “guaranteed approval” is usually not legitimate.  Again, they will try to obtain upfront fees.  If you are struggling with payments, talk with your existing lender and determine if you can revise the loan so the payments are more affordable.
  2. Debt Collection Schemes: This is when debt collectors harass you, make threats of arrest and try to use fear to obtain money from you.    Collectors are regulated by law.  At the end of the day, they want to work out a plan with you and are not allowed to make threats.  If you feel threatened, it probably is not a legitimate collector.

There are many ways that hard working small business owners can be tricked by scammers and con artists.  We urge you to be on the lookout for the following:

  • Unsolicited Contact
  • Non-Traditional Advertising
  • Upfront Money Requested
  • Lack of a Physical Address
  • Generic Email Address
  • Guaranteed Approval
  • High-Pressure Sales Tactics
  • Too Good to be True

If you or someone you know becomes the victim of a business loan scam, below are a list of things you can do:

  • Report to the Consumer Financial Protection Bureau (CFPB)
  • Call local police
  • Report identity theft
  • Contact local credit bureaus

We urge you to be on the alert to avoid business loan scams.  As we previously stated, knowledge is power.  Take your time and confirm that you are dealing with legitimate sources.

If you are interested, we invite you to join VAMBOA.   There are not any fees or dues charged to members.  We will also allow members to use the VAMBOA seal on their collateral and website.  If you want to join, below is a link to register:

https://vamboa.org/member-registration

 

By Debbie Gregory.

LinkedIN Debbie Gregory VAMBOA VAMBOA Facebook VAMBOA Twitter

 

VAMBOA, the Veterans and Military Business Owners Association, believes that knowledge is power and will protect you.  For this reason, we are bringing you this two-part article mini- series on Business Loan Scams.  Please be cautious.

As the owner of a small Veteran Owned Business, you need to be on the alert for business scams, especially those related to access to capital and loans.   There have been more scams than ever with the growth of online alternative loans that allow small business owners to access the funds they need.  Unfortunately, this creates opportunities for Internet scammers.   Various surveys have found that almost seventy percent of small businesses feel there is a greater risk of scams now compared to a few years ago.   In 2016, marketplace scams accounted for the loss of $50 billion dollars alone.

Many online and legitimate lenders have been invaluable to small business owners.   However, many hackers are running business loan scams preying on the needs of small business owners for quick and affordable capital.   They attempt to steal your money, personal information, business information by pretending to be legitimate lenders or small business loan brokers.   The good news is that there are ways to identify these business loan scams and avoid them.  If you should fall victim to a scam, you should know how to report it.

Most scammers will attempt to contact you online via email, phone, texts, direct mail, websites or search engine ads.  You must be cautious whenever anyone asks for money, personal information or your business information.  Below are a list of business scams to avoid when applying for financing:

  • Advance Fee Scams:  This is when an individual or company promises easy access to low-cost debt in exchange for an upfront payment. It will include terms such as “zero interest, no credit or bad credit works, no fees, etc.”  The scammer may reference the upfront fee as a “processing fee” or a “one-time fee”.  The goal of the scammer is to get your money before approving you for this likely fictitious loan.

Advance Fee Scams are one of the most common and popular scams.  They entice the borrower by promising that anyone can qualify.  Most legitimate lenders have requirements.  The lower one’s credit score, the higher interest they will have to pay in the real world.   Often legitimate lenders do charge some upfront fees such as application fees or fees to do your credit report so you must be careful.

  • Peer Lending Scams: Have you ever seen a message on Craigslist, FB Messenger, Reddit or other places that says: “Low-interest loans up to 100K.  Low credit scores and bankruptcy is not a problem”?   Often, these are scams.   There are credible peer-to-peer lenders with thousands of investors who pool together and purchase loans or parts of loans that meet their criteria.   Instead of a bank, think of it as dozens of lenders working collectively.

Typical peer lending scams often resemble advance fee scams.   These peer lending scammers will also ask for some type of upfront fee or they might also be after sensitive personal information.  Beware because they can also steal your identity.  Never ever use a money wiring services for a business loan and never make any payment in advance.

  • Funding Kit Scams: Some unscrupulous online loan providers want you to believe that obtaining a business loan is so complicated, you need to pay them to walk you through the process. This is a scam!    The scammers might offer offers to obtain government grants or inside tips or tricks and offer to provide you information for a fee.

All of the information that you need to obtain a loan is easily found online and there are not any fees to use this information.  When you see words such as “free” and government grants”, it is time to run for the heels.    If you have questions that you cannot find online, ethical, and real lenders are more than happy to answer these questions without charging you a fee.  If anyone asks you to pay for information to obtain a grant or loan, it is likely they are trying to scam you.

  • Credit Repair Scams: Have you ever heard offers to increase or improve your credit score by at least 100 points in a short timeframe.  Or perhaps it the offer is to wipe out your bad credit, etc.  When you are trying to obtain a small business loan, your credit history is the most important part of your financial record and used by lenders to make qualifying decisions.

You do not need to pay anyone if you want to challenge or dispute something on your credit report.  You can do this yourself and it is free.   Be wary of anyone wanting to charge you upfront fees to improve and remove negative information from your credit report.   Do not feel pressured and keep in mind that there are a multitude of legitimate lenders willing to work with you even if you have a low credit number or a brief credit history.

VAMBOA hopes that our small veteran and military business owners have enjoyed this first article.   Stay tuned for Part 2 with more Business Loan Scams.  We also want to invite you to become a member of VAMBOA.  There are not any fees or dues and you can use our seal on your collateral and website.  If you want to join, please register here:  https://vamboa.org/member-registration/

Common Small Business Cyber Attacks

Share this Article:
Share Article on Facebook Share Article on Linked In Share Article on Twitter

 

By Debbie Gregory.

LinkedIN Debbie Gregory VAMBOA VAMBOA Facebook VAMBOA Twitter

 

 

Let us begin with a frightening statistic!  Do you know that every three- and one-half seconds brand new cybersecurity threats arise?  Small businesses are typically the targets for these threats as they typically do not have strong cybersecurity practices. This article will review where the most common threats come from so you can be forewarned and forearmed.

1.)  Passwords:

A hacker with your password can access any of your private information and data. Hackers learn these passwords in a variety of ways.  The most common way is called a “brute force attack.” These types of attacks utilize specially designed bot programs that generate and try every possible combination of letters, symbols, and numbers out there to obtain your information.

How can you protect against this type of attack?

Creating and using a unique password of upper and lowercase letters that is at least ten characters long can substantially slow down these brute force program attacks. It can take them years to find your password if it is more complex.  It is also important that you do not use the same password over and over and you frequently change your passwords.

2.)  Phishing

Phishing is a technique used to trick people into willingly handing over their information to a hacker. These types of attacks target all types of personal data including, but not limited to passwords, bank account numbers, credit card numbers, Social Security numbers, and more.

How are these types of attacks performed?

Usually a hacker will pose as a reputable source asking their victim to allow them access to their computer or to click a specific link. They impress upon their victims that the reason for doing so is incredibly important and they must provide key personal information. These types of attacks happen via phone, email, and text message.  Often, they have what appears to be a legitimate email address but when you really look at it, you will see they are not who they pretend to be.   Be on the alert and never ever click on a link or open a document from someone you do not know or a generic email address because they are after your personal information.

3.)  Pharming:

Pharming is the term for website spoofing. In this type of attack, the hacker has compromised the naming system in the website’s server so that a visitor to the legitimate site is instead redirected to a fraudulent one. Once on the fraudulent site, the victim is prompted to provide their sensitive data, such as a credit card number or Social Security number.

4.) Malware

Malware is malicious software that is specifically designed to gain access to or to cause damage to a device. The goal is usually stealing personal data such as passwords, bank account numbers, credit card numbers, Social Security numbers, and more. Malware comes in many forms from adware to spyware to Trojan horses. All are extremely dangerous.

These are only a few of the potential risks your business faces. Other common attacks include point-of-sale hacks, drive-by-downloads, and ones that are so new they haven’t even been named yet. The best thing you can do is to take the time and effort to create and enforce strong cybersecurity policies. Stay on top of what is happening in the world of cybersecurity and help protect yourself, your employees, and your business.

 

By Nick Porter – Guest Blogger

 

Whatever industry you’re in, having a strong online presence is vital to any business hoping to grow to its fullest potential, and in many cases, it’s necessary to operate. To that end, much like you need to protect physical business assets, you need to protect your online presence as well. People care and will check if your website is safe. Cybercriminals are constantly operating, and they are usually organized.

While cybersecurity is a complex topic, here is some of the basic information you can use to get started protecting your online presence:

The Human Factor

When running a business, the absolute most important thing to remember about cybersecurity is that human error is responsible for the vast majority of successful cyberattacks. Whether it’s lax security, mixing personal and business accounts, or other common lapses in judgment, hackers use social engineering techniques far more often than the type of brute force hacking you might first think of.

You need to make sure your staff is trained and remember that the weakest link in the chain is going to be the one that causes issues. As easy as it might seem to let things go at some point, it won’t be easy to deal with the fallout of a data breach.

 

Lock Down Your Website

Depending on your business and website, it could have valuable information attached to it or have accounts related. Many websites are different, and so specific recommendations here as to how to best secure your site wouldn’t be effective. However, you should invest in an SSL certificate, use tools or plugins to secure your website (and update them), and check for potential exploits.

 

Implement Strict and Formal Policies

Related to the importance of reducing human error is the fact that businesses that have a formal cybersecurity plan (for both prevention and response) will be less susceptible and less damaged by cybersecurity threats. Take some time to develop it with whoever is on your IT team, and make sure everyone is on the same page once it is complete.

 

Common Threats

Here are some of the most common threats and issues you or your team may encounter:

  • Phishing Scams: Either through email or phone (or on occasion other methods), a scammer will attempt to get login or other information out of you or one of your team members, and then either use it against your system or for profit. This is where having strict cybersecurity pol
  • Malware: If you don’t have proper firewalls and cybersecurity suites installed on office computers, malware can cause a wide range of malicious effects, ranging from stealing data to slowing down (or even ruining) your computers. Instruct employees to stay off of suspicious sites and be careful of unknown files.
  • Ransomware: A specific type of malware that will hold a device or data hostage until you send money. Never pay those responsible what they want under any circumstances.
  • DDoS Attacks: Effectively, hackers, through various means, can try to overload requests to your server. It’s unlikely for a business to be a victim but know that data is relatively safe (even if your business is disrupted).
  • SQL Injection Attacks: An injection of code into your website that exploits a vulnerability on your website. These types of attacks can affect your site, allow hackers to access data, and more.

 

Update and Adapt Regularly

Cybercriminals and cybercriminal organizations are regularly going to use new social engineering tactics and tools, and as such you need to adapt regularly and keep abreast of what you should look out for. Learn about recent common scams, update your applications and security programs, and review your business cybersecurity strategy at least every six months.

 

Conclusion

In some ways, this article is only breaching the surface when it comes to cybersecurity for your business, but you must start with the basics and the important tasks listed above. The sooner you get these items taken care of, the sooner you can settle into a routine for it and otherwise focus on growth and the other things that matter. We hope that this information proved useful and wish you success in your future endeavors.

 

An additional source for your online security:

https://www.broadbandsearch.net/blog/how-to-tell-website-safe-legitimate

 

Nick Porter is a writer and blogger who is especially interested in Cyber Security and Digital Marketing.  Sharing his knowledge to help his readers be more productive with social media and SEO brings him great joy! He also enjoys educating readers on more effective online security controls.

IBM