Knowledge Center

Tips to Protect Yourself from Social Engineering Like Romance Scams

keeping-my-information-safe | Read Time: 3 minutes

By Robert Eastwood | Published: May 2023

Love is in the air as wedding season heats up alongside the weather.

But if you’re the unlucky victim of social engineering, which is when scammers manipulate their victims psychologically to get them to provide sensitive information, you may be left with more than just a broken heart.

One type of social engineering in particular, romance scams, cost victims $1.3 billion in 2022, according to the Federal Trade Commission, so it is vital to remain vigilant of social engineering tactics.

What is a Romance Scam?
In these scams:

  • Scammers learn about you via publicly available information from social media and other apps.
  • Then they create a fake identity and contact you via social media or dating apps.
  • Romance scammers work to build trust and a “loving” relationship with victims. These scams tend to be long and drawn out, with scammers communicating with victims for months, but finding reasons why they can’t meet in person or video chat, such as being abroad for work or in the military, having poor internet connection or a broken camera, to avoid you finding out their profile photos are not actually them.
  • Then they ask for money to help with things like medical bills or paying their rent because they’re short that month, or even for an investment in their “business venture.”
  • Asking for money through gift cards or cryptocurrency payments are other red flags.

How Can I Protect Myself from Romance Scams?
It is important to:

  • Use social media and dating sites with caution and never overshare personal information until you’ve met in person and established sincere trust.
  • Mark your social media profiles as private, only accept connection requests from those you know and hide your friend lists where possible.
  • If you’re suspicious of the person you’re communicating with, reverse image search their profile photos on Google to identify if their photos are used elsewhere, like a profile with an entirely different identity.
  • Never send money to someone you don’t know personally or haven’t met in person.

What to Do If You’re the Victim of Fraud
If you’ve been scammed:

  • File a police report and an identity theft report with the Federal Trade Commission immediately.
  • Contact your financial institutions to freeze your accounts, get new account numbers and debit/credit cards, and take a close look at your statements to report any fraudulent charges.

Sometimes love hurts. But with the proper vigilance, you can avoid a romance scam and ensure it doesn’t hurt your pocketbook too.

About the Author – Robert Eastwood
Robert Eastwood is Senior Vice President, Chief Information Security Officer at WSFS Bank. He has more than 24 years of experience in the information security field, including nearly 20 years at WSFS, most recently as Vice President, Information Security Officer, where he developed and executed a multi-year strategic plan for Information Security. He also holds a number of professional certifications and memberships in the Information Services, IT and financial services fields.



CISO Perspective: Tips to Protect Yourself from Check Fraud

CISO Perspective: Tips to Protect Yourself from Check Fraud

Fraud has continued to rise in recent years, with the Federal Trade Commission reporting that consumers lost nearly $8.8 billion to fraudulent schemes in 2022, a 30% increase from the year prior. Figures reported by the U.S. Treasury Department’s Financial Crimes Enforcement Network (FinCEN) indicate check fraud has risen significantly recently, with a whopping 239% increase in incidents between 2020 and 2022.

Read More
CISO Perspective: Tips to Avoid Tax Scams

CISO Perspective: Tips to Avoid Tax Scams

Tax season is underway, and after a year with soaring inflation and rising interest rates, many consumers are looking forward to a tax refund to help cover their expenses. Unfortunately, fraudsters have been known to target tax season for various scams looking to make a quick buck from unsuspecting victims.

Read More
CISO Perspective: How to Safely Use Peer-to-Peer Payments

CISO Perspective: How to Safely Use Peer-to-Peer Payments

Peer-to-Peer (P2P) payment platforms such as Zelle®, Venmo, PayPal and CashApp have continued to rise in popularity in recent years, and for good reason. These platforms can make it quick and simple to transfer money to friends and loved ones without the need to visit your bank, an ATM or cut a check. While P2P payments can help streamline your finances, it is important to use them properly to avoid falling victim to fraud.

Read More
CISO Perspective: Tips to Secure Your Devices

CISO Perspective: Tips to Secure Your Devices

Have you ever lost your smartphone or tablet, or maybe even your laptop? Have any of them ever been stolen? It’s certainly not a good feeling. The number of mobile devices lost or stolen each year is in the millions. Sure, it's easy enough to get a replacement. Sure, they can be expensive to replace, but have you ever thought about the true value that device is worth?

Read More
CISO Perspective: Password Health Check

CISO Perspective: How to Perform a Password Health Check

How safe are my passwords? How do I know if my passwords have been leaked? These are questions I get asked a lot. More and more hackers are using leaked passwords to log into websites and apps that you use. They may make purchases, or they may use the information they gather to sell on the dark web or to scammers.

Read More