Pretty much everyone I know has noticed the same thing: scams are multiplying. Phone calls, texts, emails — whatever your channel of choice, attackers are working overtime.
But here’s the good news: you don’t have to be an easy target. Staying scam-resistant isn’t about memorizing every new trick. It’s about shifting your mindset and building habits that make you harder to manipulate.
Step 1: Become Unmanipulatable
Scams are just social engineering in disguise. Attackers try to hijack your emotions—panic, fear, urgency—so you’ll make a snap decision. The fastest defense? Refuse to play.
Don’t panic when a text claims the IRS is after you.
Don’t believe a random message saying your loved one’s been kidnapped.
Don’t assume the worst just because someone says “urgent.”
In your calm moments, you already know these aren’t real. Pause, breathe, and recognize when someone is trying to shove you off balance. That pause is your power.
We wrote more about this in Screencap and Send: A Simple Scam Stopper.
Step 2: Become Invisible
The more of your data floating around online, the bigger your target. Attackers buy, sell, and trade your info—then use it to personalize their scams.
Cleaning up your data footprint shrinks your exposure and makes scams easier to spot. Tools like DeleteMe have slashed my own scam texts dramatically. (If this sounds good to you, use this link for 20% off.)
For more on reducing your digital trail, check out:
Step 3: Become Resilient
Scam-proofing works better with backup. When you’re not sure, send a screencap to a friend. (That’s the whole idea behind Screencap and Send.) Sometimes, all it takes is a second pair of eyes to see through the smoke and mirrors.
Now, we’re taking that idea further with the brand-new Scam Database from CybersecuriTea —a community-powered archive where you can see the scams others are getting and realize you’re not alone in the deluge.
Each entry in the Scam Database is designed to be quick and clear. You’ll see:
Category (text, email, phone call, etc.)
Type (phishing, fake recruitment, gift card hustle, and so on)
Content (the exact wording or screenshot of the scam)
How it usually works (the attacker’s playbook)
What to do (practical steps to shut it down)
Think of it as a living library of scam tactics: easy to search, skim, and share when something sketchy lands in your inbox.
Bringing It Together: Scam Spotter
Want to pitch in? Head to our Scam Spotter Submission Form. Drop in the type of scam (email, phone, text), when it happened, and anything else worth noting. (Plus, we’re planing on featuring fresh scams in every newsletter, so if you’d like credit for your submission, there’s a space for that as well!)
By sharing, you’re not just protecting yourself. You’re helping the whole community stay one step ahead.
Scroll down to get a preview of this week’s database entries. ⬇
Fresh scams in the database
Join us for tea!
CybersecuriTea is a free, plain-English guide to digital safety, designed for families, friends, and the folks you love. Subscribe today and get weekly tips to help keep your digital life secure.
Or, if you’d like to support our work and keep the kettle warm for everyone:
Issue # 15
This content may contain affiliate links. If you choose to sign up or make a purchase through them, we may earn a small commission, at no additional cost to you. Thank you for supporting CybersecuriTea.