
April 1 comes and goes. The fake announcements, harmless pranks, and joke emails fade away, and everything goes back to normal.
Scammers, unfortunately, don’t get the memo.
Spring is one of the most productive seasons for cybercrime. Not because teams are careless, but because everyone is busy, moving fast, and juggling priorities. When workdays are packed, even smart, well‑intentioned people can miss subtle red flags — especially when something looks routine, believable, and urgent.
That’s exactly what today’s scams rely on.
Below are three attacks circulating right now. They don’t target “gullible” users. They work on capable employees who are just trying to get through their day.
As you read, ask yourself one honest question:
Would everyone on my team pause long enough to catch each one?
Scam #1: The Toll Road (or Parking Fee) Text
An employee gets a text message:
“You have an unpaid toll balance of $6.99. Pay within 12 hours to avoid late fees.”
The message names a real toll system — E‑ZPass, SunPass, FasTrak — matched perfectly to the state they’re in. The amount is small. The tone is urgent but not alarming.
They’re between meetings, so they tap the link, pay, and move on.
Except the link wasn’t real.
The FBI received more than 60,000 complaints about fake toll text scams in 2024, and reports increased by over 900% in 2025. Researchers have identified tens of thousands of fake domains created specifically to impersonate state toll agencies — a clear sign of just how profitable this scam has become. Some messages have even reached people in states without toll roads at all.
Why it works is simple:
Six dollars doesn’t feel risky. Most people have driven recently. The message feels familiar enough to trust.
The guardrail that helps:
Legitimate toll and parking agencies do not demand immediate payment via text message links.
Smart organizations make this a rule: No payments through text-message links. Ever.
If something might be real, employees navigate directly to the official website or app on their own. They never reply to the message — not even “STOP” — because responding confirms the number is active and invites more scams.
Convenience is the bait. Process is the defense.
Scam #2: “Your File Is Ready”
This one blends perfectly into everyday work.
An employee receives an email saying a document has been shared with them — a contract in DocuSign, a spreadsheet in OneDrive, or a file in Google Drive.
The sender’s name looks right. The formatting is familiar. It looks exactly like dozens of legitimate file‑share notifications they’ve already seen that week.
They click the link. A login screen appears. They enter their work credentials.
Now someone else has them.
This type of attack has surged. Phishing campaigns that abuse trusted platforms like Microsoft, Google Drive, DocuSign, and Salesforce increased dramatically in 2025. Employees are far more likely to click links from OneDrive or SharePoint than from random emails because the notifications look legitimate — and often are.
Newer versions are even harder to spot. Attackers compromise a real account, create a file inside that environment, and use the platform’s own sharing feature. The email comes directly from Microsoft’s or Google’s servers, so spam filters don’t flag it.
Technically, it is a legitimate notification — just for a malicious file.
The guardrail that helps:
If a file share wasn’t expected, employees are trained not to click the link in the email.
Instead, they open their browser and log into the platform directly. If the file is legitimate, it will be there. Organizations also reduce risk by limiting external file‑sharing permissions and enabling alerts for unusual login activity — two configurations most IT teams can implement quickly.
It’s a boring habit.
It’s also extremely effective.
Scam #3: The Email That’s Written Too Well
Remember when phishing emails were easy to spot? Broken grammar, odd formatting, messages that barely made sense.
Those days are over.
Academic research in 2025 found that AI‑generated phishing emails achieved click rates more than four times higher than human‑written attempts. These messages don’t look suspicious. They reference real companies, real job titles, and real workflows — often pulled directly from LinkedIn and company websites in seconds.
The most effective versions are department‑specific.
HR teams receive fake employee verification requests.
Finance receives vendor payment change notices.
In recent testing, vendor impersonation emails saw engagement rates far higher than generic phishing attempts. The tone is calm, professional, and just urgent enough to bypass hesitation. They look like an ordinary Tuesday morning.
The guardrail that helps:
Any request involving credentials, payment changes, or sensitive data is verified through a second channel — a phone call, a chat message, or an in‑person conversation.
Employees are trained to hover over the sender’s email address to verify the actual domain and to treat urgency itself as a warning signal.
Real security doesn’t rely on panic.
It relies on verification.
What This Really Comes Down To
These scams all use the same ingredients: familiarity, authority, timing — and the assumption that “this will only take a second.”
The real risk isn’t careless people.
It’s systems that rely on everyone always slowing down, double‑checking, and making perfect decisions under pressure.
If one rushed click could derail your day, that’s not a people problem.
It’s a process problem.
And process problems are fixable.
How We Can Help
Most business owners don’t want another project — or to become the person reminding everyone what not to click.
They just want confidence that their business isn’t quietly exposed.
If you’re wondering what your team might be dealing with — or you know another business owner who probably should be — we’re happy to have a straightforward conversation.
During a no‑pressure discovery call, we’ll talk through:
- The types of risks businesses like yours are seeing right now
- Where threats tend to slip into normal, everyday workflows
- Practical ways to reduce exposure without slowing people down
No scare tactics. No jargon. Just clarity.
Call us at 707-205-3727 or book a quick discovery call here.
And if this isn’t for you, feel free to forward it to someone who’d appreciate the heads‑up.
Sometimes knowing what to look for is all it takes to turn a “would have clicked” into a “nice try.”



