Blog

If “Google” Charges You for a Business Profile, You’re Being Scammed

If “Google” Charges You for a Business Profile, You’re Being Scammed

Let me ask you a question: how much did you pay Google for your Business Profile? Unfortunately, if the answer was anything other than “nothing,” you’ve been scammed. Google has actually announced that they are taking legal action against scammers who impersonated the company in order to defraud small businesses.

Let’s examine what Google said in their announcement, and what it means your business should be doing.

Google is Going After Scammers Trying to Charge Businesses for Business Profiles

First of all, a Google Business Profile is completely free for business owners to claim and use to share information about their organization. That’s just a fact.

Therefore, if someone calls you and claims to be Google, offering to assist you with your Business Profile for a fee, they are attempting to scam you.

This problem has gotten bad enough that Google is actively stepping in as a part of its ongoing efforts against scams. Their theory is that, by publicizing these scams and taking legal action against them, they are both deterring would-be scammers and raising awareness with the public about these threats. According to Google’s blog post about these kinds of scams, they were able to stop 12 million scammers from creating fake Business Profiles, and another 8 million attempts to fraudulently claim Business Profiles.

Let’s be clear—Google charges you absolutely nothing to create a business profile on their search platform. Why would they? Creating one is mutually beneficial for you and them. On your end, you make it easier for clients to find and learn more about your business, and on Google’s end, their search engine becomes that much more useful for searchers. That’s a win-win!

So, if “Google” ever reaches out to you and attempts to sell you a Business Profile, it’s pretty clearly a phishing scam—a scam where an attacker pretends to be someone else.

How to Spot Phishing Scams

Make no mistake: phishing scams can appear to come from anyone…Google, your mother-in-law, one of your vendors, the government. Fortunately, there are a few core best practices that you can follow that help you to catch these attempts.

Watch for Urgency: Keep an eye out for emotional language, particularly when it supposedly comes from a business entity. Urgency is a basic tool that a scammer will use to put you in an emotional, irrational state. Don’t let them fool you.

Check the Details: So, “Google” reaches out to tell you that you should pay for their assistance in setting up your Business Profile. Don’t hesitate to look up the Google Business Profile page (which, incidentally, clearly states that the Business Profile is free) to confirm (or, in this case, deny) the claims you’re being pitched.

Don’t Give Them the Satisfaction: If you’ve confirmed that a message or a call is a scam, just end the conversation. If it was legitimate, the person will probably understand that you were just doing your due diligence for cybersecurity.

We’re Here to Help Your Business Securely Reach Maximum Productivity

Reach out to White Mountain IT Services at 603-889-0800 to find out what we can do to help your business accomplish more.

Related Posts

For many years now, there’s been a bit of a fear of AI—artificial intelligence—in the workplace, all while it has been put into practical use more and more often in many businesses. This all ties back to the work of Alan Turing, who (amongst his acco...
For a long time, businesses that didn’t have any cybersecurity problems would never consider investing in additional cybersecurity tools. The decision-makers of these companies simply didn’t find it necessary; and many of them had a point (until they...
Simple passwords are often the bane of a business’ existence. If you routinely use strings like Password, 123456, Guest,  or Qwerty to secure an account, then you need to reexamine your password practices before they lead to a data breach. A goo...
While many small businesses shrug off cybersecurity needs as too expensive an investment for an organization of their size, this is a potentially catastrophic mistake. The fact of the matter is that small businesses are regularly targeted by cyberatt...
One of the big advantages that Mac computers have had over the traditional PC is that they “don’t get viruses,” but how true is this claim, really? Research conducted by Elastic Security Labs proves that this is certainly not the case, discrediting t...
We get it—nobody likes to think about the prospect of being impacted by a cybersecurity incident, but it’s like any other unpleasant event in that it is best to prepare for it. In fact, today’s businesses can invest in a cyber insurance policy to hel...
Countless jokes have been made in the IT world about the perfect place to hide something being page two of Google—just hang out with some IT professionals, and there’s a good chance you’ll hear it. Unfortunately, Google is making a change to its sear...
With so many threats out in the world, it’s no surprise that some of them target undiscovered vulnerabilities. These types of threats use what are called zero-day exploits to make attempts at your sensitive data and technology infrastructure. What is...
It’s always good when a business looks to improve itself by adding new technology. This process can be immensely fruitful, but it can also go the other way and become costly time-sinks. Let’s take a look at what makes new IT projects such a volatile ...
If you become the victim of a hacking attack today, how would the hackers go about it? Would they try to find vulnerabilities in your network and infrastructure? You need to do what you can to answer the questions surrounding the strength of your exi...
Passwordless authentication has been increasingly spoken of in favor of the typical password-based method, and is gaining traction the more it is talked about. Google recently took steps toward passwordless that we felt warranted some discussion....
With countless threats out there waiting for IT professionals to slip up, it’s no small wonder that many of these professionals are opting into what is called a zero-trust policy for their security standards. So, what exactly is a zero-trust policy, ...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our offices in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.

 

Onsite Computer Support Services are available to businesses within 60 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem NH and Portsmouth NH area.

White Mountain IT Services

 


33 Main St, Suite 302
Nashua, NH 03064

 


121 Riverfront Drive
Manchester, NH 03102

 

Client Help Desk      603-889-2210

New Client Inquiries   603-889-0800

Open Positions