Recognize

**In the face of COVID-19, many small businesses are looking for help from the CARES Act’s Paycheck Protection Program. They may apply for PPP loans with eligible Paycheck Protection Program lenders from the Small Business Administration (SBA). Find eligible Paycheck Protection Program lenders.**

Red Flags of a Business Loan Scam

It may be a scam if the lender…

  • asks for a down payment or upfront cost before approval.
  • doesn’t have a physical address or any contact information listed online.
  • is offering a deal that far exceeds deals offered by other lenders. If it sounds too good to be true, it probably is.
  • guarantees approval before you submit your business application.
  • contacts you using a generic email address from Gmail, Hotmail, Yahoo or another generic email account.
  • sends you an unsolicited loan offer.
  • is trying to rush you into making a decision and uses phrases like “limited time only” or “last chance.”

 

If you think your business has been affected by a business loan scam, we recommend that you act immediately by following our guidelines below, and then proceed to our ReportRecover and Reinforce sections for further assistance.

Some Immediate Action Steps to Take

  • If you sent money or the scammer has obtained sensitive financial information, contact your bank or financial institution immediately.
  • Collect all relevant documentation related to the incident. You may need to provide this documentation when you file a report or seek legal counsel.
  • Report the incident to your local law enforcement agency by calling the non-emergency number. Obtain a copy of the incident report and store it with other relevant documentation related to the incident.

Report

Recover

These resources have been gathered, selected and vetted to help simplify the process of recovering after a cybercrime incident has taken place. You may need to contact organizations outside FightCybercrime.org. Results will vary depending on your circumstances.

Reinforce

Once you have notified the appropriate organizations and you are on the road to recovery, it is time to reinforce your cybersecurity using these resources and tools.

Implement Preventative Measures

  • Be suspicious of ads guaranteeing approval or offering rates that are unrealistic.
  • Be on the lookout for fake websites. Check for verified contact information and state licenses to confirm if the website is legitimate.
  • Advise your employees to never click on a link or open an email attachment from someone they don’t know and verify before clicking on an email from a trusted source that you are not expecting.
  • Create strong passwords. Learn how from ConnectSafely.org.
  • Always enable a two factor authentication on your email, social media and other online accounts– which requires an additional code to log in.
  • Learn how to understand and address cybersecurity risks with the Cybersecurity and Infrastructure Security Agency (CISA) Cyber Essentials Toolkits.

Community Resources