Reconstruct exactly what the caller did

    Tech-support and government-impersonation scams come in many shapes. The recovery path is very different for 'they were on my screen' vs 'I shared codes' vs 'I paid them'.

    Map your exposure

      • Just answered the call → low risk, treat as a near-miss
      • Shared codes/passwords → account compromise track
      • Let them connect → device compromise track
      • Paid them → financial fraud track too

    More from Communications Security

    No image

    Confirm the inbox is actively compromised

    Pin down which account, who's been emailed, and which sessions are unfamiliar.

    No image

    Make the next phishing email harmless

    Use a password manager, hardware key and email aliases so a single phish can't cascade.

    No image

    Use specialised victim resources

    Sextortion has dedicated services — they're free, confidential and fast.