Most therapists see a therapist.

The Seattle Seahawks have almost as many coaches as players.

And even the most seasoned climber doesn’t summit Everest without a Sherpa.

You know why?

Because having a guide helps.

If you don’t know the way, a guide is indispensable.

But even if you’re an expert or well on your way, a guide can offer assurance, show you a few shortcuts and make sure you don’t stray off course.

We are guides.

And we help people navigate something far more compelling than a trail or path or investment opportunities and the market.

We don’t start a relationship by offering hot stock tips and patent-pending investment strategies.

We sit down and get to know our clients.

Where are they in their lives?

What makes them happy and fulfilled?

What do they want from their future?

Once we know where they are and where they want to go, we can set out on a journey to get there together.

And hey, if we decide we want to change where we’re going or take a different route, that’s okay too.

We’re expert guides, so we can help even the most sophisticated investor, but we pride ourselves on making the complicated easy to understand for everyone.

So we don’t put our arms around a client’s portfolio and drag it over to our side of the table and tell them we’ll take it from here.

We work with our clients to make sure they understand and are invested in the decisions we make.

We don’t sell our clients products; we help them make choices.

About the kind of life they want to live.

About when and how they want to retire.

And what kind of legacy they want to leave behind for their families, their communities, and the world.

We are Summit.

And we know it’s a bit cheesy, but darn it, we believe this to be true.

We guide our clients towards their dreams.


What Are Social Engineering Scams—and How Can You Avoid Them?

You receive an email from a website you regularly use asking you to click a link to change your password due to suspicious activity. You take a phone call from the IRS asking you to verify your bank account or social security number. You get a text saying a family member was in an accident and they need money for emergency room bills.

These requests appeal to your sense of trust and seem like legitimate things to ask of you, so there’s a good chance you’ll respond or comply. But beware; these are common social engineering scams, which are ploys to access your sensitive information or obtain money using psychological manipulation.

Educate Yourself

The best way to avoid being a victim of this type of attack is to recognize the signs and know how to protect yourself. Here are the most common social engineering scams:

Phishing, smishing, vishing. These words may sound like nonsense, but they’re all widely used ways to trick you into giving away your personal information. Phishing occurs when a scammer sends you an email with a seemingly legitimate link to click, such as an email requesting a password change. Once you click and enter your password, bank account number, or other sensitive information, scammers receive access—and you might not even realize it. Smishing is a similar scam via text, and vishing is via phone or voicemail.

  • Protect yourself. Don’t click links from someone you don’t know, or even from an organization that might look legitimate. Go to the actual website and reach out using their posted contact information. Similarly, if someone calls you out of the blue and requests information, tell them you’ll call their organization back using a verified number. If you call the IRS, for example, they’ll likely tell you it wasn’t actually their representative calling to solicit information from you. If you receive a text and don’t recognize the sender’s phone number, don’t respond, even if the text indicates it’s from someone you know.

Baiting or quid pro quo. As the term suggests, this method offers some form of bait to tempt you into divulging information or handing over money. It could be physical bait, such as a flash drive that seems legitimate, or digital bait, such as an enticing advertisement to click or a music download. In reality, these drives or links infect your computer with malware or direct you to unsecure websites.

Quid pro quo uses a similar tactic whereby the scammer offers a service or monetary incentive in exchange for your information.

  • Protect yourself. Simply stated, don’t take the bait. Remain suspicious of any link or ad sent to you. If you’re interested in finding out more, you can always Google the company or product and find their official contact information. Don’t insert flash drives into your computer if you don’t know for certain what is on them or who has had access to them before you. Be wary of anyone requesting personal information, passwords, or login credentials from you, even if they claim to be an IT specialist or government official. Verify a person’s identity before responding to a request.

Piggybacking or tailgating. To carry out this type of attack, the perpetrator will try to gain physical access to a restricted space or device by following an authorized person. Think about a delivery driver asking you to hold a door open so they can deliver a package to someone in the building or an innocent-seeming stranger at a coffee shop asking to borrow your phone or laptop to look up information. Once given access, the scammer can steal your private information in a short amount of time.

  • Protect yourself. Get in the habit of politely declining requests like these. You might want to be helpful and accommodating, but those are the precise traits attackers seek to exploit. You can always offer to look up directions or a phone number yourself, rather than allowing someone access to your device. And you can tell the delivery driver to phone the package recipient to gain entry to the office. Don’t be the person who falls for the trick just because you were trying to be kind to strangers.

Scareware. Social engineering scams aim to make you act quickly based on emotion, and this form of attack does exactly that. You’re working on your laptop and suddenly see a pop-up warning you that your computer has multiple viruses. It instructs you to download software immediately to protect your personal information and files. This is how they put the scare in scareware. It’s natural to click as quickly as possible to prevent the issue from worsening; however, by doing so, you’ve exposed your computer to the malware you were trying to avoid.

  • Protect yourself. First, be sure to install legitimate antivirus/antimalware software on your device and ensure that it’s always up to date to block pop-ups from coming through in the first place. If one does appear, allow yourself time to assess the situation and think things through before acting.

Scammers are hoping you’ll panic and react quickly, but if you pause for a moment you’ll probably be able to spot an attack. Look for misspellings, lots of exclamation points, altered logos, or unprofessional words that a software company likely wouldn’t use. If you see one of these pop-ups, don’t click it—don’t even click the “X” button to close it. Instead, close your browser window and force quit through the task manager (Ctrl + Alt + Delete on Windows).

Recognize the Tactics

Overall, the best way to stay safe from social engineering scams is to recognize these tactics, verify information and sources before acting, and avoid clicking or acting quickly based on emotion. Remain calm, evaluate the originator of any request for money or information, and don’t comply until you’re sure the request is legitimate.


Summit Wealth Management is located at 3010 Harborview Drive, Suite 301, Gig Harbor, WA 98335 and can be reached at 253-858-2884.

Securities and advisory services offered through Commonwealth Financial Network. Member FINRA/SIPC. A Registered Investment Adviser. Fixed Insurance products and services offered through Summit Wealth Management.

© 2021 Broadridge Financial Solutions, Inc., and Commonwealth Financial Network®