National Small Business Week 2026: FTC Scam Alerts NC Owners Must Know

FTC's National Small Business Week 2026 spotlights AI scams, fake recruiter texts, and imposter fraud. Here's the NC small business defense checklist.

Cover Image for National Small Business Week 2026: FTC Scam Alerts NC Owners Must Know

TL;DR: During National Small Business Week 2026 (May 4-10), the FTC, IRS, and SBA warned that AI-fueled imposter scams, fake recruiter texts, and government impersonation attacks are at record highs for SMBs. The FTC reports government imposter scams jumped 40% year-over-year and 72% of workers say phishing attempts are more convincing than a year ago thanks to AI-written language. NC small businesses without security awareness training, defined wire-transfer verification procedures, and managed email defenses face a meaningfully different risk environment than they did 12 months ago.

Worried your team will fall for a scam? Preferred Data Corporation has trained NC small business teams on security awareness since 1987. Call (336) 886-3282 or request a security awareness program.

What did the FTC warn NC small businesses about during National Small Business Week 2026?

The FTC, IRS, and SBA jointly highlighted four scam categories actively targeting SMBs in May 2026: AI-generated phishing, fake recruiter texts, government imposter scams, and tax-related fraud. According to the FTC's National Small Business Week blog, small businesses report fraud losses at a rate that has materially outpaced consumer losses since 2024.

Scam Category2025-2026 TrendTypical Loss to SMB
AI-generated phishing72% say more convincing than 1 year ago$30,000 - $250,000 per incident
Fake recruiter / job scamsTargeting HR and employee contact data$5,000 - $50,000
Government imposter (IRS, SBA, NC DOR)+40% year-over-year$10,000 - $100,000
Romance and business confidence scams+22%, avg $2,020 per personReputation + employee losses

Key takeaway: The threat that hits NC SMBs is rarely a sophisticated zero-day. It is a well-crafted email, text, or phone call that asks an employee to do something normal, just for someone they should not be doing it for.

Why are AI-generated scams hitting NC small businesses harder in 2026?

Because the writing quality has gone from obvious to indistinguishable. The FTC's National Small Business Week guidance highlights that 72% of workers say phishing attempts are more convincing than a year ago because of AI-written language. The signals SMB employees were trained to spot - misspellings, awkward grammar, suspicious urgency - have largely disappeared from modern phishing.

Three reasons NC small businesses are in the blast radius:

Get a security awareness program →

How much does a successful scam cost an NC small business?

The average successful CEO fraud or wire-fraud incident costs $125,000 or more, with deepfake-assisted incidents averaging $500,000 per Brightside AI's CFO fraud research. For smaller NC SMBs, even a single $25,000 fraudulent invoice can be the difference between a profitable quarter and a difficult conversation with the bank.

Cost ComponentTypical Range
Direct wire-fraud loss$5,000 - $500,000
Forensic investigation$10,000 - $50,000
Cyber insurance deductible$5,000 - $25,000
Cyber insurance social engineering sublimitOften $50,000 - $100,000 cap
Legal review and SAR filing$5,000 - $25,000
Customer or vendor notification$5,000 - $50,000
Banking and wire recovery legal fees$10,000 - $100,000
Reputation recovery + PR$10,000 - $75,000

The wire-fraud sublimit on most cyber insurance policies is the line item that surprises SMBs the most: a $1M cyber policy often pays only $50,000 for social engineering losses, leaving the rest as out-of-pocket. Verify your sublimit before you need it.

Key takeaway: Cyber insurance does not make wire fraud whole. Most policies cap social engineering losses at a small fraction of the total policy limit. Prevention and verification procedures are the only meaningful defense.

What are the four scam patterns NC small businesses must train against?

Pattern 1: AI-generated CEO email impersonation. Pattern 2: Government imposter (IRS, SBA, NC DOR). Pattern 3: Fake recruiter texts targeting HR. Pattern 4: Vendor invoice-update fraud.

Scam PatternTypical HookVerification Failure
CEO email impersonation"I need you to process this wire urgently"No callback to CEO via known number
Government imposter"Your business owes back taxes; pay now"No verification through gov't channel
Fake recruiter text"We saw your profile; reply YES for next step"Employee data harvested
Vendor invoice update"Our banking details have changed; here's the new wire info"No callback to vendor via known contact

For each pattern, the defense is the same: a documented, mandatory verification procedure that no one is allowed to skip, including the CEO.

What does a defensible scam-prevention program look like for an NC small business?

A defensible program has six layers: training, technology, procedures, governance, monitoring, and insurance. According to the FTC's small business cybersecurity guide and CISA's Cyber Essentials, SMBs that adopt all six layers see materially lower fraud losses.

A defensible 60-day rollout for NC SMBs:

  1. Week 1-2: Deliver baseline security awareness training to all employees with a focus on AI-generated phishing
  2. Week 2-3: Document a mandatory wire-transfer verification procedure (two-person rule, callback to known number, no exceptions)
  3. Week 3-4: Deploy email protection with anti-spoofing (SPF, DKIM, DMARC) and external sender warnings
  4. Week 4-5: Run a phishing simulation; identify the team members who need more training
  5. Week 5-6: Review cyber insurance social engineering sublimit and consider increasing
  6. Week 6-8: Enable MFA on all banking, accounting, and vendor management portals
  7. Week 8: Establish a quarterly training and simulation cadence

If your business does not have an internal IT or security lead, this is the kind of program a managed cybersecurity provider builds out in the first 60 days of an engagement.

What is the wire-transfer verification procedure that actually works?

Two-person approval, callback to a known number, and zero exceptions for "urgency." According to the FBI's Internet Crime Complaint Center and FTC fraud reports, every successful BEC wire fraud has the same failure mode: a single employee processed the wire without verifying through a second channel.

Procedure ElementDetailWhy It Matters
Two-person ruleOne initiates, one approves separatelyNo single point of failure
Callback verificationUse phone number from your records, not the emailDefeats spoofed emails
Threshold tiers$5K, $25K, $100K+ require escalating approvalLimits worst-case loss
Vendor banking changeNew banking info requires callback to known vendor contactDefeats invoice-update fraud
No "urgency" exceptionsCEO cannot override the ruleDefeats CEO impersonation
Documented in writingProcedure signed by every employee with wire authorityCyber insurance evidence

For an NC small business processing 20-50 wire transfers per month, the procedure adds 5-10 minutes per wire. The math is brutal in the other direction: a single skipped callback can cost $50,000 to $500,000.

Read our business email compromise defense guide →

What about the fake recruiter texts targeting employees?

These are reconnaissance attacks. Fake recruiter texts harvest employee contact data, job titles, and corporate hierarchy that an attacker uses to craft a more convincing phishing or vishing attack later. The FTC notes the new "reply YES or INTERESTED" twist is designed to bypass link-blocking filters by harvesting engagement metadata first.

The defense:

  1. Train employees that legitimate recruiters do not text first. Real recruiters use email or LinkedIn InMail
  2. Block known scam SMS numbers at the carrier level (most NC carriers offer free SMS spam filtering)
  3. Make it easy to report. Employees should know to forward suspicious texts to IT, not engage
  4. Audit your data exposure. Public LinkedIn profiles and chamber listings give attackers the targeting data

What about IRS and government imposter scams?

The IRS does not initiate contact via text, email, or phone. According to the IRS National Small Business Week guidance, every "urgent payment" demand from a "government agency" via phone, text, or email is a scam.

Government Imposter PatternRed Flag
"IRS calling about back taxes"IRS sends letters first
"SBA loan must be repaid immediately"SBA does not threaten arrest
"NC DOR tax warrant"NC DOR uses certified mail
"Pay with gift cards or wire"No government agency accepts gift cards
"Don't tell anyone, this is confidential"Real notices are not secret

The training point for NC SMB employees: hang up, call back the agency at a number from the official website, never the number on the caller ID. Hang up first, verify second.

Get managed cybersecurity services →

How does security awareness training actually reduce fraud losses?

Trained employees report scams instead of clicking. The FTC's NIST joint webinar from May 5, 2026 covered the math: SMBs with quarterly training and phishing simulation see click-through rates on simulated phishing drop from 25-35% to 3-8% within 12 months.

A defensible training program:

ElementFrequencyFormat
Baseline security awarenessAnnual30-60 min video + assessment
Topical micro-trainingMonthly5-10 min on current threats
Phishing simulationMonthly or quarterlyReal-world test emails
Wire-fraud tabletopAnnuallyScenario-based exercise
Incident response refreshAnnuallyRoles, escalation, communication

For a 25-employee NC business, this program runs $25-$75 per employee per year through a managed provider, and the ROI is the absence of a six-figure wire-fraud loss.

How does PDC help NC small businesses defend against scam losses?

Preferred Data Corporation delivers managed cybersecurity, managed IT services, and security awareness programs for NC businesses with monthly training, phishing simulation, email protection, and 24/7 monitoring of email and identity logs built into our standard engagement. When the FTC or FBI publishes a new scam pattern, our managed clients receive a same-day advisory with sample messaging, the verification procedure to enforce, and a training module to distribute.

For NC small businesses without dedicated security staff, the gap between "the FTC warned about this scam" and "every employee knows how to spot and report it" is where six-figure losses happen. Closing that gap is what we do.

Schedule a security awareness review:

How should NC small businesses harden for the long term?

Beyond training, layer governance and technology controls. Per CISA's Cyber Essentials for Small Business and the FTC's small business cybersecurity guide, SMBs should:

  1. Quarterly security awareness training + phishing simulation. Track metrics over time
  2. Written wire-transfer verification procedure. Two-person approval, callback rule, no exceptions
  3. Email protection with DMARC enforcement. Reject spoofed external email
  4. Phishing-resistant MFA on banking and accounting portals. Passkeys or hardware keys
  5. Cyber insurance with adequate social engineering sublimit. Match coverage to your wire volume
  6. Incident response runbook for fraud incidents. Bank notification, FBI reporting, legal counsel
  7. Vendor management with verified banking details. Out-of-band confirmation for every change
  8. Executive coverage. CEO and CFO get the same training and verification rules as everyone else

Read our voice cloning CEO fraud defense guide →

Frequently Asked Questions

Does cyber insurance cover wire fraud from scams?

Partially. Most cyber insurance policies cover wire fraud under a "social engineering" or "computer fraud" sublimit that is typically $50,000 to $250,000 on a $1M to $5M total policy. Always verify your sublimit before assuming coverage matches policy limit. NC SMBs processing high wire volumes should consider a dedicated commercial crime policy.

How quickly can we recover funds from a successful wire fraud?

Less than 48 hours is the gold standard. Notify your bank within 24 hours and the FBI's IC3 within 48 hours, and recovery odds rise significantly via the FBI's Financial Fraud Kill Chain. After 72 hours, recovery odds drop below 20%. Time is the single largest variable.

Is text-message phishing (smishing) really a problem for SMBs?

Yes. The FTC notes that government imposter scams via text rose 40% year-over-year, and fake recruiter texts targeting employee phones harvest data used in later attacks. Mobile-first scams are now equal in volume to email-based scams.

Should the CEO be trained or are they exempt?

Especially the CEO. Executive impersonation is the single most lucrative scam category. The CEO must be trained on the verification procedure, must follow it personally, and must not override it for "urgent" wires. Cyber insurance carriers increasingly require executive training as a coverage condition.

Can a managed IT provider handle security awareness training?

Yes. Most managed cybersecurity providers include security awareness training, phishing simulation, and incident response in their monthly retainer. For a 25-50 employee NC business, this is significantly more cost-effective than hiring a dedicated security training vendor.


Support