Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Fake Tech Support Knows Way More than It Should

Fake Tech Support Knows Way More than It Should

Tech-support scammers traditionally are people who dial random numbers and try to convince the people on the other end of the phone that their computer has problems and they can fix them if the user allows them to remote into the device. They use tactics that are as generic and vague as possible, to avoid having to mention any specifics; and, since some people (especially those who have computers that are a few years old) find that their system’s performance is sluggish, they will give these people access. This typically ends in disaster.

We’re starting to see that scammers are getting sneakier, and citing specific information about a user, like their computer’s model and serial numbers. Beyond that, they possess a lot of information about the user, including the device owner’s telephone number, email address, customer number, the device’s model number and their name.

This is just the latest in what is a growing trend of sophisticated social engineering scams that are targeting technology consumers and end-users. One problem is that these scammers are calling people who have purchased products from some of the largest and most well-respected hardware and software distributors in the world. Companies like Lenovo, Microsoft, Apple, Dell, and more have all had support scammers falsely represent their companies, and with these new tactics increasing their effectiveness, expect these situations to grow in frequency.

What You Should Do?
It’s important to understand that no matter how proactive your IT support is, there is very little chance a manufacturer will call you to report issues with your computer, unless you’ve deliberately signed up for a service that does. Even then, there will be a pretty stringent authorization process attached to the support. Major technology vendors understand the types of threats out there, and while they want everyone that purchases their products and services to have a good experience, they are also huge corporations and don’t typically call people up to help them fix their computer issues, unless they are scheduled to do so.

If you get a call like this, it’s better to play it safe than to be sorry later. This is doubly true if you share a network with other users. If you give an unwanted entity access to your system it could have negative effects on the entire network. So while it is true that the IT support scams are an industry-wide problem, ensuring a business’ users aren’t duped into allowing access to these nefarious parties is important.

At Network Solutions Unlimited, we make a point to help our clients promote industry best practices to their company’s users to ensure that they aren’t putting the company in bad positions. For more information about IT support scams, what real IT support looks like, and how to promote solid practices to your staff, call us today at 217-428-6449.

Tip of the Week: Managing Your Windows Arrangement
How Much Time Do You Spend Managing Vendors?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, February 18 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Business Owner Employee Cloud Education Transportation Data Privacy Search Google Professional Services Computer Care Legislation Internet exploMicrosoft Bandwidth Information Monitors Communication History Proactive Alexa for Business Innovation Router Telephone Systems Hard Drive Employer Employee Relationship Hardware Mobile Device Management Vulnerability WiFi SMB Computer Fan Automation Spam Blocking Big Data Server Public Cloud Wi-Fi Tablets Smartphones Troubleshooting IoT Gmail Business Management Data Storage Data Management Electronic Medical Records Consultant WannaCry End of Support Windows IT budget Connectivity IT Services Recovery Compliance Gadgets Networking Display Google Drive Workers Vendor Management Holiday Emails Tech Term Worker Rootkit File Sharing Outsourced IT Samsung Workplace Tips Virtual Private Network Loyalty OneNote Computer Accessories Cleaning Windows 7 Sales Cast Operating System NFL Data Management Hosted Solution Lifestyle Printing Managed IT Services Computing Infrastructure Unified Threat Management Identity Theft Outlook Law Enforcement Vendor Ciminal User Tips IT Service Sync Websites intranet Business Updates Google Docs iOS Payment Cards Wasting Money USB Downtime Accessory Co-Managed Services Comparison Remote Monitoring Application Monitor Information Technology Email Internet of Things Bring Your Own Device Printers Credit Cards Amazon Reputation Managed Service Provider Robot Remote Computing Business Computing Telephone Scalability BDR Payroll Avoiding Downtime Customer Safety IT solutions Emergency SaaS Best Practice Streaming Media Computer Mobile Device Virtual Reality Charger HBO Identity Tip of the Week VPN Sports Content Meetings Hard Drives PDF Government Business Continuity Data Loss Keyboard Shortcuts Gifts Value Efficiency Data Breach Shadow IT Financial Technology Firewall Battery Mobile App store Wireless Charging Business Technology Apple Quick Tips Spyware Upgrades Smart Technology Windows 10 Android Hard Disk Drive Managed IT Services Windows Ink Testing Managed Service Specifications Students Wireless Technology Phone System Word Cost Management Instant Messaging Project Management Peripheral Windows 10 Financial Data Security Redundancy Ransomware IT Support Office Keyboard Apps PowerPoint Storage Office Tips Fraud Travel IT Management Language How to Business Intelligence Commerce Laptop Productivity Malware Communications Smart Tech Mobility Virtualization Training iPhone Politics Humor Browser Data storage Health Solid State Drive BYOD WIndows Server 2008 Bluetooth Maintenance Worker Commute Evernote Devices Unified Communications Virus Screen Mirroring Software as a Service Private Cloud Going Green Cybersecurity Colocation Administration Social Media Admin User Error Scam Automobile Content Filter Conferencing Saving Money Employer-Employee Relationship Flexibility VoIP Chrome Hiring/Firing Identities Virtual Assistant Human Resources Document Management Budget CrashOverride Webinar Money hacker File Storage Proactive IT Windows 10s Edge FAQ Wireless HaaS Microsoft Managed IT Shortcut Remote Workers Small Business Network Security Upgrade Adobe Physical Security Security Regulation Backup and Disaster Recovery Social Engineering Analysis Monitoring Video Games Best Practices Hybrid Cloud Patch Management Artificial Intelligence Projects Spam E-Commerce Data Protection Augmented Reality Television MSP Camera Advertising How To Microsoft Excel Wasting Time Hackers Excel Collaboration Cortana Software IT Support Licensing Utility Computing Relocation Miscellaneous Office 365 Settings Techology Internet Exlporer Chromebook Data Theft Marketing Cybercrime Audit Data Recovery Entertainment Dark Web Touchscreen Public Computer HIPAA Save Time Assessment Mobile Devices Antivirus Benefits Retail Hyperlink Managed IT Service Backup Device Security Computing Google Maps Personal Information Users Two-factor Authentication Audiobook App IT Solutions Privacy Congratulations Access Control Unsupported Software Memory Cloud Computing Managing Stress Saving Time Encryption Mobile Security Alert Books The Internet of Things Phishing Twitter Root Cause Analysis Computers Wireless Internet Microsoft Word Nanotechnology Save Money eWaste Microsoft Office Chromecast Facebook Internet Company Culture Work/Life Balance Computer Forensics Tech Support Update Gamification Hosted Solutions Network Data Backup Applications Experience WPA3 Blockchain Google Assistant Legal Hacking Touchpad Risk Management Machine Learning Two Factor Authentication Disaster Recovery Black Market Smartphone Cache Password Technology Productivity Passwords Employee-Employer Relationship Paperless Office Content Filtering Security Cameras Thank You Files