Contact us today!

Network Solutions Unlimited Blog

Fake Tech Support Knows Way More than It Should

Fake Tech Support Knows Way More than It Should

Tech-support scammers traditionally are people who dial random numbers and try to convince the people on the other end of the phone that their computer has problems and they can fix them if the user allows them to remote into the device. They use tactics that are as generic and vague as possible, to avoid having to mention any specifics; and, since some people (especially those who have computers that are a few years old) find that their system’s performance is sluggish, they will give these people access. This typically ends in disaster.

We’re starting to see that scammers are getting sneakier, and citing specific information about a user, like their computer’s model and serial numbers. Beyond that, they possess a lot of information about the user, including the device owner’s telephone number, email address, customer number, the device’s model number and their name.

This is just the latest in what is a growing trend of sophisticated social engineering scams that are targeting technology consumers and end-users. One problem is that these scammers are calling people who have purchased products from some of the largest and most well-respected hardware and software distributors in the world. Companies like Lenovo, Microsoft, Apple, Dell, and more have all had support scammers falsely represent their companies, and with these new tactics increasing their effectiveness, expect these situations to grow in frequency.

What You Should Do?
It’s important to understand that no matter how proactive your IT support is, there is very little chance a manufacturer will call you to report issues with your computer, unless you’ve deliberately signed up for a service that does. Even then, there will be a pretty stringent authorization process attached to the support. Major technology vendors understand the types of threats out there, and while they want everyone that purchases their products and services to have a good experience, they are also huge corporations and don’t typically call people up to help them fix their computer issues, unless they are scheduled to do so.

If you get a call like this, it’s better to play it safe than to be sorry later. This is doubly true if you share a network with other users. If you give an unwanted entity access to your system it could have negative effects on the entire network. So while it is true that the IT support scams are an industry-wide problem, ensuring a business’ users aren’t duped into allowing access to these nefarious parties is important.

At Network Solutions Unlimited, we make a point to help our clients promote industry best practices to their company’s users to ensure that they aren’t putting the company in bad positions. For more information about IT support scams, what real IT support looks like, and how to promote solid practices to your staff, call us today at 217-428-6449.

Tip of the Week: Managing Your Windows Arrangement
How Much Time Do You Spend Managing Vendors?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, October 20 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Computer Wasting Time Tech Term Management Mobile Devices Data Storage Computers Assessment PowerPoint Hyperlink File Sharing Hard Disk Drive Avoiding Downtime Ciminal Conferencing Software as a Service Microsoft Office Streaming Media Worker Facebook Security Storage Colocation Network Training Windows 7 Data Breach Social Media HIPAA Updates Thank You Comparison Data Recovery Telephone Systems Monitors Public Cloud End of Support Emails Cybersecurity Productivity Consultant Mobile Security Credit Cards Business Technology Adobe Employer-Employee Relationship Content Filtering MSP intranet Benefits Microsoft Word Hosted Solution Mobile Tablets Congratulations File Storage Upgrades Apps Money Managed Service IT Support Identity Theft Remote Computing Managed IT Services Internet exploMicrosoft Vendor Malware Data Management Smart Tech Spam Blocking Root Cause Analysis Microsoft Company Culture Peripheral Maintenance VoIP Patch Management Transportation Hiring/Firing Two Factor Authentication Proactive IT Outlook Workers Tech Support Television Google Drive Charger Chromebook Wireless Technology Best Practice Sync Disaster Recovery Save Time VPN Office 365 Going Green Relocation Automobile Privacy Project Management Managed IT Service Unsupported Software Search Virus HaaS Tip of the Week Cloud Computing Communication Display Communications Administration Hackers How to Internet Value WannaCry Computing Infrastructure Camera Windows Ink Public Computer Microsoft Excel Travel Audiobook Marketing Managing Stress Vulnerability Data Backup Connectivity Experience Data Security Gifts Personal Information Outsourced IT Books Financial Technology Spam Keyboard The Internet of Things IT Services Bring Your Own Device User Tips Firewall Blockchain Risk Management Wireless Touchpad Email Printers Devices Commerce Downtime Augmented Reality Apple Network Security CrashOverride Redundancy Loyalty BYOD Battery Worker Commute App store Miscellaneous Software OneNote Shortcut Testing Proactive Content Best Practices Virtualization How To Managed Service Provider Co-Managed Services Emergency Mobility Virtual Assistant Information Computer Forensics Printing Samsung Chromecast Innovation Screen Mirroring Business Continuity FAQ Analysis Files Regulation Google Docs Wasting Money Hybrid Cloud Small Business Business PDF Twitter Laptop Troubleshooting Smart Technology Sales Fraud eWaste Two-factor Authentication Information Technology hacker Hardware Windows 10 Cloud Compliance Wireless Charging Workplace Tips Meetings Techology HBO Data Protection Remote Monitoring Computing Health Cybercrime Wireless Internet Users Safety Physical Security Private Cloud Saving Money Evernote Advertising Productivity Unified Threat Management Lifestyle Document Management WIndows Server 2008 Managed IT Passwords Upgrade Language IT Support Office Unified Communications Hacking Operating System Automation Flexibility Virtual Reality Application IT budget Bandwidth Law Enforcement Content Filter Bluetooth Settings Excel Cache Artificial Intelligence Data Google Cast Sports Gmail Shadow IT Touchscreen Browser WPA3 Data Privacy Entertainment Data Loss Mobile Device Management Humor Save Money Internet of Things Black Market History Legal Business Computing Edge Audit Phishing Retail Google Maps IT Management Nanotechnology iOS Cost Management Device Security Reputation Business Management User Error IT solutions Windows 10s Antivirus SaaS Computer Care Smartphone Computer Accessories Cortana Customer Update Backup Big Data Ransomware Professional Services Hard Drives Instant Messaging Networking Licensing IT Solutions Memory Android Projects Solid State Drive Hard Drive Encryption Efficiency BDR Webinar Quick Tips IoT Spyware Alert Office Tips Robot Students Applications Collaboration Technology Wi-Fi Legislation Managed IT Services Employee-Employer Relationship Password Work/Life Balance Cleaning Internet Exlporer WiFi Websites Vendor Management Scam Accessory Alexa for Business Budget Computer Fan Government Rootkit Employer Employee Relationship Business Intelligence App Business Owner USB Hosted Solutions iPhone Monitor Politics Scalability Telephone Identities Video Games Identity Electronic Medical Records Router NFL Dark Web Education Chrome Smartphones Google Assistant Specifications Windows 10 Recovery Mobile Device Social Engineering Gadgets Phone System Holiday Word Server Financial Windows Data storage Amazon Data Theft Gamification Monitoring