Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Fake Tech Support Knows Way More than It Should

Fake Tech Support Knows Way More than It Should

Tech-support scammers traditionally are people who dial random numbers and try to convince the people on the other end of the phone that their computer has problems and they can fix them if the user allows them to remote into the device. They use tactics that are as generic and vague as possible, to avoid having to mention any specifics; and, since some people (especially those who have computers that are a few years old) find that their system’s performance is sluggish, they will give these people access. This typically ends in disaster.

We’re starting to see that scammers are getting sneakier, and citing specific information about a user, like their computer’s model and serial numbers. Beyond that, they possess a lot of information about the user, including the device owner’s telephone number, email address, customer number, the device’s model number and their name.

This is just the latest in what is a growing trend of sophisticated social engineering scams that are targeting technology consumers and end-users. One problem is that these scammers are calling people who have purchased products from some of the largest and most well-respected hardware and software distributors in the world. Companies like Lenovo, Microsoft, Apple, Dell, and more have all had support scammers falsely represent their companies, and with these new tactics increasing their effectiveness, expect these situations to grow in frequency.

What You Should Do?
It’s important to understand that no matter how proactive your IT support is, there is very little chance a manufacturer will call you to report issues with your computer, unless you’ve deliberately signed up for a service that does. Even then, there will be a pretty stringent authorization process attached to the support. Major technology vendors understand the types of threats out there, and while they want everyone that purchases their products and services to have a good experience, they are also huge corporations and don’t typically call people up to help them fix their computer issues, unless they are scheduled to do so.

If you get a call like this, it’s better to play it safe than to be sorry later. This is doubly true if you share a network with other users. If you give an unwanted entity access to your system it could have negative effects on the entire network. So while it is true that the IT support scams are an industry-wide problem, ensuring a business’ users aren’t duped into allowing access to these nefarious parties is important.

At Network Solutions Unlimited, we make a point to help our clients promote industry best practices to their company’s users to ensure that they aren’t putting the company in bad positions. For more information about IT support scams, what real IT support looks like, and how to promote solid practices to your staff, call us today at 217-428-6449.

Tip of the Week: Managing Your Windows Arrangement
How Much Time Do You Spend Managing Vendors?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, December 12 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

IT Solutions Remote Workers IT Service Data Theft Firewall Patch Management Network Security IT budget Antivirus Display Colocation Testing Touchscreen Peripheral Flexibility Microsoft Word Charger Computing Infrastructure Managed Service Holiday Data Breach Cache Router Managed Service Provider Cloud Computing Employer Employee Relationship Quick Tips Scalability Laptop Bluetooth Wi-Fi Small Business iOS Google Drive Bring Your Own Device Chrome Value Internet exploMicrosoft BYOD Co-Managed Services IT Support Redundancy Office Tips Data storage Passwords Chromecast Nanotechnology Consultant Word Device Security Admin Commerce Touchpad Spyware Wireless Internet Alert Hosted Solutions Money Workers File Storage Hacking Tip of the Week Update Wireless PowerPoint WannaCry VoIP Business Spam Blocking NFL Artificial Intelligence OneNote Content Filtering Legislation Unified Threat Management WPA3 Data Recovery Mobile Device Browser Telephone Worker Data Storage Operating System Big Data Wasting Time Document Management Privacy Projects Two Factor Authentication Books Relocation Productivity Financial Technology Windows 10 Samsung Computing Maintenance Two-factor Authentication Administration Marketing Sales Productivity Printers Unsupported Software Payroll Analysis WiFi Identity Theft Business Intelligence Emergency PDF Scam Monitors Battery Legal Smart Tech Android Managed IT Services Content Filter Business Continuity Computer Fan Private Cloud Mobile Devices HBO Blockchain App store Google Assistant intranet Screen Mirroring Computer Hard Drives Windows 7 Storage Adobe Loyalty Remote Monitoring Personal Information Benefits Google Information Technology Microsoft Office Gifts eWaste Smartphones Downtime Customer Public Cloud Connectivity SaaS Tech Support Keyboard Software as a Service Tablets Company Culture Dark Web Root Cause Analysis End of Support Employer-Employee Relationship Conferencing Politics Travel CrashOverride Cybercrime Project Management Licensing Shadow IT Bandwidth Augmented Reality Smart Technology Data Business Owner Phone System Congratulations Budget Credit Cards Communications Fraud Outlook Vendor VPN Windows 10s Computer Accessories Twitter Human Resources Transportation Email Google Docs Lifestyle Shortcut Safety Business Technology Server Audiobook Worker Commute Application Emails Save Time Troubleshooting Risk Management Data Management Virus The Internet of Things Television Outsourced IT Software Saving Time Reputation Virtual Reality Alexa for Business Backup Upgrade Printing Virtualization Law Enforcement Phishing Cortana SMB Meetings Users Cost Management Innovation Business Management User Error Miscellaneous Vulnerability Cybersecurity Avoiding Downtime Chromebook File Sharing Network Keyboard Shortcuts Managed IT Services Windows Comparison Windows 10 Disaster Recovery Wasting Money WIndows Server 2008 Save Money IoT Hosted Solution Sync Video Games Language Financial Experience Students Hard Disk Drive Technology Data Loss Internet of Things Health Advertising Regulation Cloud Workplace Tips Collaboration User Tips How To Ransomware Data Backup Utility Computing Computers Techology Security Social Engineering Streaming Media Hyperlink Automation Solid State Drive Tech Term Data Privacy Apps Monitoring Saving Money Mobile Hackers Office 365 Webinar Electronic Medical Records Websites Upgrades Automobile Government Files Amazon Gadgets Business Computing Best Practices Cast Mobility Gmail IT Services Data Security HIPAA HaaS Going Green Audit FAQ Proactive Hard Drive Robot Mobile Security IT solutions Social Media Internet Efficiency Computer Care Networking Edge Facebook Wireless Charging Identity hacker Compliance MSP Virtual Assistant Accessory IT Support Malware Windows Ink Google Maps Hardware Education App Camera History Best Practice Management Ciminal Wireless Technology iPhone Updates Hybrid Cloud Communication BDR Password Managed IT Specifications Office Remote Computing Monitor Gamification Instant Messaging How to Smartphone Employee-Employer Relationship Public Computer Information Memory Content Search Access Control Retail Assessment Thank You Vendor Management Physical Security Entertainment Data Protection Proactive IT Sports Cleaning Devices Internet Exlporer Mobile Device Management Hiring/Firing Managing Stress Telephone Systems Unified Communications Apple Rootkit Computer Forensics Excel Settings Work/Life Balance USB Spam Managed IT Service Humor Microsoft Recovery Identities Microsoft Excel Professional Services Black Market Training Evernote Encryption Applications IT Management