Contact us today!

Network Solutions Unlimited Blog

How to Leave Fake Tech Support Hanging

How to Leave Fake Tech Support Hanging

Tech support is there to help you, except when it isn’t. Many fraudsters will pose as a support technician to gain a target’s trust, only to cause them serious issues. To keep your organization safe, make sure that you are able to spot the warning signs of tech support fraud.

Incoming Message
You may get a call or email from someone asking about your computer’s status. This someone will likely claim to be from a recognizable technology company, like Microsoft or McAfee. You should not believe them. Companies of Microsoft’s size and success will not be the ones to reach out to check if there is an issue with your computer.

Besides, imagine how many employees Microsoft would need to have to reach out to every Microsoft customer. When there were over 100 million users of Office 365’s commercial edition in 2017, plus 27 million users of Office 365 Home & Personal (as stated in the shareholder letter that was released), there's just no way that Microsoft would devote that kind of manpower to collect that kind of information.

Additionally, it has been agreed between the FTC, National Cyber Security Alliance and yes, Microsoft, that no tech company will call you on the phone unsolicited, or send you an email with the same message.

Stay Up-to-Date
One of the best defenses against almost any threat, including tech support fraud, is to keep everything updated. This includes your operating system and antivirus and antimalware. This will help to minimize the damage of a tech support scam. IT may also consider installing ad blockers to maximize your protection.

Keep Credit Cards Close to the Chest
If a member of “tech support” asks for your credit card number after calling you first, don’t give it to them and hang up (assuming you let them get that far). If you have already given out your card number, call and make sure that any charges you didn’t make are reversed and then report the incident to the FTC Complaint Assistant.

Make Sure Your Employees are In-the-Know
It is important to remember that you aren’t the only person in the company that could fall victim to tech support fraud. Your employees need to be aware of the threat, and should be able to identify the warning signs as well. Your security is only as strong as its weakest link, and more often than not, the weakest link is your end users. Therefore, it is crucial that they are educated and evaluated on their knowledge of best practices.

Tech support is meant to help you out, which is a responsibility that Network Solutions Unlimited doesn’t take lightly. To learn more about our support services, give us a call at 217-428-6449.

Tip of the Week: Learn How to Use the Microsoft Ed...
At What Point Does a Service Become Spyware?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 22 May 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Mobile Device Automobile Sports Wireless Identity Customer Keyboard Antivirus Transportation Disaster Recovery Project Management Router Cast Productivity Information Technology Application Wireless Charging Phone System App store Technology Facebook Word Unsupported Software Root Cause Analysis Managed IT Services Television Business Continuity Monitoring End of Support Emails Computer Forensics Rootkit Blockchain Data Storage Scalability Audit File Sharing Network Security Hiring/Firing Microsoft Consultant The Internet of Things USB Android Going Green Business Intelligence Scam Licensing Two Factor Authentication Business Owner Social Media Data Privacy Proactive IT Patch Management Connectivity HBO Mobility Gadgets Telephone Systems Fraud Benefits BDR Value Business Computing Data Backup Cloud Legislation HIPAA IT Services Advertising Cortana IT Support Chromebook Phishing Dark Web Save Money Office Quick Tips Passwords Hackers Communication Virtualization Password PDF History Managed IT Windows Politics HaaS Best Practice Computer Accessories IT budget Conferencing BYOD Analysis Printing Management Best Practices Outlook Budget Save Time Reputation Legal Alert IT Solutions MSP Content Filtering Internet IT solutions Evernote Touchscreen Mobile Device Management Managed IT Service Computers Data NFL Law Enforcement Collaboration Health Shortcut Experience Hard Drives Hard Disk Drive Language VoIP Windows 10 VPN Monitors Entertainment Computing Infrastructure Humor Colocation Storage Books Mobile Security Personal Information Workers Content Devices Apps Computing Spam Firewall Email Identities Adobe Commerce Safety Outsourced IT Internet exploMicrosoft Automation Comparison Applications Upgrade Shadow IT Software as a Service Public Computer Cloud Computing Smartphones Samsung Credit Cards Assessment Unified Threat Management Privacy Computer Care Data Theft Big Data Training Gifts Hosted Solutions Google Assistant Techology Lifestyle WannaCry Small Business Smartphone WiFi Data Protection Laptop Tech Support IT Support Computer Fan Managed IT Services Avoiding Downtime Battery Windows 10 Video Games Financial Technology Screen Mirroring Mobile Devices Troubleshooting Websites Employer Employee Relationship WIndows Server 2008 Education Spam Blocking Regulation Document Management Robot IT Management Business Tip of the Week Cost Management Ciminal Spyware CrashOverride Social Engineering Sync Productivity Electronic Medical Records Office 365 User Tips Government Communications Artificial Intelligence User Error intranet Chrome Files Internet of Things Data Management Sales Compliance Private Cloud iPhone Data Security Loyalty Monitor Flexibility Instant Messaging Vendor Management Risk Management Saving Money Hybrid Cloud Update Data Breach Content Filter Operating System How To Security Webinar Remote Computing Two-factor Authentication Innovation Audiobook Money Data Loss iOS Data storage Identity Theft Windows 10s Users Congratulations Holiday Marketing Settings FAQ Twitter Bandwidth Maintenance Cleaning Touchpad Device Security Smart Technology Augmented Reality Vulnerability Mobile Windows Ink Black Market Microsoft Office Relocation Wi-Fi Public Cloud Solid State Drive Tablets Miscellaneous How to Gmail Managed Service Provider Cache App Cybercrime Smart Tech IoT Networking Google Remote Monitoring Tech Term Downtime Streaming Media eWaste Virtual Reality Edge Physical Security Encryption Malware OneNote Microsoft Excel Efficiency hacker Hosted Solution SaaS Travel Specifications Google Maps Virus Business Management Google Drive Microsoft Word Wireless Technology Cybersecurity Data Recovery Nanotechnology Work/Life Balance Professional Services Upgrades Hardware Bluetooth Apple Emergency Server Backup Browser Search Employer-Employee Relationship Ransomware Worker Commute Workplace Tips Meetings Computer Redundancy Updates Software Recovery Hard Drive Charger Retail Thank You Network Chromecast Internet Exlporer Hacking Office Tips Worker Proactive Bring Your Own Device Excel Google Docs Administration