Contact us today!
217-428-6449

Network Solutions Unlimited Blog

How to Leave Fake Tech Support Hanging

How to Leave Fake Tech Support Hanging

Tech support is there to help you, except when it isn’t. Many fraudsters will pose as a support technician to gain a target’s trust, only to cause them serious issues. To keep your organization safe, make sure that you are able to spot the warning signs of tech support fraud.

Incoming Message
You may get a call or email from someone asking about your computer’s status. This someone will likely claim to be from a recognizable technology company, like Microsoft or McAfee. You should not believe them. Companies of Microsoft’s size and success will not be the ones to reach out to check if there is an issue with your computer.

Besides, imagine how many employees Microsoft would need to have to reach out to every Microsoft customer. When there were over 100 million users of Office 365’s commercial edition in 2017, plus 27 million users of Office 365 Home & Personal (as stated in the shareholder letter that was released), there's just no way that Microsoft would devote that kind of manpower to collect that kind of information.

Additionally, it has been agreed between the FTC, National Cyber Security Alliance and yes, Microsoft, that no tech company will call you on the phone unsolicited, or send you an email with the same message.

Stay Up-to-Date
One of the best defenses against almost any threat, including tech support fraud, is to keep everything updated. This includes your operating system and antivirus and antimalware. This will help to minimize the damage of a tech support scam. IT may also consider installing ad blockers to maximize your protection.

Keep Credit Cards Close to the Chest
If a member of “tech support” asks for your credit card number after calling you first, don’t give it to them and hang up (assuming you let them get that far). If you have already given out your card number, call and make sure that any charges you didn’t make are reversed and then report the incident to the FTC Complaint Assistant.

Make Sure Your Employees are In-the-Know
It is important to remember that you aren’t the only person in the company that could fall victim to tech support fraud. Your employees need to be aware of the threat, and should be able to identify the warning signs as well. Your security is only as strong as its weakest link, and more often than not, the weakest link is your end users. Therefore, it is crucial that they are educated and evaluated on their knowledge of best practices.

Tech support is meant to help you out, which is a responsibility that Network Solutions Unlimited doesn’t take lightly. To learn more about our support services, give us a call at 217-428-6449.

Tip of the Week: Learn How to Use the Microsoft Ed...
At What Point Does a Service Become Spyware?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, August 22 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Gifts Office PDF Entertainment Spam Proactive IT Electronic Medical Records Update iOS Tip of the Week History Tech Term Router Touchscreen Computing Infrastructure HBO Content Filter Training Windows 10 Outlook Augmented Reality Managed IT Service Smart Technology Data Security Unified Communications Cortana Worker Data Privacy Passwords Backup Experience HaaS Employer-Employee Relationship Device Security Data storage Data Storage Business Owner Business Management Upgrades Miscellaneous Risk Management Gmail Hacking Regulation Hosted Solution WannaCry Instant Messaging Education Workplace Tips Apps Bring Your Own Device Innovation Websites Password Unified Threat Management Licensing Compliance Hiring/Firing Shadow IT Work/Life Balance OneNote Save Time Users Wireless Internet Colocation Windows 10s IoT Identities Shortcut Wireless Scalability Data Protection Public Computer WiFi The Internet of Things MSP Computers Politics Phishing Networking End of Support Monitors Cleaning PowerPoint Samsung Smartphones Alexa for Business Government Remote Monitoring Windows Ink App store Computing Tablets intranet Meetings Upgrade Applications iPhone Flexibility Files Solid State Drive Emergency Cybercrime Artificial Intelligence Transportation User Error Physical Security Computer Forensics Students Save Money Wireless Charging Alert Value eWaste Productivity Storage Congratulations Automobile FAQ Project Management Business Customer Legal Personal Information Printing Remote Computing Operating System Touchpad Identity Theft Firewall Rootkit Humor Travel Bluetooth Apple Internet exploMicrosoft Loyalty Amazon Two Factor Authentication WIndows Server 2008 Updates Email Webinar Disaster Recovery Unsupported Software Mobility Internet Audiobook Cloud Computing Sports Network Security Spyware Software Settings Going Green Business Intelligence Best Practice Managed Service Provider Workers Microsoft Excel Monitor Computer Accessories Cybersecurity Patch Management Root Cause Analysis Hosted Solutions Browser Techology Privacy Devices Mobile Device Android Bandwidth Nanotechnology Connectivity Quick Tips Telephone Systems Cloud Data Recovery Management Retail Financial Hybrid Cloud Computer Care Vulnerability Gamification Outsourced IT Best Practices Cache Virtualization IT solutions Antivirus Information Hard Disk Drive VPN Malware Efficiency Microsoft Word Managing Stress BDR Mobile Devices Managed IT Services Encryption Managed IT Services Google Hard Drives User Tips Sales Mobile Charger Benefits Conferencing Public Cloud Analysis Data Loss Social Media File Sharing Fraud Content Filtering Relocation Office Tips Google Drive Word Automation Thank You Hackers USB Battery Cost Management Health Money Cast Gadgets Two-factor Authentication Business Computing Microsoft IT Solutions Safety Identity Lifestyle HIPAA CrashOverride Computer Language Emails Black Market Streaming Media Internet Exlporer Robot Google Docs Business Continuity Communication hacker Credit Cards Ciminal Facebook Excel Chromecast Wasting Money IT Management Audit Adobe Virtual Assistant Small Business Tech Support Laptop Collaboration Computer Fan Blockchain Memory Budget IT Support Video Games Software as a Service Data Troubleshooting Microsoft Office Mobile Device Management Holiday Scam Redundancy Mobile Security Company Culture Security Financial Technology App Twitter Evernote Hardware Smartphone How To Television Windows 10 Comparison How to Assessment Specifications Application Data Management Technology WPA3 Smart Tech Communications Advertising Hard Drive File Storage Chromebook Books Search Windows Saving Money Dark Web Managed IT NFL Monitoring Business Technology Data Backup Internet of Things Server Big Data Google Maps Administration VoIP Vendor Management Wi-Fi Reputation BYOD Data Theft SaaS Virus Content Recovery Avoiding Downtime IT Services Legislation Keyboard Document Management Spam Blocking Marketing Ransomware Phone System Social Engineering Productivity Professional Services Maintenance Consultant Data Breach Office 365 Screen Mirroring IT Support Virtual Reality Network Downtime IT budget Chrome Worker Commute Wireless Technology Private Cloud Sync Law Enforcement Edge Proactive Information Technology Commerce Google Assistant Employer Employee Relationship