Contact us today!

Network Solutions Unlimited Blog

How to Leave Fake Tech Support Hanging

How to Leave Fake Tech Support Hanging

Tech support is there to help you, except when it isn’t. Many fraudsters will pose as a support technician to gain a target’s trust, only to cause them serious issues. To keep your organization safe, make sure that you are able to spot the warning signs of tech support fraud.

Incoming Message
You may get a call or email from someone asking about your computer’s status. This someone will likely claim to be from a recognizable technology company, like Microsoft or McAfee. You should not believe them. Companies of Microsoft’s size and success will not be the ones to reach out to check if there is an issue with your computer.

Besides, imagine how many employees Microsoft would need to have to reach out to every Microsoft customer. When there were over 100 million users of Office 365’s commercial edition in 2017, plus 27 million users of Office 365 Home & Personal (as stated in the shareholder letter that was released), there's just no way that Microsoft would devote that kind of manpower to collect that kind of information.

Additionally, it has been agreed between the FTC, National Cyber Security Alliance and yes, Microsoft, that no tech company will call you on the phone unsolicited, or send you an email with the same message.

Stay Up-to-Date
One of the best defenses against almost any threat, including tech support fraud, is to keep everything updated. This includes your operating system and antivirus and antimalware. This will help to minimize the damage of a tech support scam. IT may also consider installing ad blockers to maximize your protection.

Keep Credit Cards Close to the Chest
If a member of “tech support” asks for your credit card number after calling you first, don’t give it to them and hang up (assuming you let them get that far). If you have already given out your card number, call and make sure that any charges you didn’t make are reversed and then report the incident to the FTC Complaint Assistant.

Make Sure Your Employees are In-the-Know
It is important to remember that you aren’t the only person in the company that could fall victim to tech support fraud. Your employees need to be aware of the threat, and should be able to identify the warning signs as well. Your security is only as strong as its weakest link, and more often than not, the weakest link is your end users. Therefore, it is crucial that they are educated and evaluated on their knowledge of best practices.

Tech support is meant to help you out, which is a responsibility that Network Solutions Unlimited doesn’t take lightly. To learn more about our support services, give us a call at 217-428-6449.

Tip of the Week: Learn How to Use the Microsoft Ed...
At What Point Does a Service Become Spyware?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, November 18 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Ciminal How To Windows 10 Personal Information Peripheral Business Management Chromebook Cloud Vendor Management Spam Blocking Instant Messaging Update Proactive IT Virtualization Windows 10 App Unified Threat Management IT Support Computer Fan Managed Service Provider Hiring/Firing Best Practices Project Management Ransomware Shadow IT IoT Language Wi-Fi Avoiding Downtime Browser Cost Management Workers Automobile Commerce Entertainment Business WannaCry Data Protection Government Hard Drives iOS Tech Term Wireless Charging Emails Testing Business Technology Battery Bluetooth Value Backup Private Cloud Public Computer NFL Facebook Touchpad Meetings Twitter Google Maps Computers Computing Infrastructure Two Factor Authentication Screen Mirroring Saving Time Network Security Information Remote Monitoring Office Efficiency Augmented Reality Chromecast Microsoft Printing Computer Licensing Vulnerability Edge Productivity Antivirus Remote Computing Troubleshooting Windows 10s Mobile Devices Windows Ink Business Owner Safety Gamification Wireless Gifts Artificial Intelligence Disaster Recovery Bring Your Own Device Mobile Security Hosted Solution Hyperlink Device Security Apple Books HaaS Unified Communications iPhone Dark Web Collaboration Two-factor Authentication Workplace Tips Hardware The Internet of Things OneNote Cybercrime Data Loss Microsoft Office Gmail Mobility Data Theft Application Tech Support Black Market IT Services Business Intelligence Congratulations Files How to Mobile Work/Life Balance Health Connectivity Money Downtime Encryption Cloud Computing Communications Admin Communication Colocation MSP Business Computing Virus Windows Risk Management Physical Security IT solutions Legislation Search Rootkit Network Mobile Device Management Training Internet exploMicrosoft Settings Techology Upgrade Cybersecurity Internet Exlporer Emergency Microsoft Word VPN hacker File Sharing End of Support Relocation Phishing Robot Upgrades Router Data Security IT Support Data Benefits Content Evernote HBO Monitor Audit Excel Electronic Medical Records Malware Touchscreen Professional Services IT budget Employee-Employer Relationship Saving Money Display Data Breach Chrome Cortana Spam Outlook Customer Security Virtual Assistant Identities Password PDF Cleaning SaaS Hard Disk Drive Holiday Storage Hybrid Cloud Google Docs Nanotechnology Websites Comparison Telephone Office 365 Marketing Experience Data Recovery Smartphone Google Administration Tablets Sync Internet Public Cloud Data Management Document Management Assessment Travel Advertising Unsupported Software Video Games Television Utility Computing Vendor Webinar Business Continuity Cast Content Filtering Law Enforcement User Error Employer Employee Relationship Smartphones Scalability Users Information Technology Hard Drive Hackers CrashOverride Data Storage Computer Accessories Retail Passwords Compliance Gadgets File Storage Legal Projects BYOD Employer-Employee Relationship HIPAA Social Media PowerPoint eWaste Memory Redundancy Software as a Service Monitoring Bandwidth Monitors Hosted Solutions WIndows Server 2008 Apps Proactive Education Flexibility IT Solutions Email Best Practice Operating System Data Backup Computer Care Hacking Mobile Device Alexa for Business Financial Technology Smart Technology Thank You Small Business Android Smart Tech Privacy Social Engineering Printers Managed Service Server Content Filter Managed IT Service Wasting Money Co-Managed Services Quick Tips Regulation Conferencing intranet Word Laptop Internet of Things Fraud Management Devices Maintenance WPA3 Cache Going Green Wireless Technology Managed IT Managed IT Services Software Technology Managing Stress Samsung Credit Cards Specifications Save Time Root Cause Analysis Updates BDR Sports IT Management Save Money Humor Shortcut History Loyalty Access Control Office Tips Worker Commute USB Identity Politics Budget Streaming Media Networking Adobe Managed IT Services Audiobook Automation Google Drive Applications Google Assistant Scam Spyware Solid State Drive Keyboard Shortcuts App store Patch Management Keyboard Computing Reputation Innovation Transportation Consultant Windows 7 Accessory Outsourced IT Phone System Blockchain Students Data storage Telephone Systems Analysis Identity Theft VoIP User Tips Data Privacy Virtual Reality Productivity Worker Firewall WiFi Sales Charger Company Culture Amazon Computer Forensics Alert FAQ Tip of the Week Camera Big Data Recovery Miscellaneous Wasting Time Lifestyle Financial Microsoft Excel Wireless Internet