Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Network Solutions Unlimited has been serving the Decatur area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Leave Fake Tech Support Hanging

How to Leave Fake Tech Support Hanging

Tech support is there to help you, except when it isn’t. Many fraudsters will pose as a support technician to gain a target’s trust, only to cause them serious issues. To keep your organization safe, make sure that you are able to spot the warning signs of tech support fraud.

Incoming Message
You may get a call or email from someone asking about your computer’s status. This someone will likely claim to be from a recognizable technology company, like Microsoft or McAfee. You should not believe them. Companies of Microsoft’s size and success will not be the ones to reach out to check if there is an issue with your computer.

Besides, imagine how many employees Microsoft would need to have to reach out to every Microsoft customer. When there were over 100 million users of Office 365’s commercial edition in 2017, plus 27 million users of Office 365 Home & Personal (as stated in the shareholder letter that was released), there's just no way that Microsoft would devote that kind of manpower to collect that kind of information.

Additionally, it has been agreed between the FTC, National Cyber Security Alliance and yes, Microsoft, that no tech company will call you on the phone unsolicited, or send you an email with the same message.

Stay Up-to-Date
One of the best defenses against almost any threat, including tech support fraud, is to keep everything updated. This includes your operating system and antivirus and antimalware. This will help to minimize the damage of a tech support scam. IT may also consider installing ad blockers to maximize your protection.

Keep Credit Cards Close to the Chest
If a member of “tech support” asks for your credit card number after calling you first, don’t give it to them and hang up (assuming you let them get that far). If you have already given out your card number, call and make sure that any charges you didn’t make are reversed and then report the incident to the FTC Complaint Assistant.

Make Sure Your Employees are In-the-Know
It is important to remember that you aren’t the only person in the company that could fall victim to tech support fraud. Your employees need to be aware of the threat, and should be able to identify the warning signs as well. Your security is only as strong as its weakest link, and more often than not, the weakest link is your end users. Therefore, it is crucial that they are educated and evaluated on their knowledge of best practices.

Tech support is meant to help you out, which is a responsibility that Network Solutions Unlimited doesn’t take lightly. To learn more about our support services, give us a call at 217-428-6449.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 21 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Smartphone End of Support Facebook Vendor Management IT solutions Spyware Techology Identities Experience Two Factor Authentication Unsupported Software Hiring/Firing Saving Money Data Recovery Big Data Scalability Ransomware Devices Cache Email Social Media Security Operating System Specifications Work/Life Balance Managed Service Provider Upgrades Conferencing Hacking Save Money BDR Mobile Device Management Android Video Games Sync Microsoft Excel Smartphones Networking HBO Application Google Docs Computers Data Breach Hardware Emails Shortcut Save Time Firewall Phishing Customer Information Technology Mobility Laptop Webinar Worker Commute Settings Professional Services Monitors Privacy Alert Hackers Disaster Recovery IT Support Windows Ink Managed IT Services Malware Telephone Systems Applications Compliance VPN Small Business Credit Cards Spam Blocking Comparison Project Management Regulation Server Hosted Solutions Storage IT Solutions BYOD Apps Efficiency Samsung Business Computing Hosted Solution Legislation SaaS Automobile hacker Audiobook PDF Marketing Tech Support Wireless Charging Gadgets Excel Managed IT Innovation Money Administration Computer Fan Tablets Workers Value Root Cause Analysis Productivity WiFi The Internet of Things Data Storage Charger Private Cloud Unified Threat Management Virtualization Evernote Business Management Productivity App Touchscreen Health Best Practice Device Security Chrome Holiday Remote Computing Business Intelligence Data Loss Commerce iPhone Outsourced IT Wireless Virtual Reality Relocation Recovery Redundancy Flexibility Hard Disk Drive Lifestyle Internet exploMicrosoft Patch Management Microsoft Office NFL iOS Office Tips Document Management Thank You Word Spam Encryption Government Tip of the Week Bring Your Own Device Artificial Intelligence Data Employer-Employee Relationship Google Legal Outlook Chromecast Software as a Service Business Owner Fraud Congratulations Computer Accessories Google Drive Cost Management Automation Cortana Monitor Two-factor Authentication Microsoft Reputation Communications Computing Infrastructure Data Backup OneNote How To Passwords WIndows Server 2008 User Tips Business Continuity Cleaning Budget Windows 10 Computer Care Internet of Things Transportation Hard Drives Edge Politics intranet Managed IT Service Proactive IT Wireless Technology VoIP Screen Mirroring Hybrid Cloud FAQ Safety Google Maps Law Enforcement Bluetooth Data Management How to Keyboard Data storage Bandwidth Advertising Travel Mobile Devices Instant Messaging IT budget Gifts WannaCry Files Avoiding Downtime Battery Internet Exlporer Rootkit IT Management Assessment Social Engineering Audit Windows 10s Employer Employee Relationship Vulnerability Books Data Protection Colocation Business IT Support Smart Technology Mobile Content Troubleshooting Robot Emergency Education Risk Management Entertainment Computer Workplace Tips Collaboration Retail Scam HaaS Backup Technology Apple Licensing Office 365 Router Humor Cybersecurity Best Practices Consultant Identity Theft Network Personal Information Television Public Computer Phone System Worker Sports Training MSP IT Services Dark Web Windows 10 HIPAA Cast Cloud Computing Office Network Security Maintenance Ciminal Password Data Security Meetings Wi-Fi Internet Windows File Sharing Miscellaneous Remote Monitoring Nanotechnology Mobile Device Physical Security Going Green Content Filtering Cloud Sales CrashOverride Benefits Microsoft Word Touchpad Blockchain Solid State Drive User Error eWaste Electronic Medical Records Augmented Reality Upgrade USB Managed IT Services Black Market Quick Tips Loyalty Software Shadow IT Updates Adobe Public Cloud Users Downtime Search Browser Gmail History Cybercrime

Sign Up for Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *