Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Tip of the Week: How to Spot a Scam

Tip of the Week: How to Spot a Scam

What would you do if you sat down at your desk one morning, coffee still kicking in, to discover a pop-up message on your computer announcing that Microsoft has detected a fatal issue with your workstation, and if they aren’t allowed to remote in and fix it, the entire network could be at risk? Would you be able to, in the heat of the moment, recognize it for the scam that it is and disregard it?

Tech support scams are only too common, as blending phishing with social engineering has proven to be an effective means of scamming users. Today, our tip will cover how to recognize some of these scams so that they may be avoided… but first, it is important to recognize that scams like these are a serious problem everywhere, and not just for those targeted.

An Issue Around The World
These scams target users all over the world, although the impact is most clearly felt by users in China, India, and the United States. Regardless, other regions are also subjected to tech support scams - and India gets hit with a double-whammy.

The service-and-support-rep-in-India stereotype has its roots in a truly unfortunate reality. The level of competition in the job market is astronomical in India, especially for the generation that should be entering the workforce right about now. For example, a state-owned bank received over one and a half million applications for just one and a half thousand job openings. This job shortage affects even those with high qualifications. Someone could have a Master’s degree in business administration and have to fight for a position as a street sweeper.

Circumstances like these make any job opportunity to inherently be too good to pass up, even if your work comes at the expense of others.

Indian call centers use these circumstances to their advantage, using a secretive and convoluted process to hire those young people in search of a job, often not even revealing the identity of their employer. Applicants are often charged money for their attendance at interviews and job trainings, only being given a start date if they are accepted.

Many of these positions, however, are not the customer support jobs that were expected. Instead of providing customer service, these recruits are used as the initiators of a scam. They call their target and deliver the scam’s pitch, whatever it may be, and send their newly terrified connection to a senior scamming employee who ends the scam. These workers are soon stuck in an unenviable position: their pay is usually terrible and the emotional burden significant, yet there aren’t really any other avenues to make money in the overburdened job market.

As a result, it isn’t long before these scammers, themselves exploited, embrace their position and apply themselves to exploiting others simply to fulfill their need to survive.

Spotting Scams
Unfortunately, even if you feel for the person on the other end of a scam call, you need to protect yourself and your business from their influence. To do so, you need to be able to identify these scams. Below are a few tips for doing so:

  • Who’s On the Line? - Basic rule of thumb: if you get a call from someone claiming to be from “Microsoft” or any other technology brand, it’s almost a sure bet that they aren’t. These organizations aren’t in the habit of reaching out to people first, despite what your (potentially spoofed) caller ID might tell you.
  • Not Something You Want Linked to You - Scammers are also fond of using links, sharing them in an email to send the user to a website that displays plenty of falsified pop-up warnings. These links shouldn’t be clicked, and if you do inadvertently or are presented with a pop-up alert message, restart your computer. Other scammers will use search engines against their victims, using sponsored ads to target those looking for help by appearing at the top of results pages. While Google has put the kibosh on Remote Support IT advertisements, these links should still be avoided as they haven’t stopped everything.
  • Keep Control - Many scammers will pose as an IT resource and request remote access to a computer. Unless you know for a fact that someone from a third party is completely trustworthy, never surrender your computer to anyone. Doing so could easily allow a scammer to steal your data, or do something worse.

The Easiest Way to Avoid Scams
If you just so happen to have a trusted IT resource on your side, you won’t have to worry about scams like these - after all, you can have your provider check any claims and thereby protect your business from fraudsters. Network Solutions Unlimited can be that trusted IT provider for you. Give us a call at 217-428-6449 to learn more, and in the meantime, tell us about any scams you’ve spotted in the comments!

Here Is a List of this Year’s Most Devastating Hac...
Can You Afford Your IT Initiatives?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 20 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Search Windows Consultant Cost Management Workplace Tips Experience Holiday Updates Managed Service Keyboard Two-factor Authentication Artificial Intelligence PDF Windows 10 Cloud Wasting Money Gifts Hard Drives How To Networking Instant Messaging Computing Infrastructure Password Software as a Service Office 365 Charger Files Spam Avoiding Downtime Data storage Customer Windows 10s Phone System Physical Security Congratulations Computer Care Miscellaneous Conferencing Humor Storage Colocation Managed IT Services App store Cybercrime Privacy Managing Stress Sales Application Memory Social Engineering Facebook VPN Wasting Time Wireless HaaS Saving Money Politics Managed IT Service Thank You Virus Microsoft Excel Licensing Chromebook Techology Going Green Bluetooth Save Money Collaboration Spam Blocking IT budget Health Ciminal Evernote Cortana Workers HIPAA Gamification Data Management Tip of the Week Hybrid Cloud Specifications Data Loss Language Relocation Small Business Employer-Employee Relationship Project Management Gadgets Data Training Gmail Word Malware Adobe Computer Fan Analysis Data Breach Communications Telephone Websites Loyalty IoT Travel Sports Maintenance Windows 10 Management Wireless Internet Mobile Security Communication Public Computer Patch Management Server Content Lifestyle Computer Forensics User Error Internet exploMicrosoft Personal Information Information Technology Encryption Sync Windows Ink Webinar Cast Antivirus Television App Administration Upgrade Best Practice Monitoring Public Cloud Spyware Solid State Drive Internet Exlporer Office Touchscreen Data Recovery Vendor Management Chrome History Excel Internet of Things WiFi hacker Mobility Battery Employer Employee Relationship Audit Proactive IT Social Media How to Bring Your Own Device USB Streaming Media Identity Flexibility Cloud Computing Proactive Blockchain Business Continuity Quick Tips Data Security Mobile Device Management Budget Nanotechnology WIndows Server 2008 Hyperlink Network Security Tech Term Outlook Efficiency Backup Root Cause Analysis Phishing Financial Technology Black Market Rootkit Google Drive Apple Legal Apps Laptop NFL Government Transportation HBO Robot Computers Amazon Printing Edge Google Maps Meetings Data Backup Education IT Support Two Factor Authentication Office Tips Upgrades End of Support Document Management Data Theft CrashOverride Passwords VoIP iPhone Tablets Shadow IT Hardware WannaCry Chromecast Alexa for Business Productivity PowerPoint Hacking Augmented Reality Books Windows 7 Emails Software Co-Managed Services Samsung Scam Professional Services User Tips Virtualization Worker Printers Mobile Devices Business Hard Disk Drive Worker Commute Save Time Managed Service Provider Commerce IT Support Comparison Browser Google Assistant Bandwidth File Storage Hosted Solution Vulnerability Disaster Recovery Vendor Credit Cards Identities Google Virtual Reality Reputation Cleaning Smart Technology Financial Scalability Update Business Computing Telephone Systems Assessment Compliance Security Data Storage Business Owner Regulation Ransomware WPA3 Work/Life Balance Legislation Innovation Display File Sharing Microsoft Computer Dark Web Users Alert Redundancy Android Data Protection Wireless Charging Big Data Wi-Fi Value Content Filtering Entertainment Managed IT Services Operating System Smartphone Identity Theft MSP Accessory Mobile Device Electronic Medical Records Outsourced IT Money Smart Tech IT Management Shortcut Mobile Business Management Connectivity Remote Computing Touchpad IT solutions Hiring/Firing Information Monitor Marketing Applications Smartphones eWaste Benefits Firewall Settings Advertising Devices The Internet of Things Hard Drive Monitors Network Recovery Unified Communications Cybersecurity Hosted Solutions Screen Mirroring Computing Safety Business Intelligence Unified Threat Management Cache intranet Students Router BYOD Camera Automobile Troubleshooting Virtual Assistant IT Solutions Fraud Automation SaaS Best Practices BDR Business Technology Remote Monitoring Data Privacy FAQ Google Docs Technology Productivity Wireless Technology Projects Unsupported Software Content Filter Video Games Law Enforcement Tech Support Email Downtime Microsoft Word Peripheral Microsoft Office Testing Risk Management Hackers Company Culture Employee-Employer Relationship Retail Managed IT OneNote Twitter Audiobook Device Security Emergency Computer Accessories Internet Private Cloud iOS IT Services