Contact us today!

Network Solutions Unlimited Blog

Tip of the Week: How to Spot a Scam

Tip of the Week: How to Spot a Scam

What would you do if you sat down at your desk one morning, coffee still kicking in, to discover a pop-up message on your computer announcing that Microsoft has detected a fatal issue with your workstation, and if they aren’t allowed to remote in and fix it, the entire network could be at risk? Would you be able to, in the heat of the moment, recognize it for the scam that it is and disregard it?

Tech support scams are only too common, as blending phishing with social engineering has proven to be an effective means of scamming users. Today, our tip will cover how to recognize some of these scams so that they may be avoided… but first, it is important to recognize that scams like these are a serious problem everywhere, and not just for those targeted.

An Issue Around The World
These scams target users all over the world, although the impact is most clearly felt by users in China, India, and the United States. Regardless, other regions are also subjected to tech support scams - and India gets hit with a double-whammy.

The service-and-support-rep-in-India stereotype has its roots in a truly unfortunate reality. The level of competition in the job market is astronomical in India, especially for the generation that should be entering the workforce right about now. For example, a state-owned bank received over one and a half million applications for just one and a half thousand job openings. This job shortage affects even those with high qualifications. Someone could have a Master’s degree in business administration and have to fight for a position as a street sweeper.

Circumstances like these make any job opportunity to inherently be too good to pass up, even if your work comes at the expense of others.

Indian call centers use these circumstances to their advantage, using a secretive and convoluted process to hire those young people in search of a job, often not even revealing the identity of their employer. Applicants are often charged money for their attendance at interviews and job trainings, only being given a start date if they are accepted.

Many of these positions, however, are not the customer support jobs that were expected. Instead of providing customer service, these recruits are used as the initiators of a scam. They call their target and deliver the scam’s pitch, whatever it may be, and send their newly terrified connection to a senior scamming employee who ends the scam. These workers are soon stuck in an unenviable position: their pay is usually terrible and the emotional burden significant, yet there aren’t really any other avenues to make money in the overburdened job market.

As a result, it isn’t long before these scammers, themselves exploited, embrace their position and apply themselves to exploiting others simply to fulfill their need to survive.

Spotting Scams
Unfortunately, even if you feel for the person on the other end of a scam call, you need to protect yourself and your business from their influence. To do so, you need to be able to identify these scams. Below are a few tips for doing so:

  • Who’s On the Line? - Basic rule of thumb: if you get a call from someone claiming to be from “Microsoft” or any other technology brand, it’s almost a sure bet that they aren’t. These organizations aren’t in the habit of reaching out to people first, despite what your (potentially spoofed) caller ID might tell you.
  • Not Something You Want Linked to You - Scammers are also fond of using links, sharing them in an email to send the user to a website that displays plenty of falsified pop-up warnings. These links shouldn’t be clicked, and if you do inadvertently or are presented with a pop-up alert message, restart your computer. Other scammers will use search engines against their victims, using sponsored ads to target those looking for help by appearing at the top of results pages. While Google has put the kibosh on Remote Support IT advertisements, these links should still be avoided as they haven’t stopped everything.
  • Keep Control - Many scammers will pose as an IT resource and request remote access to a computer. Unless you know for a fact that someone from a third party is completely trustworthy, never surrender your computer to anyone. Doing so could easily allow a scammer to steal your data, or do something worse.

The Easiest Way to Avoid Scams
If you just so happen to have a trusted IT resource on your side, you won’t have to worry about scams like these - after all, you can have your provider check any claims and thereby protect your business from fraudsters. Network Solutions Unlimited can be that trusted IT provider for you. Give us a call at 217-428-6449 to learn more, and in the meantime, tell us about any scams you’ve spotted in the comments!

Here Is a List of this Year’s Most Devastating Hac...
Can You Afford Your IT Initiatives?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, December 12 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Hyperlink Chromecast Social Media Amazon Safety Worker Commute Bring Your Own Device Application Colocation Content Filter Remote Monitoring Computer Fan Laptop Information Technology Gamification Financial Technology Scam Keyboard Shortcuts Computer Care Wi-Fi Business Management Computing Infrastructure Sync Unified Threat Management Projects Encryption Augmented Reality Benefits IT Services Touchscreen Entertainment Data Breach Data Management Workers Ciminal Phishing Computer Forensics BDR Wasting Money Update Monitoring Project Management Upgrade Files Content Computer Disaster Recovery Windows Ink Microsoft Word Content Filtering Cortana Legislation Cloud Touchpad Efficiency BYOD Outlook Hard Drive History Bluetooth Virtualization IT Solutions Legal Users PDF Telephone Document Management Office 365 Windows 7 Techology Data Storage Innovation Cybersecurity Robot Ransomware Sales Save Money Public Computer Commerce Streaming Media Work/Life Balance Mobile Devices IT solutions Transportation Avoiding Downtime Books Remote Workers Communication Phone System VPN Outsourced IT Alexa for Business Monitor Printing Scalability Risk Management Personal Information Relocation iPhone Downtime Computers Windows iOS eWaste Information Black Market Hosted Solution Professional Services Hard Disk Drive Apple Audiobook Google Assistant Bandwidth Retail Hybrid Cloud Memory Two Factor Authentication Settings IT budget Students Small Business Marketing Regulation File Sharing Solid State Drive Software as a Service Shadow IT Managed Service MSP intranet Redundancy Root Cause Analysis Adobe Budget Managed IT Services Alert Data Loss Word Access Control Virtual Assistant Public Cloud Dark Web User Error NFL Artificial Intelligence Tech Term Going Green CrashOverride Identity Malware Holiday Operating System End of Support Computing Testing Physical Security App store Battery IT Management SaaS Vendor Management Human Resources Cast Politics Unsupported Software HaaS Unified Communications Virtual Reality Emergency Training Employer-Employee Relationship Internet Exlporer Thank You Printers Recovery Data Recovery Cloud Computing Analysis Cleaning Password Antivirus Miscellaneous Router Meetings Instant Messaging Data storage Television Proactive IT Shortcut Workplace Tips Internet of Things Money Automation Microsoft Excel WIndows Server 2008 Backup Identity Theft Google Docs Samsung Co-Managed Services Accessory Electronic Medical Records Internet Charger Office Tips Peripheral Employee-Employer Relationship Save Time Chromebook IoT Employer Employee Relationship Cost Management Proactive Best Practice SMB Mobile Device Management Advertising Mobile Windows 10s User Tips Business Computing Data Theft Utility Computing Productivity Value Reputation Hardware Wasting Time Managing Stress Screen Mirroring Company Culture Server Social Engineering hacker How To IT Support Customer Language Google Maps Gifts Financial Technology Business Technology Audit WannaCry Network File Storage Worker Smart Tech Google Drive Monitors Payroll Spam Blocking Smartphones Travel Twitter Software Licensing Hackers Computer Accessories Conferencing Storage OneNote Collaboration Data Security Browser Vendor Admin The Internet of Things Management Websites Gadgets IT Support Video Games How to Smart Technology Communications Government Credit Cards Tip of the Week Wireless Charging Data Display FAQ Privacy Assessment Hard Drives Devices Apps Blockchain Consultant Data Protection Hiring/Firing Android Business Continuity Saving Money Vulnerability Mobility Troubleshooting Hacking Keyboard App Comparison WiFi Managed IT Administration Camera VoIP Managed Service Provider Data Privacy Lifestyle Mobile Security Business Quick Tips Data Backup Compliance Windows 10 Experience Email Big Data Wireless Internet Flexibility Education Tech Support WPA3 Saving Time Nanotechnology Identities Spam Windows 10 Spyware Internet exploMicrosoft Security Office Health IT Service Cache Connectivity HIPAA Private Cloud Virus Smartphone Fraud PowerPoint Business Owner Facebook Emails Firewall Best Practices Loyalty Managed IT Services Passwords Networking Microsoft Excel Specifications Two-factor Authentication Telephone Systems Sports USB Gmail Congratulations Applications Search Rootkit Upgrades Webinar Chrome Google Productivity Updates Device Security Microsoft Office Wireless Technology Remote Computing Cybercrime Evernote Mobile Device Edge Law Enforcement Business Intelligence Automobile Humor HBO Network Security Wireless Hosted Solutions Patch Management Managed IT Service Tablets Maintenance