Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Leave Fake Tech Support Hanging

How to Leave Fake Tech Support Hanging

Tech support is there to help you, except when it isn’t. Many fraudsters will pose as a support technician to gain a target’s trust, only to cause them serious issues. To keep your organization safe, make sure that you are able to spot the warning signs of tech support fraud.

Incoming Message
You may get a call or email from someone asking about your computer’s status. This someone will likely claim to be from a recognizable technology company, like Microsoft or McAfee. You should not believe them. Companies of Microsoft’s size and success will not be the ones to reach out to check if there is an issue with your computer.

Besides, imagine how many employees Microsoft would need to have to reach out to every Microsoft customer. When there were over 100 million users of Office 365’s commercial edition in 2017, plus 27 million users of Office 365 Home & Personal (as stated in the shareholder letter that was released), there's just no way that Microsoft would devote that kind of manpower to collect that kind of information.

Additionally, it has been agreed between the FTC, National Cyber Security Alliance and yes, Microsoft, that no tech company will call you on the phone unsolicited, or send you an email with the same message.

Stay Up-to-Date
One of the best defenses against almost any threat, including tech support fraud, is to keep everything updated. This includes your operating system and antivirus and antimalware. This will help to minimize the damage of a tech support scam. IT may also consider installing ad blockers to maximize your protection.

Keep Credit Cards Close to the Chest
If a member of “tech support” asks for your credit card number after calling you first, don’t give it to them and hang up (assuming you let them get that far). If you have already given out your card number, call and make sure that any charges you didn’t make are reversed and then report the incident to the FTC Complaint Assistant.

Make Sure Your Employees are In-the-Know
It is important to remember that you aren’t the only person in the company that could fall victim to tech support fraud. Your employees need to be aware of the threat, and should be able to identify the warning signs as well. Your security is only as strong as its weakest link, and more often than not, the weakest link is your end users. Therefore, it is crucial that they are educated and evaluated on their knowledge of best practices.

Tech support is meant to help you out, which is a responsibility that Velocity Technology Partners doesn’t take lightly. To learn more about our support services, give us a call at (800) - 983 - 5765.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 27 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

WIndows Server 2008 Alert Apple Management Antivirus Legal Server SaaS Content Filter Cast Spyware Communication Spam Screen Mirroring Softphones Flexibility Network Tablets MSP Identity Twitter Malware Language Mobility IT Support Risk Management Cleaning Computing IT support Identities Blockchain OneNote Safety Identity Theft Vendor Management Fraud Maintenance Work/Life Balance Gmail Thank You IT budget Data Theft Applications Security Virus Sync Router Communications IoT Android PowerPoint Workers Hackers Updates Social Media Streaming Media Financial Technology Business Continuity Gifts Network Security Microsoft Word Email Wireless Internet Hardware Google Assistant Cortana Mobile Security Data Backup Privacy Computers Law Enforcement Encryption Business Computing iPhone Two-factor Authentication Vulnerability Hosted Solutions BYOD Computer Forensics Managed Service Provider Windows 10 Audit Telephone Systems Cloud Computing eWaste Wireless Technology Data Recovery Unsupported Software Google Maps Business Microsoft BDR Efficiency Employer-Employee Relationship Cost Management FAQ Operating System Politics Chromebook VoIp Ransomware Passwords Internet Edge Artificial Intelligence intranet Proactive IT Licensing Data Management Device Security Tip of the Week Holiday App Small Business Mobile Device Management Software Microsoft Office Government Commerce Data Privacy Redundancy Data Breach Data Protection App store Data Storage Value Microsoft Excel Shortcut Managed IT Services Hard Drive Internet of Things Ciminal Automation Saving Money Smartphones Technology HBO IT Services Travel Websites Excel Adobe User Tips Tech Support Sports Backup Printing Devices Wireless Charging Comparison Congratulations Smartphone The Internet of Things Charger Productivity Storage User Error Virtualization Analysis Conferencing Retail History Disaster Recovery Gadgets Innovation Hosted Solution Windows Ink Legislation Tech Term Data Managed IT Apps Phishing IT Management Monitoring Google Lifestyle Sales WiFi Smart Tech Outsourced IT Connectivity File Sharing Evernote Cloud WannaCry Google Docs Cybersecurity Patch Management VPN Best Practices Project Management Personal Information Big Data Outlook Wi-Fi Emergency Word Windows Networking Browser Money Proactive Computer Specifications Software as a Service Data Security Cybercrime IT Solutions Collaboration Chrome Office 365 Telephone Content Filtering Data Loss Mobile Devices Best Practice Marketing Business Management NFL Credit Cards Google Drive Social Engineering Update