Velocity Technology Partners Blogs

How to Leave Fake Tech Support Hanging

How to Leave Fake Tech Support Hanging

Tech support is there to help you, except when it isn’t. Many fraudsters will pose as a support technician to gain a target’s trust, only to cause them serious issues. To keep your organization safe, make sure that you are able to spot the warning signs of tech support fraud.

Incoming Message
You may get a call or email from someone asking about your computer’s status. This someone will likely claim to be from a recognizable technology company, like Microsoft or McAfee. You should not believe them. Companies of Microsoft’s size and success will not be the ones to reach out to check if there is an issue with your computer.

Besides, imagine how many employees Microsoft would need to have to reach out to every Microsoft customer. When there were over 100 million users of Office 365’s commercial edition in 2017, plus 27 million users of Office 365 Home & Personal (as stated in the shareholder letter that was released), there's just no way that Microsoft would devote that kind of manpower to collect that kind of information.

Additionally, it has been agreed between the FTC, National Cyber Security Alliance and yes, Microsoft, that no tech company will call you on the phone unsolicited, or send you an email with the same message.

Stay Up-to-Date
One of the best defenses against almost any threat, including tech support fraud, is to keep everything updated. This includes your operating system and antivirus and antimalware. This will help to minimize the damage of a tech support scam. IT may also consider installing ad blockers to maximize your protection.

Keep Credit Cards Close to the Chest
If a member of “tech support” asks for your credit card number after calling you first, don’t give it to them and hang up (assuming you let them get that far). If you have already given out your card number, call and make sure that any charges you didn’t make are reversed and then report the incident to the FTC Complaint Assistant.

Make Sure Your Employees are In-the-Know
It is important to remember that you aren’t the only person in the company that could fall victim to tech support fraud. Your employees need to be aware of the threat, and should be able to identify the warning signs as well. Your security is only as strong as its weakest link, and more often than not, the weakest link is your end users. Therefore, it is crucial that they are educated and evaluated on their knowledge of best practices.

Tech support is meant to help you out, which is a responsibility that Velocity Technology Partners doesn’t take lightly. To learn more about our support services, give us a call at (800) - 983 - 5765.

Tip of the Week: Learn How to Use the Microsoft Ed...
Redundancy: a Benefit When Dealing in Data
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Evernote Best Practices Data Protection Maintenance NFL Twitter Security Mobile Security Application Financial Technology Tip of the Week Unsupported Software Encryption Proactive App Hosted Solutions Computers eWaste WiFi Email Technology Flexibility Language Data Theft Cost Management Travel Malware Google Maps Audit Data Security Google Assistant Data Backup Social Media IT support Disaster Recovery Hard Drive Network History Smartphones Cast Monitoring Screen Mirroring VPN Windows Comparison Fraud Automation Microsoft Office iPhone Word Software Hybrid Cloud Gamification MSP Chromebook Saving Money Charger Gadgets Microsoft Excel Law Enforcement Storage Company Culture Networking Adobe Money Softphones Virus Apps Government Content Filtering BDR Unified Communications Spam Passwords Gifts Smart Tech Personal Information Thank You Legal Communication Business Management Conferencing Windows 10 Ransomware Data Loss Streaming Media Outsourced IT IT Management Project Management Shortcut Hosted Solution Hackers Tech Term Work/Life Balance Wi-Fi Chrome Social Engineering Artificial Intelligence Mobile Device Management Computer Forensics Two-factor Authentication Google Docs IT Services Data Legislation Vendor Management Data Privacy Retail WIndows Server 2008 Cleaning Google intranet Backup Gmail Android Compliance Identity Theft Updates Blockchain Risk Management Holiday Update Proactive IT Licensing Tech Support Managed IT Services Data Storage Telephone Browser Efficiency FAQ WannaCry Telephone Systems Sync Privacy Analysis Innovation Smartphone Managed IT Remote Monitoring Remote Computing Vulnerability Software as a Service Business Computing Apple Marketing Router Ciminal Sales Connectivity Hardware Cybercrime HBO IT Support User Error Mobile Devices Antivirus Computing Bring Your Own Device Computer Identity Mobility Value Redundancy The Internet of Things Politics IT budget Wireless Technology Productivity Cybersecurity BYOD Microsoft Alert Windows Ink Lifestyle Data Breach Collaboration Communications Operating System Cloud Computing Device Security IT Solutions Microsoft Word App store Google Drive File Sharing Outlook Specifications Internet of Things Managing Stress Content Filter Sports Identities Server Excel Managed IT services Patch Management Tablets Data Recovery Students PowerPoint SaaS Big Data Cloud Office 365 Memory Employer-Employee Relationship Wireless Internet Managed Service Provider Credit Cards Commerce Emergency IoT Financial Cortana Applications Workers Management User Tips Safety Business Continuity Phishing Data Management Small Business Printing Business Congratulations Spyware Best Practice Edge Network Security Websites Wireless Charging Virtualization Internet Devices Regulation Education VoIp OneNote