croom new

How to Leave Fake Tech Support Hanging

How to Leave Fake Tech Support Hanging

Tech support is there to help you, except when it isn’t. Many fraudsters will pose as a support technician to gain a target’s trust, only to cause them serious issues. To keep your organization safe, make sure that you are able to spot the warning signs of tech support fraud.

Incoming Message
You may get a call or email from someone asking about your computer’s status. This someone will likely claim to be from a recognizable technology company, like Microsoft or McAfee. You should not believe them. Companies of Microsoft’s size and success will not be the ones to reach out to check if there is an issue with your computer.

Besides, imagine how many employees Microsoft would need to have to reach out to every Microsoft customer. When there were over 100 million users of Office 365’s commercial edition in 2017, plus 27 million users of Office 365 Home & Personal (as stated in the shareholder letter that was released), there's just no way that Microsoft would devote that kind of manpower to collect that kind of information.

Additionally, it has been agreed between the FTC, National Cyber Security Alliance and yes, Microsoft, that no tech company will call you on the phone unsolicited, or send you an email with the same message.

Stay Up-to-Date
One of the best defenses against almost any threat, including tech support fraud, is to keep everything updated. This includes your operating system and antivirus and antimalware. This will help to minimize the damage of a tech support scam. IT may also consider installing ad blockers to maximize your protection.

Keep Credit Cards Close to the Chest
If a member of “tech support” asks for your credit card number after calling you first, don’t give it to them and hang up (assuming you let them get that far). If you have already given out your card number, call and make sure that any charges you didn’t make are reversed and then report the incident to the FTC Complaint Assistant.

Make Sure Your Employees are In-the-Know
It is important to remember that you aren’t the only person in the company that could fall victim to tech support fraud. Your employees need to be aware of the threat, and should be able to identify the warning signs as well. Your security is only as strong as its weakest link, and more often than not, the weakest link is your end users. Therefore, it is crucial that they are educated and evaluated on their knowledge of best practices.

Tech support is meant to help you out, which is a responsibility that Eclipse Integrated Systems doesn’t take lightly. To learn more about our support services, give us a call at 800-340-0505.

Tip of the Week: Learn How to Use the Microsoft Ed...
At What Point Does a Service Become Spyware?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, August 19 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Business Computing Network Security Google Hackers Malware Internet Software Business Management Microsoft Hosted Solutions Computer Tech Term Innovation Windows 10 User Tips Backup Productivity Productivity Business Cybersecurity Apps Windows Email Mobile Devices Managed IT Services Efficiency Hardware Smartphones Cybercrime Saving Money Virtualization Browser Smartphone Communication Disaster Recovery Small Business communications Data Recovery Operating System VoIP Data Backup Law Enforcement Internet of Things Collaboration Passwords Ransomware Business Continuity Android Data Security IT Support Microsoft Office Mobile Device Management Network Telephone Systems Server Office 365 IT Support BDR Miscellaneous Wireless Quick Tips Money Holiday Phishing Workplace Tips Mobility Chrome Social Media Unsupported Software Application Vulnerability App Health Information Technology Update Cloud Computing Password Outsourced IT Risk Management Best Practice IT Services Gadgets Google Drive Social Cost Management Employer-Employee Relationship Data Wi-Fi Government Shortcut USB Patch Management Artificial Intelligence Antivirus Alert Computers Streaming Media Two-factor Authentication Upgrade Managed IT Identity Theft Hacking User Error Data Management Politics Save Money Sports Spam Proactive IT Work/Life Balance Users Managed Service Provider Facebook Windows 10 Blockchain Current Events Automation Office tips Gmail Automobile Data Storage Tech Support Apple Samsung OneNote Cleaning Personal Information Mobile Security Transportation eWaste Data Protection Legal Information Maintenance Mobile Computing DDoS Internet Exlporer WiFi Wireless Technology Managed IT Services Search The Internet of Things Analytics Hosted Solution Business Intelligence Flexibility Audit Bandwidth Company Culture Save Time Excel Networking Encryption Compliance VPN Television Router History Devices Social Engineering SaaS Commerce Telephony Humor Computer Care End of Support Battery Cortana Remote Computing Private Cloud Recovery iPhone Managing Stress Google Docs Meetings HaaS Wireless Charging Fraud Going Green Office Adobe Microsoft Word Chromecast Advertising Threat Comparison Virus Video Games Voice over Internet Protocol Files Printing Medical IT Microsoft Excel Identities IT solutions G Suite Music Data Breach Nanotechnology Reputation Analysis Word Edge Consultant Movies Credit Cards Scam Applications Mobile Device PowerPoint Screen Mirroring Specifications Hiring/Firing Laptop iOS Proactive Training Running Cable Google Assistant Virtual Reality GDPR File Sharing Language Windows 10s Bring Your Own Device Outlook Evernote Employer Employee Relationship Root Cause Analysis Identity Black Market Managed Service Windows Ink Ciminal Robot Touchscreen SharePoint Entertainment IT Management Websites Amazon Licensing Device Security Bluetooth Distributed Denial of Service Connectivity Cast Sales Benefits Touchpad Trending Settings Value Education Storage Data storage Solid State Drive Hybrid Cloud Big Data Computer Accessories Marketing Augmented Reality Data Privacy Google Maps Project Management Lithium-ion battery Electronic Medical Records Unified Communications IT Solutions FAQ Data Theft Scalability Virtual Assistant Travel Administrator Fax Server PDF Downloads Worker Commute BYOD Retail Smart Technology Computer Fan Hacker Hard Disk Drive Managed IT Service Books Sync Workers Hard Drive Instant Messaging Data Loss IT budget Safety Emails Teamwork RAM Experience Charger Computing How To Plug-In Tablets Spyware Access Unified Threat Management Text Messaging Trends Conferencing Uninterrupted Power Supply Operating Sysytem WannaCry Updates Budget Internet Explorer Point of Sale Legislation Keyboard Cables Vendor Management Wearable Technology Chromebook Reporting Webinar Microsoft Teams Phone System WIndows Server 2008 App store Remote Monitoring and Management NFL Upgrades A.I. HBO Gifts Avoiding Downtime Worker Disaster Dark Web Cache Twitter Error Relocation Regulation Remote Monitoring CrashOverride Emergency Monitors

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login