croom new

Eclipse Integrated Systems Blog

How to Leave Fake Tech Support Hanging

How to Leave Fake Tech Support Hanging

Tech support is there to help you, except when it isn’t. Many fraudsters will pose as a support technician to gain a target’s trust, only to cause them serious issues. To keep your organization safe, make sure that you are able to spot the warning signs of tech support fraud.

Incoming Message
You may get a call or email from someone asking about your computer’s status. This someone will likely claim to be from a recognizable technology company, like Microsoft or McAfee. You should not believe them. Companies of Microsoft’s size and success will not be the ones to reach out to check if there is an issue with your computer.

Besides, imagine how many employees Microsoft would need to have to reach out to every Microsoft customer. When there were over 100 million users of Office 365’s commercial edition in 2017, plus 27 million users of Office 365 Home & Personal (as stated in the shareholder letter that was released), there's just no way that Microsoft would devote that kind of manpower to collect that kind of information.

Additionally, it has been agreed between the FTC, National Cyber Security Alliance and yes, Microsoft, that no tech company will call you on the phone unsolicited, or send you an email with the same message.

Stay Up-to-Date
One of the best defenses against almost any threat, including tech support fraud, is to keep everything updated. This includes your operating system and antivirus and antimalware. This will help to minimize the damage of a tech support scam. IT may also consider installing ad blockers to maximize your protection.

Keep Credit Cards Close to the Chest
If a member of “tech support” asks for your credit card number after calling you first, don’t give it to them and hang up (assuming you let them get that far). If you have already given out your card number, call and make sure that any charges you didn’t make are reversed and then report the incident to the FTC Complaint Assistant.

Make Sure Your Employees are In-the-Know
It is important to remember that you aren’t the only person in the company that could fall victim to tech support fraud. Your employees need to be aware of the threat, and should be able to identify the warning signs as well. Your security is only as strong as its weakest link, and more often than not, the weakest link is your end users. Therefore, it is crucial that they are educated and evaluated on their knowledge of best practices.

Tech support is meant to help you out, which is a responsibility that Eclipse Integrated Systems doesn’t take lightly. To learn more about our support services, give us a call at 800-340-0505.

Tip of the Week: Learn How to Use the Microsoft Ed...
At What Point Does a Service Become Spyware?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, February 24 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Network Security Internet Google User Tips Hackers Productivity Malware Software Business Management Microsoft Innovation Tech Term Efficiency Hosted Solutions Computer Backup Windows 10 Email Browser Business Mobile Devices Cybersecurity Smartphones Apps Hardware Managed IT Services Productivity Communication Collaboration Passwords Small Business Smartphone Internet of Things Data Recovery Data Backup Windows Saving Money Android Virtualization Holiday Cybercrime communications Data Security VoIP Mobile Device IT Support Business Continuity Mobility Data Operating System Workplace Tips Law Enforcement Wireless Disaster Recovery Microsoft Office Network Ransomware IT Services Miscellaneous IT Support Office 365 Users Windows 10 Cloud Computing Money Mobile Device Management Telephone Systems Outsourced IT Phishing Chrome Wi-Fi Gadgets Server BDR Update Quick Tips Social Media Password Best Practice Google Drive Social Facebook Risk Management Application Information Technology App Health Cost Management Employer-Employee Relationship Unsupported Software Government Vulnerability Upgrade Patch Management Politics Data Management Managed IT Services Save Money Sports Two-factor Authentication Work/Life Balance Streaming Media Managed IT Networking Bandwidth User Error Automation Office tips Current Events Marketing Spam Personal Information Proactive IT USB Artificial Intelligence Antivirus Alert Managed Service Provider Computers Blockchain Information Identity Theft Hacking Shortcut Connectivity Samsung OneNote Apple Cleaning VPN Word Router Data Protection Encryption Applications Maintenance eWaste Telephony Humor History Compliance Social Engineering End of Support Battery Mobile Computing DDoS Training WiFi Outlook Remote Computing Touchscreen Instant Messaging Private Cloud Audit Excel Company Culture Recovery Storage Save Time HaaS iPhone Managing Stress Devices Television SaaS Commerce BYOD Automobile Computer Care Tech Support Cortana Remote Monitoring and Management Gmail Access Control Transportation G Suite Medical IT Internet Exlporer Legal Mobile Security The Internet of Things Google Docs Analytics Wireless Technology Wireless Charging Search Office Hosted Solution Fraud Meetings Business Intelligence Going Green Data Storage Flexibility Managed Service Education Authorization Data storage Microsoft Excel Identities Big Data Websites Amazon IT solutions Trending Data Breach Value Dark Web Scam Nanotechnology Lithium-ion battery Edge Hybrid Cloud Consultant Credit Cards Administrator PDF Worker Commute Unified Communications Help Desk E-Commerce Screen Mirroring Specifications Scalability Data Privacy Hiring/Firing iOS Downloads File Sharing Language Books Data Theft Virtual Assistant Windows 10s Evernote Error Running Cable Employer Employee Relationship Root Cause Analysis Windows Ink Ciminal Experience Managed IT Service IT Management Access Licensing Device Security Text Messaging RAM SharePoint Certification Uninterrupted Power Supply Operating Sysytem Payment Cast Sales How To Hard Drive Benefits Point of Sale Trends Bluetooth Troubleshooting Distributed Denial of Service Settings Computing Plug-In Solid State Drive Budget Internet Explorer Microsoft Office 365 Computer Accessories Augmented Reality Google Maps Project Management Phone System Cables Electronic Medical Records IT Solutions FAQ Travel Microsoft Teams Security Cameras Avoiding Downtime Vulnerabilities Retail Chromebook Reporting Smart Technology Computer Fan Sync Workers Advertising A.I. Fax Server Profitability Video Games App store Hacker Hard Disk Drive Chromecast Threat Data Loss IT budget Music Virus Voice over Internet Protocol Safety Emails Files Charger WannaCry Tablets Spyware Teamwork Wearables Unified Threat Management Cryptocurrency Conferencing Reputation Printing Updates Movies Eliminating Downtime Laptop Legislation Analysis Keyboard PowerPoint Authentication Vendor Management Proactive Webinar WIndows Server 2008 Virtual Reality Wearable Technology Robot NFL Entertainment Bring Your Own Device Upgrades HBO Gifts Black Market Google Assistant GDPR Adobe Microsoft Word Wireless Internet Touchpad Healthcare Comparison Identity Printers Worker Twitter Relocation Regulation Cache Remote Monitoring CrashOverride Emergency Monitors Disaster Paperless Office

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login