Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Leave Fake Tech Support Hanging

How to Leave Fake Tech Support Hanging

Tech support is there to help you, except when it isn’t. Many fraudsters will pose as a support technician to gain a target’s trust, only to cause them serious issues. To keep your organization safe, make sure that you are able to spot the warning signs of tech support fraud.

Incoming Message
You may get a call or email from someone asking about your computer’s status. This someone will likely claim to be from a recognizable technology company, like Microsoft or McAfee. You should not believe them. Companies of Microsoft’s size and success will not be the ones to reach out to check if there is an issue with your computer.

Besides, imagine how many employees Microsoft would need to have to reach out to every Microsoft customer. When there were over 100 million users of Office 365’s commercial edition in 2017, plus 27 million users of Office 365 Home & Personal (as stated in the shareholder letter that was released), there's just no way that Microsoft would devote that kind of manpower to collect that kind of information.

Additionally, it has been agreed between the FTC, National Cyber Security Alliance and yes, Microsoft, that no tech company will call you on the phone unsolicited, or send you an email with the same message.

Stay Up-to-Date
One of the best defenses against almost any threat, including tech support fraud, is to keep everything updated. This includes your operating system and antivirus and antimalware. This will help to minimize the damage of a tech support scam. IT may also consider installing ad blockers to maximize your protection.

Keep Credit Cards Close to the Chest
If a member of “tech support” asks for your credit card number after calling you first, don’t give it to them and hang up (assuming you let them get that far). If you have already given out your card number, call and make sure that any charges you didn’t make are reversed and then report the incident to the FTC Complaint Assistant.

Make Sure Your Employees are In-the-Know
It is important to remember that you aren’t the only person in the company that could fall victim to tech support fraud. Your employees need to be aware of the threat, and should be able to identify the warning signs as well. Your security is only as strong as its weakest link, and more often than not, the weakest link is your end users. Therefore, it is crucial that they are educated and evaluated on their knowledge of best practices.

Tech support is meant to help you out, which is a responsibility that Eclipse Integrated Systems doesn’t take lightly. To learn more about our support services, give us a call at 800-340-0505.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 21 May 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Business Computing Internet Network Security Malware Business Management Software Google Microsoft Windows 10 Computer User Tips Backup Hosted Solutions Innovation Productivity Business Productivity Apps Windows Email Cybersecurity Mobile Devices Hardware Smartphone Cybercrime Efficiency Browser Saving Money Law Enforcement Disaster Recovery Managed IT Services Operating System Virtualization Data Security Data Backup Ransomware Small Business Business Continuity VoIP Tech Term Smartphones Android IT Support Phishing Internet of Things Server Microsoft Office Money Mobility communications Chrome Telephone Systems Mobile Device Management Office 365 Data Recovery Wireless Quick Tips Miscellaneous Passwords Holiday Cost Management Health Wi-Fi Update Information Technology Communication Collaboration Password Best Practice Unsupported Software Risk Management Workplace Tips IT Support Gadgets Social Google Drive Outsourced IT App Government Application Cloud Computing BDR Vulnerability IT Services Work/Life Balance Office tips USB Computers Alert Antivirus Managed Service Provider Upgrade User Error Data Management Politics Facebook Managed IT Two-factor Authentication Data Employer-Employee Relationship Current Events Social Media Spam Windows 10 Hacking Shortcut Identity Theft Save Money iPhone Excel Going Green Computer Care Artificial Intelligence Apple Legal Search eWaste Mobile Security The Internet of Things WiFi Blockchain Google Docs Flexibility Office Streaming Media Network Router Cleaning Social Engineering Bandwidth History Data Protection End of Support Television Maintenance Private Cloud Battery Sports Recovery Users HaaS Save Time Automation Meetings Commerce Tech Support Devices Personal Information Automobile Cortana Proactive IT Transportation Internet Exlporer Hosted Solution DDoS Wireless Technology Mobile Computing Data Storage Wireless Charging Fraud OneNote Encryption Samsung Patch Management VPN Telephony Humor Managed IT Services Remote Computing Audit Budget Computing Settings Sales Managing Stress Company Culture Cast Electronic Medical Records Gmail Internet Explorer Networking Wearable Technology Project Management Computer Fan Google Maps Video Games Smart Technology Avoiding Downtime Chromecast App store Retail BYOD Emails Sync Safety Threat Workers IT budget WannaCry Data Loss Conferencing Updates Webinar Running Cable Virtual Reality HBO Entertainment Identity SharePoint Gifts Microsoft Word IT solutions Adobe Data storage Education Identities Nanotechnology Microsoft Excel Scalability Scam Mobile Device Administrator Data Privacy Credit Cards Windows 10s Applications Language Root Cause Analysis File Sharing How To Employer Employee Relationship IT Management Experience Access Hard Drive Teamwork Device Security Solid State Drive Licensing Point of Sale Augmented Reality Storage Computer Accessories SaaS IT Solutions Advertising Phone System Chromebook FAQ Hard Disk Drive Travel Hacker Reputation Files Virus Unified Threat Management Music Printing Charger Spyware Tablets Keyboard Laptop Proactive Legislation Black Market Vendor Management Upgrades WIndows Server 2008 Analytics Trending Robot Google Assistant NFL Lithium-ion battery Touchpad Distributed Denial of Service Websites Bluetooth Comparison Consultant PDF Big Data Value Screen Mirroring Data Breach Edge Marketing iOS Word Hiring/Firing Worker Commute Data Theft Fax Server Specifications Instant Messaging Training Touchscreen Outlook Text Messaging Books Evernote Uninterrupted Power Supply Ciminal Windows Ink Benefits Operating Sysytem Cache Remote Monitoring Emergency PowerPoint Disaster Monitors Connectivity Worker CrashOverride Relocation Twitter

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login