croom new

Eclipse Integrated Systems Blog

How to Leave Fake Tech Support Hanging

How to Leave Fake Tech Support Hanging

Tech support is there to help you, except when it isn’t. Many fraudsters will pose as a support technician to gain a target’s trust, only to cause them serious issues. To keep your organization safe, make sure that you are able to spot the warning signs of tech support fraud.

Incoming Message
You may get a call or email from someone asking about your computer’s status. This someone will likely claim to be from a recognizable technology company, like Microsoft or McAfee. You should not believe them. Companies of Microsoft’s size and success will not be the ones to reach out to check if there is an issue with your computer.

Besides, imagine how many employees Microsoft would need to have to reach out to every Microsoft customer. When there were over 100 million users of Office 365’s commercial edition in 2017, plus 27 million users of Office 365 Home & Personal (as stated in the shareholder letter that was released), there's just no way that Microsoft would devote that kind of manpower to collect that kind of information.

Additionally, it has been agreed between the FTC, National Cyber Security Alliance and yes, Microsoft, that no tech company will call you on the phone unsolicited, or send you an email with the same message.

Stay Up-to-Date
One of the best defenses against almost any threat, including tech support fraud, is to keep everything updated. This includes your operating system and antivirus and antimalware. This will help to minimize the damage of a tech support scam. IT may also consider installing ad blockers to maximize your protection.

Keep Credit Cards Close to the Chest
If a member of “tech support” asks for your credit card number after calling you first, don’t give it to them and hang up (assuming you let them get that far). If you have already given out your card number, call and make sure that any charges you didn’t make are reversed and then report the incident to the FTC Complaint Assistant.

Make Sure Your Employees are In-the-Know
It is important to remember that you aren’t the only person in the company that could fall victim to tech support fraud. Your employees need to be aware of the threat, and should be able to identify the warning signs as well. Your security is only as strong as its weakest link, and more often than not, the weakest link is your end users. Therefore, it is crucial that they are educated and evaluated on their knowledge of best practices.

Tech support is meant to help you out, which is a responsibility that Eclipse Integrated Systems doesn’t take lightly. To learn more about our support services, give us a call at 800-340-0505.

Tip of the Week: Learn How to Use the Microsoft Ed...
At What Point Does a Service Become Spyware?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, November 16 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Internet Google Hackers Malware Software Business Management Microsoft User Tips Tech Term Productivity Hosted Solutions Innovation Computer Efficiency Backup Browser Windows 10 Apps Business Cybersecurity Managed IT Services Email Productivity Saving Money Communication Windows Mobile Devices Smartphones VoIP Data Recovery Virtualization Cybercrime Internet of Things Smartphone Hardware Data Backup Small Business Operating System Disaster Recovery Collaboration Passwords Law Enforcement Workplace Tips communications Android Ransomware Microsoft Office Network Data Security Cloud Computing Miscellaneous IT Support Business Continuity Users Wireless Data Quick Tips Chrome Windows 10 Social Media Money Mobile Device Management Telephone Systems Server Update Mobility Mobile Device IT Support Outsourced IT Holiday Wi-Fi Gadgets Phishing Office 365 BDR Employer-Employee Relationship IT Services Government Application Information Technology Unsupported Software App Vulnerability Password Best Practice Risk Management Health Google Drive Cost Management Social Networking Managed Service Provider Identity Theft Automation Politics Proactive IT Shortcut Alert Computers Blockchain Work/Life Balance Managed IT Services Facebook Streaming Media Hacking Upgrade Bandwidth Patch Management Current Events User Error Managed IT Office tips Information Marketing Data Management USB Save Money Artificial Intelligence Antivirus Two-factor Authentication Sports Spam Recovery Compliance Excel Storage Flexibility Meetings BYOD Devices Going Green Office Tech Support Encryption Gmail Cortana Router Apple History Samsung OneNote End of Support Battery eWaste Cleaning Transportation Internet Exlporer Mobile Computing DDoS WiFi The Internet of Things Wireless Charging Private Cloud Wireless Technology Google Docs Fraud Hosted Solution iPhone Managing Stress Touchscreen Data Storage HaaS Audit Mobile Security Data Protection Company Culture Automobile Television Save Time VPN Personal Information Telephony Humor Applications Maintenance Social Engineering Managed Service Outlook SaaS Commerce Business Intelligence Remote Computing Legal Computer Care Connectivity Analytics Search WannaCry Data Privacy Black Market Unified Threat Management Budget Unified Communications Entertainment Data Theft Virtual Assistant IT Solutions FAQ Wearable Technology Downloads Google Maps Project Management Keyboard Retail Big Data Vendor Management Avoiding Downtime Error Travel Education Webinar Managed IT Service Hard Drive Sync Workers Upgrades Chromecast RAM Computing Plug-In Charger Scalability Files Trends Troubleshooting Data Loss IT budget PDF Worker Commute Conferencing Books Internet Explorer Microsoft Office 365 Tablets Spyware IT solutions Cables Scam Nanotechnology Laptop Chromebook Reporting Updates Instant Messaging Consultant Microsoft Teams Legislation Experience App store Remote Monitoring and Management WIndows Server 2008 How To Running Cable A.I. Profitability Text Messaging Hiring/Firing iOS Virus Voice over Internet Protocol HBO Gifts Training Threat Access Control NFL SharePoint Point of Sale Windows 10s Robot Phone System Employer Employee Relationship Root Cause Analysis Touchpad Printing Medical IT Adobe Microsoft Word Bluetooth Distributed Denial of Service G Suite Comparison Data storage Analysis Data Breach Trending Movies Eliminating Downtime Microsoft Excel Identities Benefits Proactive Credit Cards Video Games Settings PowerPoint Authentication Word Edge Advertising Solid State Drive Lithium-ion battery Music Computer Accessories Augmented Reality Google Assistant GDPR Fax Server Electronic Medical Records Administrator Bring Your Own Device Screen Mirroring Specifications Smart Technology Computer Fan Identity Evernote Reputation Wireless Internet File Sharing Language Websites Amazon IT Management Authorization Windows Ink Ciminal Teamwork Hacker Hard Disk Drive Sales Uninterrupted Power Supply Operating Sysytem Value Dark Web Licensing Device Security Virtual Reality Safety Emails Access Hybrid Cloud Cast Help Desk Remote Monitoring Printers CrashOverride Twitter Emergency Monitors Regulation Relocation Disaster Worker Cache

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login