Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Leave Fake Tech Support Hanging

How to Leave Fake Tech Support Hanging

Tech support is there to help you, except when it isn’t. Many fraudsters will pose as a support technician to gain a target’s trust, only to cause them serious issues. To keep your organization safe, make sure that you are able to spot the warning signs of tech support fraud.

Incoming Message
You may get a call or email from someone asking about your computer’s status. This someone will likely claim to be from a recognizable technology company, like Microsoft or McAfee. You should not believe them. Companies of Microsoft’s size and success will not be the ones to reach out to check if there is an issue with your computer.

Besides, imagine how many employees Microsoft would need to have to reach out to every Microsoft customer. When there were over 100 million users of Office 365’s commercial edition in 2017, plus 27 million users of Office 365 Home & Personal (as stated in the shareholder letter that was released), there's just no way that Microsoft would devote that kind of manpower to collect that kind of information.

Additionally, it has been agreed between the FTC, National Cyber Security Alliance and yes, Microsoft, that no tech company will call you on the phone unsolicited, or send you an email with the same message.

Stay Up-to-Date
One of the best defenses against almost any threat, including tech support fraud, is to keep everything updated. This includes your operating system and antivirus and antimalware. This will help to minimize the damage of a tech support scam. IT may also consider installing ad blockers to maximize your protection.

Keep Credit Cards Close to the Chest
If a member of “tech support” asks for your credit card number after calling you first, don’t give it to them and hang up (assuming you let them get that far). If you have already given out your card number, call and make sure that any charges you didn’t make are reversed and then report the incident to the FTC Complaint Assistant.

Make Sure Your Employees are In-the-Know
It is important to remember that you aren’t the only person in the company that could fall victim to tech support fraud. Your employees need to be aware of the threat, and should be able to identify the warning signs as well. Your security is only as strong as its weakest link, and more often than not, the weakest link is your end users. Therefore, it is crucial that they are educated and evaluated on their knowledge of best practices.

Tech support is meant to help you out, which is a responsibility that Eclipse Integrated Systems doesn’t take lightly. To learn more about our support services, give us a call at 800-340-0505.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 22 February 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Hackers Software Business Management Google Business Computing Malware Internet Microsoft Windows 10 Computer Innovation User Tips Backup Hosted Solutions Network Security Productivity Productivity Business Windows Apps Hardware Email Cybercrime Smartphone Mobile Devices Efficiency Cybersecurity Disaster Recovery Managed IT Services IT Support Virtualization Browser Small Business Business Continuity Law Enforcement VoIP Miscellaneous Holiday Android Operating System Internet of Things Microsoft Office Ransomware Money Mobility communications Chrome Office 365 Telephone Systems Mobile Device Management Quick Tips Data Security Data Backup Passwords Unsupported Software Health Server Saving Money Information Technology Outsourced IT Communication Collaboration Password Best Practice Data Recovery Risk Management Google Drive Workplace Tips Social Gadgets Application App Government Smartphones Wireless Cloud Computing IT Services Wi-Fi Save Money Managed Service Provider Office tips USB IT Support Politics Alert Managed IT Computers Upgrade Data Management User Error Windows 10 Facebook BDR Vulnerability Current Events Shortcut Identity Theft Social Media Work/Life Balance Hacking Phishing Google Docs Encryption Computer Care VPN Telephony Humor Antivirus Remote Computing Office iPhone Two-factor Authentication Cost Management Cleaning Artificial Intelligence Going Green Legal Update Apple Search Battery Cortana Proactive IT The Internet of Things eWaste Flexibility Save Time WiFi Commerce History Streaming Media Social Engineering Bandwidth End of Support Automobile Spam Private Cloud Sports Television Recovery Data Storage HaaS Samsung Users Automation OneNote Tech Support Excel Personal Information Employer-Employee Relationship Meetings Transportation Managed IT Services Internet Exlporer Wireless Technology Audit Hosted Solution DDoS Mobile Computing Blockchain Computer Fan Trending Smart Technology HBO Lithium-ion battery PDF Gifts Microsoft Word Adobe Emails Distributed Denial of Service Bluetooth Instant Messaging Microsoft Excel WannaCry Data Protection Text Messaging Marketing Credit Cards Operating Sysytem Maintenance Uninterrupted Power Supply Applications Webinar Fax Server Managing Stress Virtual Reality Budget File Sharing Network IT Management Entertainment Avoiding Downtime Device Security Licensing IT solutions Video Games Gmail Scam Education Chromecast Storage Nanotechnology IT Solutions Mobile Device Wearable Technology FAQ Devices Travel Windows 10s Employer Employee Relationship Root Cause Analysis Experience Charger Spyware Tablets Solid State Drive Computer Accessories Point of Sale Legislation Augmented Reality WIndows Server 2008 SaaS Running Cable Router Phone System Data storage Wireless Charging SharePoint Fraud NFL Hard Disk Drive Scalability Hacker Administrator Comparison Data Breach Patch Management Unified Threat Management Music Edge Word How To Keyboard Vendor Management Access Specifications Evernote Outlook Upgrades Analytics Data Teamwork Ciminal Windows Ink Cast Advertising Sales Networking Screen Mirroring Consultant Big Data Reputation Project Management Files Google Maps iOS Hiring/Firing BYOD Training Worker Commute Retail Workers Sync Touchscreen Books Laptop IT budget Data Loss Black Market Benefits Company Culture Robot Conferencing Settings Updates Electronic Medical Records Touchpad Cache Safety Relocation Identities Remote Monitoring Emergency Monitors Worker Disaster CrashOverride

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login