MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Leave Fake Tech Support Hanging

How to Leave Fake Tech Support Hanging

Tech support is there to help you, except when it isn’t. Many fraudsters will pose as a support technician to gain a target’s trust, only to cause them serious issues. To keep your organization safe, make sure that you are able to spot the warning signs of tech support fraud.

Incoming Message
You may get a call or email from someone asking about your computer’s status. This someone will likely claim to be from a recognizable technology company, like Microsoft or McAfee. You should not believe them. Companies of Microsoft’s size and success will not be the ones to reach out to check if there is an issue with your computer.

Besides, imagine how many employees Microsoft would need to have to reach out to every Microsoft customer. When there were over 100 million users of Office 365’s commercial edition in 2017, plus 27 million users of Office 365 Home & Personal (as stated in the shareholder letter that was released), there's just no way that Microsoft would devote that kind of manpower to collect that kind of information.

Additionally, it has been agreed between the FTC, National Cyber Security Alliance and yes, Microsoft, that no tech company will call you on the phone unsolicited, or send you an email with the same message.

Stay Up-to-Date
One of the best defenses against almost any threat, including tech support fraud, is to keep everything updated. This includes your operating system and antivirus and antimalware. This will help to minimize the damage of a tech support scam. IT may also consider installing ad blockers to maximize your protection.

Keep Credit Cards Close to the Chest
If a member of “tech support” asks for your credit card number after calling you first, don’t give it to them and hang up (assuming you let them get that far). If you have already given out your card number, call and make sure that any charges you didn’t make are reversed and then report the incident to the FTC Complaint Assistant.

Make Sure Your Employees are In-the-Know
It is important to remember that you aren’t the only person in the company that could fall victim to tech support fraud. Your employees need to be aware of the threat, and should be able to identify the warning signs as well. Your security is only as strong as its weakest link, and more often than not, the weakest link is your end users. Therefore, it is crucial that they are educated and evaluated on their knowledge of best practices.

Tech support is meant to help you out, which is a responsibility that MERIT Solutions doesn’t take lightly. To learn more about our support services, give us a call at (757) 420-5150.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 21 May 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Business Computing Network Security Hackers Malware Software Internet Hosted Solutions Business Management Backup google Productivity Managed IT Services Mobile Devices Computer Microsoft VoIP Disaster Recovery Outsourced IT Business Continuity Business IT Support communications Email User Tips Cybersecurity Windows 10 IT Services Hardware Productivity Innovation Efficiency Data Backup Cybercrime Apps Mobility Saving Money Windows Mobile Device Management Managed IT Server Small Business Ransomware Law Enforcement Internet of Things Smartphone Operating System browser Data Data Recovery Save Money Tech Term Android Virtualization Telephone Systems Cloud Computing Smartphones Data Security Hosted Solution Quick Tips Passwords BDR Money Phishing Information Technology Chrome Communication Recovery VPN Office 365 Microsoft Office BYOD Automation Password Holiday Best Practice upgrade Social Media Social Data Breach Work/Life Balance Cost Management App Budget Wi-Fi Data Management Network Facebook Collaboration Government IT Support Google Drive Hacking Avoiding Downtime Two-factor Authentication Update Wireless Alert Gadgets Health Miscellaneous Vulnerability Managed Service Provider Computers Risk Management Unsupported Software History Identity Theft Social Engineering Managed IT Services Streaming Media Proactive IT Flexibility Shortcut The Internet of Things search Employer-Employee Relationship Firewall Application Antivirus Current Events Audit User Error Data Protection Personal Information Wireless Technology Politics Telephony Cleaning Windows 10 USB Workplace Tips Save Time Spam Applications Private Cloud Office tips Users Encryption Television Wireless Charging Excel Blockchain End of Support Remote Computing Data Storage Apple OneNote Artificial Intelligence Mobile Security Big Data Devices WiFi Humor Going Green Disaster Bandwidth Data Loss eWaste SaaS Marketing Fraud Google Docs Samsung Sports Content Filtering Battery Tech Support HaaS Compliance Hacker Internet Exlporer Solid State Drive Redundancy Automobile Gmail Project Management Value Commerce iPhone Cortana Saving Time IT solutions Mobile Computing Patch Management Office Transportation DDoS Computer Care Phone System Robot Legal iOS Management Maintenance Windows Ink SBS Employer Employee Relationship Laptop App store Uninterrupted Power Supply Comparison compaq Analytics Keyboard Computer Fan Instant Messaging Financial Technology Evernote Device Security Regulation Identities Wearable Technology Google Maps Computer Accessories Worker Commute Touchpad Specifications hp Mobile Device Screen Mirroring Dark Web Reputation Managing Stress Printing Networking Sync IoT Software as a Service domain Meetings Advertising Scalability Identity Sales Cast Books Emails Hiring/Firing Education Google Assistant Workers Spyware Adobe Language remote Vendor Management Settings Data storage Router How To Data Privacy Retail Yahoo Benefits WannaCry Administration Computer Forensics Chromecast Updates Licensing Running Cable Server 2008 Hard Drive Conferencing Ali Rowghani Unified Threat Management HBO Webinar Colocation Trending Microsoft Word Edge Mobile Virus Microsoft Excel Training Hard Drives Entertainment Chromebook Files Gifts Upgrades Electronic Medical Records IT solutions Professional Services Point of Sale Administrator Ciminal Lithium-ion battery Proactive File Sharing server installation dvd "cannot install required files" Company Culture HIPAA Safety Windows 10s Black Market Smart Tech stock Consultant IT Management Travel Smart Technology Nanotechnology Relocation Access Avoid Downtime Websites Storage Hard Disk Drive Shadow IT Connectivity Credit Cards tweet WIndows Server 2008 Tablets Root Cause Analysis Document Management MSP Data Theft calculator PDF Experience Content Filter FAQ Twitter NFL control Augmented Reality intranet Video Games Computing Lifestyle Business Intelligence Text Messaging Touchscreen Virtual Reality Monitoring Charger WSJ Outlook Word Exchange Scam IT budget Analysis Distributed Denial of Service Legislation altivista Managed IT Service Music CrashOverride Cache Monitors Remote Monitoring Thank You Emergency Congratulations Worker

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...