MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Leave Fake Tech Support Hanging

How to Leave Fake Tech Support Hanging

Tech support is there to help you, except when it isn’t. Many fraudsters will pose as a support technician to gain a target’s trust, only to cause them serious issues. To keep your organization safe, make sure that you are able to spot the warning signs of tech support fraud.

Incoming Message
You may get a call or email from someone asking about your computer’s status. This someone will likely claim to be from a recognizable technology company, like Microsoft or McAfee. You should not believe them. Companies of Microsoft’s size and success will not be the ones to reach out to check if there is an issue with your computer.

Besides, imagine how many employees Microsoft would need to have to reach out to every Microsoft customer. When there were over 100 million users of Office 365’s commercial edition in 2017, plus 27 million users of Office 365 Home & Personal (as stated in the shareholder letter that was released), there's just no way that Microsoft would devote that kind of manpower to collect that kind of information.

Additionally, it has been agreed between the FTC, National Cyber Security Alliance and yes, Microsoft, that no tech company will call you on the phone unsolicited, or send you an email with the same message.

Stay Up-to-Date
One of the best defenses against almost any threat, including tech support fraud, is to keep everything updated. This includes your operating system and antivirus and antimalware. This will help to minimize the damage of a tech support scam. IT may also consider installing ad blockers to maximize your protection.

Keep Credit Cards Close to the Chest
If a member of “tech support” asks for your credit card number after calling you first, don’t give it to them and hang up (assuming you let them get that far). If you have already given out your card number, call and make sure that any charges you didn’t make are reversed and then report the incident to the FTC Complaint Assistant.

Make Sure Your Employees are In-the-Know
It is important to remember that you aren’t the only person in the company that could fall victim to tech support fraud. Your employees need to be aware of the threat, and should be able to identify the warning signs as well. Your security is only as strong as its weakest link, and more often than not, the weakest link is your end users. Therefore, it is crucial that they are educated and evaluated on their knowledge of best practices.

Tech support is meant to help you out, which is a responsibility that MERIT Solutions doesn’t take lightly. To learn more about our support services, give us a call at (757) 420-5150.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 23 February 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Software Malware Internet Hosted Solutions Backup google Business Management Productivity Managed IT Services Disaster Recovery Computer Microsoft Mobile Devices Outsourced IT Business Continuity Business IT Support Windows 10 communications VoIP User Tips Hardware Productivity Innovation IT Services Email Cybercrime Mobile Device Management Data Backup Efficiency Mobility Windows Managed IT Server Ransomware Apps Cybersecurity Smartphone browser Telephone Systems Small Business Save Money Data Recovery Saving Money Virtualization Law Enforcement Internet of Things Hosted Solution Quick Tips Operating System Android VPN BYOD Data Passwords BDR Money Data Security Password Holiday Information Technology Recovery Chrome Office 365 Microsoft Office Hacking Google Drive Avoiding Downtime Facebook Government Alert Wireless Health Miscellaneous Managed Service Provider Computers Risk Management Gadgets Unsupported Software Social Media Cloud Computing Best Practice IT Support Budget Work/Life Balance upgrade Smartphones Social Data Management App Communication Phishing User Error Managed IT Services Automation Politics Telephony Two-factor Authentication Data Breach USB Save Time Private Cloud Office tips Applications History Workplace Tips Proactive IT Identity Theft Flexibility Social Engineering The Internet of Things Shortcut Collaboration Wi-Fi Firewall search Application Current Events Windows 10 Audit Vulnerability Wireless Technology Personal Information Excel Automobile Blockchain Data Storage iPhone Mobile Computing OneNote Gmail Saving Time Transportation Cleaning Office Update Computer Care Robot Phone System IT solutions Data Loss Legal End of Support Marketing Remote Computing DDoS Users Encryption Google Docs Television Artificial Intelligence Data Protection Humor Disaster Streaming Media Apple Redundancy Cost Management Employer-Employee Relationship Project Management Commerce WiFi SaaS Network Going Green Sports Samsung Bandwidth Antivirus Cortana Content Filtering Tech Support eWaste Battery HaaS Hacker Internet Exlporer Solid State Drive Compliance Spam Wireless Charging Black Market Maintenance iOS Consultant Smart Technology Windows Ink Avoid Downtime Value Comparison server installation dvd "cannot install required files" Evernote Shadow IT Device Security Regulation PDF Computer Fan stock Document Management Identities Google Maps Screen Mirroring Experience Specifications Networking Devices Sync Text Messaging Dark Web tweet Software as a Service Meetings Video Games Cast Emails Sales calculator Workers Virtual Reality Spyware Adobe Scam Twitter Settings control Retail Music Uninterrupted Power Supply Updates Fraud Licensing WannaCry Laptop Employer Employee Relationship WSJ Exchange Conferencing HBO Webinar Analytics Distributed Denial of Service Keyboard altivista Microsoft Word Instant Messaging Edge Mobile Touchpad Reputation Computer Accessories Worker Commute Microsoft Excel SBS Gifts Advertising IT solutions Mobile Device Big Data compaq Managing Stress Ciminal Professional Services File Sharing Scalability IT Management Windows 10s Data storage Wearable Technology Books Hiring/Firing hp Education Travel Nanotechnology Administration Vendor Management Chromecast Storage Router domain Credit Cards How To WIndows Server 2008 Hard Disk Drive Benefits MSP Tablets Root Cause Analysis Colocation remote FAQ Patch Management Hard Drives Unified Threat Management Files Yahoo intranet NFL Augmented Reality Business Intelligence Touchscreen Training Administrator Entertainment Lithium-ion battery Lifestyle Electronic Medical Records Server 2008 Charger Outlook Upgrades Running Cable Ali Rowghani Point of Sale IT budget Word Managed IT Service Relocation Trending Company Culture Access HIPAA Legislation Safety CrashOverride Emergency Thank You Congratulations Worker Cache Monitors Remote Monitoring

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...