Contact us today!

FRS Pros Blog

Fake Tech Support Knows Way More than It Should

Fake Tech Support Knows Way More than It Should

Tech-support scammers traditionally are people who dial random numbers and try to convince the people on the other end of the phone that their computer has problems and they can fix them if the user allows them to remote into the device. They use tactics that are as generic and vague as possible, to avoid having to mention any specifics; and, since some people (especially those who have computers that are a few years old) find that their system’s performance is sluggish, they will give these people access. This typically ends in disaster.

We’re starting to see that scammers are getting sneakier, and citing specific information about a user, like their computer’s model and serial numbers. Beyond that, they possess a lot of information about the user, including the device owner’s telephone number, email address, customer number, the device’s model number and their name.

This is just the latest in what is a growing trend of sophisticated social engineering scams that are targeting technology consumers and end-users. One problem is that these scammers are calling people who have purchased products from some of the largest and most well-respected hardware and software distributors in the world. Companies like Lenovo, Microsoft, Apple, Dell, and more have all had support scammers falsely represent their companies, and with these new tactics increasing their effectiveness, expect these situations to grow in frequency.

What You Should Do?
It’s important to understand that no matter how proactive your IT support is, there is very little chance a manufacturer will call you to report issues with your computer, unless you’ve deliberately signed up for a service that does. Even then, there will be a pretty stringent authorization process attached to the support. Major technology vendors understand the types of threats out there, and while they want everyone that purchases their products and services to have a good experience, they are also huge corporations and don’t typically call people up to help them fix their computer issues, unless they are scheduled to do so.

If you get a call like this, it’s better to play it safe than to be sorry later. This is doubly true if you share a network with other users. If you give an unwanted entity access to your system it could have negative effects on the entire network. So while it is true that the IT support scams are an industry-wide problem, ensuring a business’ users aren’t duped into allowing access to these nefarious parties is important.

At FRS Pros, we make a point to help our clients promote industry best practices to their company’s users to ensure that they aren’t putting the company in bad positions. For more information about IT support scams, what real IT support looks like, and how to promote solid practices to your staff, call us today at 561-795-2000.

Tip of the Week: Managing Your Windows Arrangement
How Much Time Do You Spend Managing Vendors?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, October 21 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Internet Privacy Network Security Tech Term Google Business Management Business Computing Cloud Software User Tips Hackers Hardware Computer Malware Browser Mobile Devices Windows Cybersecurity Efficiency Microsoft Hosted Solutions Data Backup Smartphone Innovation Cybercrime Productivity Apps Internet of Things Outsourced IT Android Windows 10 Data Recovery IT Services Data Security Smartphones Operating System Law Enforcement IT Support Ransomware Backup Mobile Device Management Business Continuity Office 365 Vulnerability Data Business Money Upgrade Email Alert VoIP Phishing Disaster Recovery IT Support Best Practice Communications Chrome Microsoft Office Saving Money Collaboration Managed IT Services Network Server Telephone Systems Gadgets Tech Support Managed Service Provider Managed IT Employer-Employee Relationship Router Unsupported Software Applications Blockchain Small Business App Google Drive Information Two-factor Authentication Cloud Computing Spam Windows 10 Computers Virtualization Information Technology Passwords Miscellaneous Audit Update Google Docs Project Management Shortcut Productivity Data Protection Patch Management Wireless Charging Politics The Internet of Things Social Media Sports Workplace Tips VPN iPhone Devices BDR Data Breach Cost Management Managed IT Services Facebook Password Automation Augmented Reality Users Commerce WannaCry Quick Tips Travel Application Managed Service Hosted Solution Excel Avoiding Downtime Hacking Fraud Mobile Security Safety Gmail Bring Your Own Device Save Money Proactive IT SaaS Communication Holiday Google Assistant User Error Touchscreen Data Storage Artificial Intelligence Risk Management Cortana Budget Government Networking WiFi Wireless Technology Mobile Device OneNote Data Management Wi-Fi Robot Legislation Language Streaming Media Business Technology Adobe Workers Lithium-ion battery Gamification Unified Threat Management Software as a Service Solid State Drive Meetings Virtual Assistant Emails Cast Gifts Computing Vendor Management Access Hard Drive Display Root Cause Analysis Windows Ink Comparison Scam Chromecast Testing Computer Fan Reputation Licensing Updates Memory Upgrades Microsoft Excel IT budget Bandwidth Hard Disk Drive IT Management History Outlook Telephony Computer Forensics Data storage Alexa for Business Marketing BYOD Credit Cards App store Samsung Internet Exlporer Chromebook Co-Managed Services Remote Computing Health Google Maps Spyware Specifications Virus Camera Microsoft Word Financial File Sharing IT Solutions Wireless Legal Uninterrupted Power Supply Management Settings Webinar Mobility Antivirus Printing Telephone Search Apple Encryption Consultant Laptop Sales Proactive Projects Transportation Tablets Maintenance Storage Social Engineering Vendor Private Cloud Sync Evernote PowerPoint Remote Monitoring Files IT solutions FAQ DDoS Hyperlink Edge Hybrid Cloud Touchpad Retail Websites Recovery Identity Going Green Social NFL eWaste Emergency Disaster Identities Point of Sale Employee-Employer Relationship iOS WIndows Server 2008 Wireless Internet Ciminal Windows 10s HBO Charger Value Data Loss Amazon Screen Mirroring Humor Conferencing Data Theft Identity Theft Administrator Data Privacy Windows 7 Computer Care Nanotechnology Word Device Security Automobile Office Big Data Managing Stress Personal Information Thank You Twitter Accessory USB Worker PDF How To Books Education Hiring/Firing Mobile Computing Video Games Experience Congratulations Peripheral Work/Life Balance Virtual Reality Text Messaging Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Benefits es Phone System Cache Save Time Office tips Computer Accessories Training Monitors Advertising Battery Smart Technology Flexibility Music Instant Messaging Hacker Compliance Television CrashOverride Printers Company Culture Scalability Analytics Keyboard Regulation HaaS Entertainment Wasting Time End of Support Relocation Black Market Cleaning