Contact us today!

FRS Pros Blog

Fake Tech Support Knows Way More than It Should

Fake Tech Support Knows Way More than It Should

Tech-support scammers traditionally are people who dial random numbers and try to convince the people on the other end of the phone that their computer has problems and they can fix them if the user allows them to remote into the device. They use tactics that are as generic and vague as possible, to avoid having to mention any specifics; and, since some people (especially those who have computers that are a few years old) find that their system’s performance is sluggish, they will give these people access. This typically ends in disaster.

We’re starting to see that scammers are getting sneakier, and citing specific information about a user, like their computer’s model and serial numbers. Beyond that, they possess a lot of information about the user, including the device owner’s telephone number, email address, customer number, the device’s model number and their name.

This is just the latest in what is a growing trend of sophisticated social engineering scams that are targeting technology consumers and end-users. One problem is that these scammers are calling people who have purchased products from some of the largest and most well-respected hardware and software distributors in the world. Companies like Lenovo, Microsoft, Apple, Dell, and more have all had support scammers falsely represent their companies, and with these new tactics increasing their effectiveness, expect these situations to grow in frequency.

What You Should Do?
It’s important to understand that no matter how proactive your IT support is, there is very little chance a manufacturer will call you to report issues with your computer, unless you’ve deliberately signed up for a service that does. Even then, there will be a pretty stringent authorization process attached to the support. Major technology vendors understand the types of threats out there, and while they want everyone that purchases their products and services to have a good experience, they are also huge corporations and don’t typically call people up to help them fix their computer issues, unless they are scheduled to do so.

If you get a call like this, it’s better to play it safe than to be sorry later. This is doubly true if you share a network with other users. If you give an unwanted entity access to your system it could have negative effects on the entire network. So while it is true that the IT support scams are an industry-wide problem, ensuring a business’ users aren’t duped into allowing access to these nefarious parties is important.

At FRS Pros, we make a point to help our clients promote industry best practices to their company’s users to ensure that they aren’t putting the company in bad positions. For more information about IT support scams, what real IT support looks like, and how to promote solid practices to your staff, call us today at 561-795-2000.

Tip of the Week: Managing Your Windows Arrangement
How Much Time Do You Spend Managing Vendors?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Cloud Business Management Tech Term Google Business Computing Software User Tips Malware Microsoft Computer Hackers Hardware Productivity Efficiency Browser Cybersecurity Mobile Devices Windows Data Backup Hosted Solutions Apps Smartphone Internet of Things Innovation Cybercrime Data Recovery Data Security Operating System Office 365 Outsourced IT Android Email IT Services Backup Smartphones Windows 10 Disaster Recovery Vulnerability Law Enforcement Ransomware Upgrade VoIP Phishing IT Support Data Business Money Mobile Device Management Alert Business Continuity Saving Money Collaboration Network Server Microsoft Office Employer-Employee Relationship Applications Best Practice Chrome Communications IT Support Managed IT Services Passwords Blockchain Two-factor Authentication Miscellaneous Computers Virtualization Information Router Telephone Systems Google Drive Gadgets Tech Support Managed Service Provider Managed IT Unsupported Software Small Business App Windows 10 Cloud Computing Spam Information Technology Excel BDR Save Money Robot SaaS Fraud Proactive IT Social Media Users The Internet of Things Evernote Touchscreen Data Storage Budget Managed Service VPN iPhone WiFi Application Wireless Technology User Error Facebook Data Management Bring Your Own Device Mobile Security Mobile Device OneNote Encryption Networking Cortana Safety Productivity Audit Quick Tips Google Assistant Sports Word Data Protection Holiday Hosted Solution Risk Management Avoiding Downtime Patch Management Wireless Charging Google Docs Project Management Password Devices Automation Cost Management Managed IT Services Wi-Fi Communication Augmented Reality Data Breach Commerce Artificial Intelligence WannaCry Update Shortcut Politics Government Hacking Gmail Travel Workplace Tips Computer Forensics Peripheral Consultant Scam Humor Bandwidth File Sharing Remote Monitoring Files Alexa for Business Apple DDoS Chromebook Co-Managed Services Disaster Financial Tablets Maintenance IT solutions Samsung Recovery Camera Sales Proactive Management Access Control Sync Storage Social Engineering FAQ Edge iOS Legal WIndows Server 2008 Reputation Printing Telephone Data storage NFL eWaste Windows 10s HBO Antivirus History Administrator Projects Retail Websites Lithium-ion battery PowerPoint Admin Screen Mirroring Streaming Media Vendor Computer Care Identities Nanotechnology Remote Computing Health Hyperlink Charger Unified Threat Management Data Loss Ciminal Settings Hybrid Cloud Device Security Solid State Drive Wireless Access Identity Conferencing Data Theft Meetings Wireless Internet Adobe Workers Emails Cast Mobility Chromecast Employee-Employer Relationship Legislation Language Root Cause Analysis Emergency Search Value Wasting Time Upgrades Point of Sale Laptop Computer Fan Transportation Telephony Amazon Windows Ink Hard Disk Drive IT Management Private Cloud Internet Exlporer Data Privacy Windows 7 Gifts Computing Gamification Licensing Updates Marketing BYOD Identity Theft Business Technology Comparison Accessory Outlook Touchpad Software as a Service Microsoft Excel IT budget Going Green Social Uninterrupted Power Supply App store Virtual Assistant Google Maps Spyware IT Solutions Hard Drive Display Credit Cards Memory Microsoft Word Webinar Vendor Management Testing Specifications Virus es Training Monitors How To Books Relocation Education Hiring/Firing Video Games Experience Work/Life Balance Personal Information Television CrashOverride Virtual Reality Crowdsourcing Employer Employee Relationship Company Culture Current Events Electronic Medical Records Benefits PDF Phone System Mobile Computing Save Time Computer Accessories Battery Smart Technology Text Messaging Compliance Flexibility Music Thank You Printers Instant Messaging Hacker Office tips Regulation Scalability Analytics Congratulations Keyboard Advertising Entertainment Black Market Cleaning Twitter Automobile Office Big Data Cache Managing Stress HaaS USB Worker End of Support