Contact us today!

FRS Pros Blog

Fake Tech Support Knows Way More than It Should

Fake Tech Support Knows Way More than It Should

Tech-support scammers traditionally are people who dial random numbers and try to convince the people on the other end of the phone that their computer has problems and they can fix them if the user allows them to remote into the device. They use tactics that are as generic and vague as possible, to avoid having to mention any specifics; and, since some people (especially those who have computers that are a few years old) find that their system’s performance is sluggish, they will give these people access. This typically ends in disaster.

We’re starting to see that scammers are getting sneakier, and citing specific information about a user, like their computer’s model and serial numbers. Beyond that, they possess a lot of information about the user, including the device owner’s telephone number, email address, customer number, the device’s model number and their name.

This is just the latest in what is a growing trend of sophisticated social engineering scams that are targeting technology consumers and end-users. One problem is that these scammers are calling people who have purchased products from some of the largest and most well-respected hardware and software distributors in the world. Companies like Lenovo, Microsoft, Apple, Dell, and more have all had support scammers falsely represent their companies, and with these new tactics increasing their effectiveness, expect these situations to grow in frequency.

What You Should Do?
It’s important to understand that no matter how proactive your IT support is, there is very little chance a manufacturer will call you to report issues with your computer, unless you’ve deliberately signed up for a service that does. Even then, there will be a pretty stringent authorization process attached to the support. Major technology vendors understand the types of threats out there, and while they want everyone that purchases their products and services to have a good experience, they are also huge corporations and don’t typically call people up to help them fix their computer issues, unless they are scheduled to do so.

If you get a call like this, it’s better to play it safe than to be sorry later. This is doubly true if you share a network with other users. If you give an unwanted entity access to your system it could have negative effects on the entire network. So while it is true that the IT support scams are an industry-wide problem, ensuring a business’ users aren’t duped into allowing access to these nefarious parties is important.

At FRS Pros, we make a point to help our clients promote industry best practices to their company’s users to ensure that they aren’t putting the company in bad positions. For more information about IT support scams, what real IT support looks like, and how to promote solid practices to your staff, call us today at 561-795-2000.

Tip of the Week: Managing Your Windows Arrangement
How Much Time Do You Spend Managing Vendors?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, May 21 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Internet Privacy Network Security Business Computing Google Productivity Cloud User Tips Business Management Tech Term Microsoft Hackers Innovation Hardware Software Efficiency Mobile Devices Malware Computer Windows 10 Hosted Solutions Data Backup Browser Smartphone Data Recovery Cybersecurity Smartphones Office 365 IT Services Data Windows IT Support Outsourced IT Apps Internet of Things Android Backup Data Security Email Upgrade Communication Cybercrime Business Continuity Disaster Recovery Workplace Tips VoIP Operating System Communications Network Alert Saving Money Phishing Law Enforcement Ransomware Server Users Gadgets Mobile Device Management Vulnerability Business Money Small Business Passwords Miscellaneous IT Support Virtualization Social Media Managed IT Services Information Employer-Employee Relationship Applications Wireless Cloud Computing Spam Chrome Best Practice Microsoft Office Automation Collaboration Artificial Intelligence Managed IT Services OneNote Information Technology Windows 10 Save Money Computers Managed Service Provider Blockchain Managed IT Facebook Two-factor Authentication Router Unsupported Software Health Bring Your Own Device Telephone Systems Tech Support App Google Drive Networking Holiday Word Devices Gmail Mobile Device Wi-Fi Robot Data Breach Audit Update Data Protection Politics Meetings The Internet of Things Shortcut Travel VPN iPhone Budget Excel Access Control File Sharing Wireless Technology Managed Service BDR IT Management Printing Fraud Data Management Cost Management Mobile Security Augmented Reality Evernote WannaCry Quick Tips Productivity Commerce Hosted Solution Google Assistant User Error Sports Application Avoiding Downtime Mobility Search Hybrid Cloud Encryption Telephony Safety Cortana Proactive IT Password SaaS Conferencing Risk Management Touchscreen Data Storage Business Technology Patch Management Wireless Charging Hacking Government Google Docs Project Management WiFi HBO Hard Drive Display Entertainment Windows Ink Virtual Assistant E-Commerce Gifts Computing Windows 10s Identity Theft Licensing Updates Computer Care Nanotechnology Memory Human Resources Comparison Screen Mirroring Humor Testing PC Outlook DDoS Computer Forensics Peripheral Microsoft Excel IT budget Files Unified Threat Management Bandwidth YouTube Office Solid State Drive Chromebook Personal Information Co-Managed Services Google Maps Spyware Disaster Alexa for Business Payment Cards Credit Cards App store Recovery Vendor Management Microsoft Word Root Cause Analysis Financial Payroll Specifications Virus Emails Cast Camera Scam Paperless Office Computer Fan Reputation Management Upgrades Employees Administrator Hard Disk Drive History Telephone Apple Data storage Employee Education Projects Samsung Tablets Maintenance Lithium-ion battery Remote Computing Security Cameras Sales Proactive Streaming Media Marketing BYOD Sync PowerPoint Admin Storage Social Engineering Vendor OneDrive Access IT Solutions Hyperlink Legal Edge Settings Break/Fix FAQ Identity Antivirus NFL eWaste Machine Learning Retail Websites Chromecast Webinar Transportation Wireless Internet Saving Time Identities Consultant Laptop Employee-Employer Relationship Voice over Internet Protocol Charger Internet Exlporer Private Cloud Value Wasting Time Data Loss Ciminal Remote Monitoring Medical IT Battery Data Privacy Windows 7 Device Security Amazon Downtime Hacker Data Theft IT solutions Adobe Workers Uninterrupted Power Supply Going Green Social Gamification Keyboard Shortcuts Emergency Legislation Language Touchpad iOS WIndows Server 2008 Accessory Software as a Service 5G Point of Sale Sabotage HaaS End of Support Keyboard Relocation Black Market Cleaning Big Data Automobile Managing Stress USB Worker es How To Books PDF Mobile Computing Video Games Experience Hiring/Firing Work/Life Balance Virtual Reality Crowdsourcing Employer Employee Relationship Thank You Current Events Electronic Medical Records Text Messaging Phone System Cache Compliance Benefits Printers Save Time Computer Accessories Congratulations Training Monitors Office tips Flexibility Music Advertising Regulation Smart Technology Television CrashOverride Instant Messaging Company Culture Twitter Scalability Analytics