Contact us today!

FRS Pros Blog

Fake Tech Support Knows Way More than It Should

Fake Tech Support Knows Way More than It Should

Tech-support scammers traditionally are people who dial random numbers and try to convince the people on the other end of the phone that their computer has problems and they can fix them if the user allows them to remote into the device. They use tactics that are as generic and vague as possible, to avoid having to mention any specifics; and, since some people (especially those who have computers that are a few years old) find that their system’s performance is sluggish, they will give these people access. This typically ends in disaster.

We’re starting to see that scammers are getting sneakier, and citing specific information about a user, like their computer’s model and serial numbers. Beyond that, they possess a lot of information about the user, including the device owner’s telephone number, email address, customer number, the device’s model number and their name.

This is just the latest in what is a growing trend of sophisticated social engineering scams that are targeting technology consumers and end-users. One problem is that these scammers are calling people who have purchased products from some of the largest and most well-respected hardware and software distributors in the world. Companies like Lenovo, Microsoft, Apple, Dell, and more have all had support scammers falsely represent their companies, and with these new tactics increasing their effectiveness, expect these situations to grow in frequency.

What You Should Do?
It’s important to understand that no matter how proactive your IT support is, there is very little chance a manufacturer will call you to report issues with your computer, unless you’ve deliberately signed up for a service that does. Even then, there will be a pretty stringent authorization process attached to the support. Major technology vendors understand the types of threats out there, and while they want everyone that purchases their products and services to have a good experience, they are also huge corporations and don’t typically call people up to help them fix their computer issues, unless they are scheduled to do so.

If you get a call like this, it’s better to play it safe than to be sorry later. This is doubly true if you share a network with other users. If you give an unwanted entity access to your system it could have negative effects on the entire network. So while it is true that the IT support scams are an industry-wide problem, ensuring a business’ users aren’t duped into allowing access to these nefarious parties is important.

At FRS Pros, we make a point to help our clients promote industry best practices to their company’s users to ensure that they aren’t putting the company in bad positions. For more information about IT support scams, what real IT support looks like, and how to promote solid practices to your staff, call us today at 561-795-2000.

Tip of the Week: Managing Your Windows Arrangement
How Much Time Do You Spend Managing Vendors?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, December 18 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Computing Cloud Google Tech Term Business Management Hackers Hardware Software User Tips Microsoft Computer Malware Browser Productivity Efficiency Data Backup Windows Cybersecurity Hosted Solutions Smartphone Mobile Devices IT Services Innovation Cybercrime Office 365 Data Recovery Apps Data Security Internet of Things Android Outsourced IT Backup Business Continuity Data Windows 10 Email Upgrade Smartphones Operating System IT Support Money Business Mobile Device Management VoIP Alert Vulnerability Disaster Recovery Law Enforcement Ransomware Phishing Employer-Employee Relationship Applications Small Business Chrome Microsoft Office Saving Money Communications Spam Managed IT Services Server Collaboration Network IT Support Workplace Tips Best Practice Router Managed Service Provider Google Drive Managed IT Unsupported Software Windows 10 App Computers Blockchain Holiday Cloud Computing Virtualization Information Two-factor Authentication Information Technology Passwords Miscellaneous Telephone Systems Networking OneNote Gadgets Tech Support Users Google Docs Password Project Management Data Protection Patch Management Wireless Charging Automation Devices Quick Tips Application Hosted Solution Cost Management Managed IT Services Encryption Avoiding Downtime Hacking Data Breach Augmented Reality Safety Gmail Travel Commerce Save Money WannaCry Managed Service Communication Excel Fraud Artificial Intelligence Risk Management Bring Your Own Device Budget Mobile Security Government Evernote SaaS Wireless Technology Proactive IT Robot Google Assistant User Error Data Management Wi-Fi Update Touchscreen Data Storage The Internet of Things Social Media WiFi Shortcut Cortana Productivity Politics VPN iPhone Mobile Device Sports Word BDR Facebook Business Technology Audit Remote Computing Health Accessory Meetings Software as a Service Solid State Drive Samsung Internet Exlporer Root Cause Analysis Windows Ink Virtual Assistant Emails Cast Gifts Computing Hard Drive Display Legal Licensing Uninterrupted Power Supply Updates Memory Settings Human Resources Upgrades Comparison Testing Wireless Computer Fan Computer Forensics Search Peripheral Microsoft Excel IT budget Bandwidth Mobility Hard Disk Drive IT Management Antivirus Outlook Transportation Chromebook Co-Managed Services Google Maps Spyware Laptop Alexa for Business Marketing BYOD Credit Cards App store Microsoft Word Financial Payroll Specifications Virus Private Cloud Camera Management Access Control File Sharing Files IT Solutions DDoS Going Green Printing Social Telephone Emergency Apple Disaster Touchpad Webinar Recovery Tablets Maintenance Consultant Point of Sale Sales Proactive Projects Sync PowerPoint Admin Remote Monitoring Storage Social Engineering Vendor Hyperlink Edge Humor IT solutions Identity Theft FAQ Administrator Lithium-ion battery NFL eWaste Hybrid Cloud Retail Streaming Media Websites Identity Wireless Internet Saving Time Identities Employee-Employer Relationship iOS WIndows Server 2008 Value Wasting Time Data Loss Ciminal Windows 10s HBO Vendor Management Charger Access Computer Care Nanotechnology Device Security Amazon Screen Mirroring Scam Conferencing Chromecast Data Theft Data Privacy Reputation Windows 7 Adobe Telephony Workers Data storage Gamification Keyboard Shortcuts Unified Threat Management Legislation Language History Twitter Virtual Reality Work/Life Balance Current Events Electronic Medical Records Text Messaging Crowdsourcing Employer Employee Relationship Phone System Benefits Save Time Office tips Computer Accessories Flexibility Music Advertising Battery Smart Technology Cache Instant Messaging Hacker es Scalability Analytics Training Monitors End of Support Keyboard HaaS Entertainment Relocation Television CrashOverride Black Market Cleaning Compliance Big Data Automobile Office Printers Company Culture Thank You Managing Stress Personal Information USB Worker Regulation How To Books PDF Experience Congratulations Education Hiring/Firing Mobile Computing Video Games