Contact us today!

FRS Pros Blog

Fake Tech Support Knows Way More than It Should

Fake Tech Support Knows Way More than It Should

Tech-support scammers traditionally are people who dial random numbers and try to convince the people on the other end of the phone that their computer has problems and they can fix them if the user allows them to remote into the device. They use tactics that are as generic and vague as possible, to avoid having to mention any specifics; and, since some people (especially those who have computers that are a few years old) find that their system’s performance is sluggish, they will give these people access. This typically ends in disaster.

We’re starting to see that scammers are getting sneakier, and citing specific information about a user, like their computer’s model and serial numbers. Beyond that, they possess a lot of information about the user, including the device owner’s telephone number, email address, customer number, the device’s model number and their name.

This is just the latest in what is a growing trend of sophisticated social engineering scams that are targeting technology consumers and end-users. One problem is that these scammers are calling people who have purchased products from some of the largest and most well-respected hardware and software distributors in the world. Companies like Lenovo, Microsoft, Apple, Dell, and more have all had support scammers falsely represent their companies, and with these new tactics increasing their effectiveness, expect these situations to grow in frequency.

What You Should Do?
It’s important to understand that no matter how proactive your IT support is, there is very little chance a manufacturer will call you to report issues with your computer, unless you’ve deliberately signed up for a service that does. Even then, there will be a pretty stringent authorization process attached to the support. Major technology vendors understand the types of threats out there, and while they want everyone that purchases their products and services to have a good experience, they are also huge corporations and don’t typically call people up to help them fix their computer issues, unless they are scheduled to do so.

If you get a call like this, it’s better to play it safe than to be sorry later. This is doubly true if you share a network with other users. If you give an unwanted entity access to your system it could have negative effects on the entire network. So while it is true that the IT support scams are an industry-wide problem, ensuring a business’ users aren’t duped into allowing access to these nefarious parties is important.

At FRS Pros, we make a point to help our clients promote industry best practices to their company’s users to ensure that they aren’t putting the company in bad positions. For more information about IT support scams, what real IT support looks like, and how to promote solid practices to your staff, call us today at 561-795-2000.

Tip of the Week: Managing Your Windows Arrangement
How Much Time Do You Spend Managing Vendors?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, February 20 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Computing Google Cloud Business Management User Tips Productivity Tech Term Hackers Software Hardware Microsoft Data Backup Computer Malware Mobile Devices Cybersecurity Efficiency Browser Hosted Solutions Smartphone Windows Windows 10 Office 365 IT Services Internet of Things Data Recovery Android Data Security Innovation Cybercrime Outsourced IT Email Data Upgrade Apps Smartphones Backup IT Support Business Continuity VoIP Operating System Small Business Phishing Saving Money Business Money Communications Alert Server Mobile Device Management Law Enforcement Disaster Recovery Ransomware Vulnerability Employer-Employee Relationship Microsoft Office Applications Chrome Virtualization IT Support Managed IT Services Workplace Tips Passwords Spam Miscellaneous Users Best Practice Collaboration Network Router OneNote Blockchain Two-factor Authentication Holiday Google Drive Information Windows 10 Bring Your Own Device Managed Service Provider Managed IT Computers Communication Managed IT Services Artificial Intelligence Unsupported Software Networking App Information Technology Cloud Computing Telephone Systems Tech Support Social Media Gadgets Automation Facebook Mobile Device Travel Health Safety Excel Quick Tips Hosted Solution Managed Service Hacking Fraud Access Control Audit Avoiding Downtime Risk Management Mobility Search Gmail Data Protection Save Money Evernote Mobile Security User Error Wi-Fi Cost Management Google Assistant IT Management Budget Augmented Reality Update Cortana WannaCry Government Politics Commerce Shortcut Wireless Technology Word Data Management BDR Robot Productivity Patch Management Wireless Charging Business Technology Google Docs Project Management SaaS Devices The Internet of Things Sports Proactive IT VPN iPhone Data Breach Touchscreen Data Storage Application WiFi Encryption Password Specifications Virus Alexa for Business Payment Cards Microsoft Word Remote Computing Chromebook Co-Managed Services Windows 10s HBO Financial Payroll Computer Care Nanotechnology Camera Uninterrupted Power Supply Screen Mirroring File Sharing Wireless Unified Threat Management Apple Settings Hacker Management Sales Proactive Employee Meetings Tablets Maintenance Emergency Printing Telephone Solid State Drive Security Cameras Root Cause Analysis Sync Transportation Projects Emails Cast Storage Social Engineering Laptop Point of Sale FAQ Private Cloud Entertainment Vendor DDoS Upgrades Edge PowerPoint Admin Files Computer Fan Retail Websites Identity Theft Recovery NFL eWaste Hyperlink Disaster Hard Disk Drive Hybrid Cloud Machine Learning Going Green Social Identity Marketing BYOD Identities Touchpad Charger Employee-Employer Relationship Data Loss Ciminal Wireless Internet Saving Time Conferencing Data Theft Vendor Management Administrator Device Security Value Wasting Time IT Solutions Humor Scam Amazon Downtime Streaming Media Adobe Workers Data Privacy Windows 7 Lithium-ion battery Webinar Legislation Language Consultant Gamification Keyboard Shortcuts Gifts Computing Personal Information Samsung Software as a Service Access Remote Monitoring Windows Ink Accessory Virtual Assistant E-Commerce Chromecast Licensing Updates Hard Drive Display IT solutions Comparison Human Resources Outlook Legal Reputation Testing Telephony Microsoft Excel IT budget Memory Credit Cards App store History Antivirus Bandwidth Internet Exlporer Google Maps Spyware Data storage Computer Forensics Peripheral iOS WIndows Server 2008 Computer Accessories es Flexibility Music Battery Text Messaging Smart Technology Instant Messaging Scalability Analytics Office tips Advertising Keyboard Compliance Black Market Cleaning Automobile Office Big Data Printers Managing Stress HaaS Regulation Cache USB End of Support Worker How To Relocation Books Training Monitors Video Games Experience Thank You Education Hiring/Firing Work/Life Balance Virtual Reality Twitter Crowdsourcing Employer Employee Relationship Television CrashOverride Current Events Electronic Medical Records Company Culture Phone System Congratulations PDF Benefits Mobile Computing Save Time