(707) 268-8850    Get SUPPORT

Network Management Services Blog

Tip of the Week: Avoiding Scams

Tip of the Week: Avoiding Scams

Uh oh. One of your employees sat down at their workstation and was presented with a pop-up telling them that Microsoft has detected a fatal issue with their workstation, and if they don’t let someone remote in to fix it, all of their data will be lost. This could be a serious problem… especially if your employee falls for this scam and lets in a threat.

Tech support scams are not an uncommon thing, blending social engineering and phishing together to deliver the desired result to a scammer. For our tip, we’ll discuss how to identify and avoid these scams and deprive a scammer of that result.

A Global Problem
Make no mistake, these scams are an issue all around the world. While the impact is felt the greatest in the United States, China, and India, scammers clearly don’t discriminate by region.

However, there’s another layer to the issue of tech support scams.

There is an intense level of competition in India for employment opportunities, especially among the generation who should now be entering the workforce. For some reference as to how intense this competition is, 2016 saw a state-owned bank receive over one and a half million applications for just 1,500 open positions. This makes it not uncommon for many job applicants to be grossly overqualified for the position they are seeking, recipients of a master’s degree in business administration often applying to be a street sweeper. Naturally, this provides ample motivation for the populace to take any job that presents itself - even if it is at the expense of another.

Many call centers in India will take full, unabashed advantage of this, hiring young job-seekers through a convoluted and secretive process - sometimes not even informing the applicant who they are actually working for. This process can also cost the applicant a not-insignificant sum, as they are often charged for these interviews and trainings. Once the training is complete, an applicant leaves with a start date.

However, these jobs are often not what is expected. Instead of working in customer service, these youths are tasked with initiating a scam. They will call a target, deliver their “pitch,” and transfer the primed caller to a senior scammer who seals the deal. However, despite abysmal pay for being involved in these scams and the emotional burden placed on them by interacting with their often-helpless and terrified targets, many of these scammers find that scams are, again, one of the few effective ways to make money. As a result, many of these young scammers - effectively exploited themselves - end up embracing their role, working to get as big a piece of the pie as possible.

Thwarting These Attempts
Of course, while those on the other end of the line may not be in a great position themselves, you want to make sure that their efforts to scam you are ultimately wasted. To accomplish this outcome, it is important to remember a few key warning signs.

  • Don’t Call Us, We’ll Call You - The first thing to remember is that, if a Microsoft representative suddenly calls you without warning, they probably aren’t actually with Microsoft. You should even take your caller ID with a grain of salt, as that can be spoofed to look official enough to trust.
  • Weak Link in the Chain - Links are another favorite weapon of scammers, as they can be shared in an email to direct a user to a website filled with fake warning pop-ups. Avoid clicking on these links, and if you are presented with an alert screen, restart your computer. Scammers will also work to ensure that they reach the top results of search engines through sponsored ads to attract those legitimately looking for help. These links should be avoided as well. Google has made serious efforts to not allow scammers to run Remote IT Support ads, but it hasn’t stopped everything yet.
  • Remain in Control - Unless you are absolutely sure that a third party is trustworthy, never give up control of your computer. Otherwise, you could hand precious data over to a scammer or otherwise land yourself in hot water.

The Better Method
Of course, if you enlist the services of Network Management Services, a fair amount of these points become moot, as you will have access to an experienced team of trustworthy IT professionals who have your business’ interests at heart. For more information, give us a call at (707) 268-8850.

Have you ever encountered a scam like this before? Tell us about it in the comments!

Budgeting for IT Can Benefit Your Business’ Bottom...
What Virtual Assistant Is Right for You?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, April 18 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup VoIP Mobile Devices Hosted Solutions Innovation Backup Google Email Data Data Recovery Outsourced IT Tech Term IT Support Internet Microsoft Software Internet of Things IT Services Saving Money Cloud Computing Efficiency Communications BDR Business Continuity Hardware Communication Small Business Cybersecurity Ransomware Cybercrime Business Smartphones Artificial Intelligence Server Disaster Recovery User Tips Android How To Network Avoiding Downtime Computers Save Money Gadgets Browser Managed IT Smartphone Managed IT Services Windows Alert Router Two-factor Authentication Computer BYOD Passwords Applications Business Intelligence Money Productivity Data Security Data Protection Windows 10 Business Management Workplace Tips Mobility Vulnerability Miscellaneous Law Enforcement Social Engineering Social Media Chrome Collaboration Phishing Firewall Mobile Device Management Word Document Management Virtualization Operating System Identity Theft Productivity Blockchain Facebook Bandwidth VPN Proactive IT Budget IT Support Flexibility Redundancy Managed Service Provider Connectivity Telephone Systems Office 365 Private Cloud Compliance Upgrade Spam Remote Monitoring Access Control Data storage Content Management Paperless Office Data Breach Wi-Fi Content Filtering Smart Tech Unsupported Software Virtual Assistant Servers Data Storage Mobile Computing Credit Cards Spam Blocking Apps Value Hacking Analysis Networking Office Tips Mobile Device Microsoft Office Bring Your Own Device Automation Infrastructure Physical Security Government Unified Threat Management Data loss Big Data App Comparison Sports OneNote Website Solid State Drive Holiday Information Google Drive IT Management File Sharing Windows 7 Password Training Workers Quick Tips CES Business Owner Employer-Employee Relationship Managed Service Information Technology Public Cloud IT Plan Settings Encryption Windows 10 Update Work/Life Balance Online Shopping Password Management Frequently Asked Questions Millennials Downtime Wiring Scam Lifestyle Legal Risk Management webinar Gmail Cache Computer Fan Skype Education Hybrid Cloud Knowledge Hard Drives iPhone Theft Streaming Media Recovery Samsung Customer End of Support Strategy Evernote Authentication NIST Excel Workforce Charger Emails Monitor History Students Root Cause Analysis Camera Botnet Augmented Reality Save Time Software Tips Conferencing Recycling Wireless Internet FENG Wireless Technology Start Menu Insurance Electronic Medical Records Network Congestion Google Apps Content Filter Telephone System Flash Safety Internet exploMicrosoft IBM Google Docs HaaS Wireless Charging Nanotechnology Marketing Cryptocurrency Tip of the week Hacker Telecommuting Human Resources Healthcare Meetings The Internet of Things Travel HIPAA Cortana eWaste Wire Mobile Office Fraud Practices Entertainment IT Consultant Storage Windows 10s Advertising Accountants Data Warehousing Voice over Internet Protocol Supercomputer Fiber-Optic Safe Mode Windows Server 2008 Remote Work USB User Error Staff Electronic Health Records HVAC HBO Colocation Criminal MSP Professional Services Emergency Relocation Amazon Hosted Computing Leadership Hiring/Firing Health Password Manager Sync PDF Black Market SaaS Multi-Factor Security Cables Devices Cleaning Netflix Digital Signature Machine Learning Screen Mirroring Software as a Service Data Management Inventory Enterprise Content Management Outlook Specifications Keyboard Computing Infrastructure Smart Office CrashOverride Remote Worker Tools Patch Management Humor Amazon Web Services Files Business Mangement Addiction Audit Telephony IoT Trending Current Events Apple Unified Communications Thought Leadership Business Technology Regulations Hosted Solution Computer Care Reputation Internet Exlporer YouTube Cast Remote Computing Experience Vendor Management Administration Public Speaking Bluetooth Presentation Proactive Assessment Lithium-ion battery Company Culture WiFi Content Search Scalability Music Transportation Tech Support Best Practice Politics Remote Monitoring and Maintenance 5G Books Television Audiobook Shadow IT Managing Stress Wearable Technology Webinar Printers Benefits Worker Line of Business Virtual Reality Public Computer Competition Regulation Loyalty Customer Relationship Management Smart Technology IP Address IT solutions Automobile Users Rootkit Worker Commute Employer Employee Relationship Twitter Customer Service Mobile Office Instant Messaging Troubleshooting Video Games Domains Fun Computer Accessories Wireless Battery Two Factor Authentication How to Techology