Be Wary of Tech Support Scams

By April 13, 2020 Security, Tech Tip
Tech Support Scams | Scam Alert

We need technical support companies to help us solve complex issues with our devices and applications. We do our best to stay safe on our devices, but often there are technical elements that we aren’t trained to handle. Relying on tech support is necessary to get us back in working order.

However, scammers and hackers will use our dependence on tech support to get their foot in the door. By pretending to be tech support and using scare tactics, they trick their victims into installing a virus or paying money.

What are some of the tactics scammers use to do this? How can you avoid becoming the next victim of a tech support scam?

What a Tech Support Scam Looks Like

Most of these tech support scams fall into two categories: cold calling and pop-up messages.

With the cold call method, the scammer will randomly call their target and pretend to be a representative from a well-known company, like Microsoft. Using scare tactics, the scammer may tell their target a virus has been detected on their device, and they must take certain steps right away to fix it.

These steps may involve the scammer remoting into the device or walking the target through the steps to “fix” the issue on their own. They may seem helpful, but this is a common scam designed to infect your device with a real virus, so that they can either steal your data or charge you a fee to remove the infection.

Another common tech support scam is the pop-up message warning of a virus detected on the device. The screen locks up, a red page or notification pop-up appears, and says “Your device is infected!”. This is meant to surprise you and cause panic. The message may also describe how to fix the issue, which typically involves calling the “support number” provided. Don’t call that number!

These pop ups are typically fake, meant to trick you into acting quickly and irrationally. Calling the number will connect you with a fake representative. Similar to the first scam, this “tech support rep” will either plant a virus on your computer themselves or trick you into doing for them and charging a fee to remove it.

How do you avoid these scams?

Here are some tips to ensure that you are not the next victim of a tech support scam.

  1. Legitimate tech support companies will never contact your directly. Be extremely cautious if you receive a direct message, pop-up, phone call, or email aimed at you and your specific device.
  2. Never allow anyone to remotely access your computer unless you are absolutely sure who they are. If someone asks for remote access to your computer, verify the identity of the requesting individual or party before continuing. If you have any suspicions, contact your supervisor prior to allowing remote access. Once again, a legitimate tech support company will not contact you directly without anyone else knowing about it first.
  3. Never call the number on a pop-up warning message. A real virus alert will never give you a number to call. If you receive a suspicious phone call or pop-up message regarding tech support, tell your supervisor and internal IT support immediately.

We need tech support. It’s critical to getting us back on our feet when our devices are down, when applications are unavailable, or when we truly have encountered a virus or malware. But these are also times when we are likely to be upset, embarrassed, or easily panicked. Scammers and hackers will try to take advantage of our need for tech support and our emotional vulnerability. Don’t let them fool you!

Interested in ongoing training that educates your employees about threats like tech support scams, phishing attempts, social engineering, and more? Check out OXEN’s Breach Prevention Services and Free Security Awareness Training.


Recent Posts / View All Posts

IT Leadership | Shared CIO

You Need IT Leadership

| Consulting, Leadership | No Comments
Missouri is just beginning to emerge from its stay-at-home order in response to the pandemic threat. Who ever imagined that pandemic planning policies would become a reality? What was once regarded as a threat with low probability of occurrence will likely become a much higher probability as we navigate through the coming years. The realization of this threat has certainly changed the way we view ourselves and the world around us. It has sensitized us to our newfound vulnerability. This month, I am writing to you from the Joplin, MO office of OXEN Technology. Considering our present circumstances, our physical…
Tech Tip Background

Office 365 Tip: Create a file request in OneDrive

| Office 365, Tech Tip | No Comments
If you need to obtain files from various people, you can use OneDrive to create a file request that allows others to upload documents directly to a folder you specify. This gives people a quick way to transfer files to you without giving them view or edit permissions to your OneDrive folder. Here’s how! Note: This feature is not available in Office 365 Government. For file requests to work, your Office 365 administrator must enable Anyone links in OneDrive. Requesting Files Using OneDrive Online, select the folder where you want others to upload their files. Click Request files on the…
Virtual Private Network

What is a VPN and do you need one to work from home?

| Security | No Comments
Since businesses started shifting to remote work due to COVID-19, OXEN has seen a sizeable uptick in requests for purchasing and implementing VPNs for at-home workers. You’ve probably seen that a Virtual Private Network (VPN) connection is often recommended for securely working from home while accessing company resources. So what’s a VPN for in this context, and do you need one? If you’re a business manager, do you need a VPN connection for every employee who’s now working from home? Read on for our tips. What Is a Virtual Private Network? VPN stands for “Virtual Private Network”. It creates a…