Microsoft Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/microsoft/ Your Office Technology Partner Thu, 24 Sep 2020 13:49:33 +0000 en-US hourly 1 https://wordpress.org/?v=6.1.6 https://lesolson.redpeppersoftware.net/wp-content/uploads/2021/11/cropped-LO_ITfavicon-1-1-32x32.png Microsoft Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/microsoft/ 32 32 Tips to Avoid the Microsoft Support Phone Scam https://lesolson.redpeppersoftware.net/blog/tips-to-avoid-the-microsoft-support-phone-scam/ Tue, 16 Feb 2016 17:21:55 +0000 https://lesolson.com/?p=10549 Recently, Microsoft “Tech Support” Phone Scams have been carried out even more frequently than usual. You may get a phone call from someone claiming to be a Microsoft Support Technician. Be prepared so you can protect yourself and your business from becoming the prey of scammers.

The post Tips to Avoid the Microsoft Support Phone Scam appeared first on Les Olson IT.

]]>
[cz_image id=”cz_89989″ image=”11780″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_19416″ cz_title=””]Recently, Microsoft “Tech Support” Phone Scams have been carried out even more frequently than usual. You may get a phone call from someone claiming to be a Microsoft Support Technician. Be prepared so you can protect yourself and your business from becoming the prey of scammers.

 

HOW THE SCAM WORKS
Someone claiming to be a support technician with Microsoft (or another tech company) will call your office or even your personal phone to let you know that your computer has “registered a problem” and they can help you fix it.

 

They will then attempt to persuade you to download software that will allow them to gain remote access to your computer or direct you to fraudulent sites with the promise of “fixing your computer.” While there are legitimate remote help sites used by honest technicians, installing such applications at the request of a stranger claiming to be a technical support technician can result in your computer being compromised.

 

Many times they will try to get you to provide them with usernames, passwords, credit card numbers or other personal information. They may even request card information so they can “bill” you for their phony services. Some scammers can be quite convincing and seem very knowledgeable about your business.

 

THE FIRST THING YOU SHOULD KNOW
While many companies including Microsoft and Les Olson Company do offer technical support services – they will NEVER make unsolicited phone calls to ask for money in exchange for computer security or software fixes.

 

SO YOU SUSPECT YOU’RE TALKING TO A SCAMMER, WHAT NOW?
If you believe that you’re speaking with a scam artist, the best advice is to hang up. While it is best not to engage at all with the scammer, if you find yourself talking with them for any length of time DO NOT give them any information or agree to pay for any software or services. If possible, take down their name and phone number and submit a complaint to the Federal Trade Commission. Complaints help them detect patterns of fraud and abuse. If you receive one of these calls at your office, be sure to let your network administrator know.

 

Scammers can be very persistent. People have been known to give in to their requests out of sheer exhaustion. No matter how many times they call, they never comply with their instructions.

 

WHAT IF YOU ALREADY GAVE THEM INFORMATION?
If you think you may have already given a scammer access to your computer or information, it’s important to change your computer’s password, the password to your email account and especially passwords for your financial accounts such as your bank or credit card company. If you think they may have gained access to a work computer, let your network administrator know immediately so they can quickly address the breach. Don’t let embarrassment keep you from telling someone as quickly as possible.

 

YOUR BEST LINE OF DEFENSE
Your best line of defense is keeping all computer users, whether at home or in your business, informed about this scam. Make sure they know how to recognize this scam and what to do in the event of a fishy phone call.[/cz_title]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_19454″ sk_overall=”background-repeat:no-repeat;background-position:right top;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/11/Artboard-1NetworkAnalysis.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_27621″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

GET A FREE,

COMPREHENSIVE

NETWORK ANALYSIS

[/cz_title][cz_gap][cz_button title=”Request Your Free” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_21447″ subtitle=”NETWORK ANALYSIS” link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_39112″ sk_overall=”background-repeat:no-repeat;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/12/Artboard-1cybersecuritytraining.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_84253″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

REQUEST YOUR

FREE EMPLOYEE

CYBERSECURITY TRAINING

[/cz_title][cz_gap][cz_button title=”Learn About Our” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_71392″ subtitle=”SECURITY TRAINING” link=”url:%2Fservices%2Fcybersecurity%2Femployee-cybersecurity-training%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

The post Tips to Avoid the Microsoft Support Phone Scam appeared first on Les Olson IT.

]]>
Using Internet Explorer 8, 9 or 10? You Could Be at Risk! https://lesolson.redpeppersoftware.net/blog/using-internet-explorer-8-9-or-10-you-could-be-at-risk/ Tue, 26 Jan 2016 18:02:35 +0000 https://lesolson.com/?p=10584 Microsoft announced that as of January 12, 2015, they will no longer provide security patches, automatic fixes, updates, or online technical assistance for Internet Explorer versions 8, 9 and 10.

The post Using Internet Explorer 8, 9 or 10? You Could Be at Risk! appeared first on Les Olson IT.

]]>
[cz_image id=”cz_87455″ image=”11805″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_49450″ cz_title=””]Microsoft announced that as of January 12, 2015, they will no longer provide security patches, automatic fixes, updates, or online technical assistance for Internet Explorer versions 8, 9 and 10.
If you continue to use these versions without Microsoft support, you will no longer receive security updates that can help protect your PC from harmful viruses, spyware, and other malicious software that can steal your personal information or encrypt your files and require you to pay a ransom to get them back.

 

Hackers have been exploiting this particular vulnerability, taking advantage of those who have not yet upgraded to the latest version of Internet Explorer. Considering the ease of fixing this issue, it’s most certainly not worth the risk – especially for businesses.

 

Not sure which version you use? Simply open your browser, in the upper right-hand corner of the browser, click the Settings Symbol. Next click About Internet Explorer. This will open a window, which will tell you the version of the browser is installed on your computer. If you have Internet Explorer 8, 9 or 10, you will need to install one of the newer versions – Internet Explorer 11 or Microsoft Edge if you have the Windows 10 OS.

 

LES OLSON COMPANY MANAGED IT CLIENTS

Our IT experts have already made the appropriate updates to Internet Explorer installations for all Les Olson Company customers who are enrolled in our Managed IT Services program.

 

Learn more about how Les Olson Company can provide proactive management, monitoring and maintenance of your business’ computers and servers through our Managed IT Services program.[/cz_title]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_19454″ sk_overall=”background-repeat:no-repeat;background-position:right top;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/11/Artboard-1NetworkAnalysis.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_27621″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

GET A FREE,

COMPREHENSIVE

NETWORK ANALYSIS

[/cz_title][cz_gap][cz_button title=”Request Your Free” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_21447″ subtitle=”NETWORK ANALYSIS” link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_39112″ sk_overall=”background-repeat:no-repeat;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/12/Artboard-1cybersecuritytraining.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_84253″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

REQUEST YOUR

FREE EMPLOYEE

CYBERSECURITY TRAINING

[/cz_title][cz_gap][cz_button title=”Learn About Our” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_71392″ subtitle=”SECURITY TRAINING” link=”url:%2Fservices%2Fcybersecurity%2Femployee-cybersecurity-training%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

The post Using Internet Explorer 8, 9 or 10? You Could Be at Risk! appeared first on Les Olson IT.

]]>