Scam Alert Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/scam-alert/ Your Office Technology Partner Thu, 24 Sep 2020 13:47:41 +0000 en-US hourly 1 https://wordpress.org/?v=6.1.6 https://lesolson.redpeppersoftware.net/wp-content/uploads/2021/11/cropped-LO_ITfavicon-1-1-32x32.png Scam Alert Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/scam-alert/ 32 32 Coronavirus Phishing Scams on the Rise https://lesolson.redpeppersoftware.net/blog/coronavirus-phishing-scams-on-the-rise/ Tue, 31 Mar 2020 13:58:32 +0000 https://lesolson.com/?p=13005 It's unfortunate, but wherever there's fear and chaos, you'll find people willing to take advantage of it. Such is the case with hackers and scammers looking to enrich themselves by tricking unsuspecting people during the Coronavirus pandemic.

The post Coronavirus Phishing Scams on the Rise appeared first on Les Olson IT.

]]>
[cz_image id=”cz_60892″ image=”13009″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_40263″ cz_title=””]It’s unfortunate, but wherever there’s fear and chaos, you’ll find people willing to take advantage of it. Such is the case with hackers and scammers looking to enrich themselves by tricking unsuspecting people during the Coronavirus pandemic.

 

Scammers use phishing emails to gain access to your network by tricking you into clicking links that allow them to install malware and ransomware. They also try to get you to give up your sensitive information like account numbers, passwords, even Social Security Numbers. All of us would like to believe we’re too smart to fall for phishing attempts, but the truth is that scammers are increasingly clever and convincing. Their emails look legitimate, and it can take more than a second look to tell the fakers apart from the real deal.

 

The problem is only exacerbated when everyone is hungry for news, information, and solutions to an overwhelming problem. People are much more likely to click on phishing emails now. An example of an email designed to capitalize on fears of Coronavirus is one that appears to be from the World Health Organization. It urges users to click a button and download a document on safety measures. It looks legitimate enough, but actually is a huge red flag. You should avoid clicking any links on emails coming from outside your organization.[/cz_title][cz_gap height=”25px”][cz_image css_position=”relative;display: table;margin:0 auto” id=”cz_50812″ image=”13011″ sk_css=”box-shadow:2px 2px 10px 0px #323232;”][/cz_image][cz_gap height=”25px”][cz_title id=”cz_105812″ cz_title=””]Another concerning trend is hackers circulating bogus Coronavirus tracking websites and maps, disguised as reliable resources, but designed to install ransomware and malicious software.

 

Here are Some Examples of Red Flag Content Relating to Coronavirus:

  • Online sellers claiming they have in-demand products like face masks, medical supplies, and hand sanitizer. They just want you to click the link to their online store.
  • Emails, text messages and phone calls about getting your stimulus check from the government.
  • Emails from the Centers for Disease Control and Prevention or the World Health Organization. Scammers are using their reputable names to get you to click links in their emails. You should get your information directly from these organization’s websites. They will not email you.
  • Online offers for Coronavirus treatments or vaccines.

As a general rule, you should be extremely skeptical of any email that includes links or buttons for you to click, or attachments for you to open. You can’t control what happens once you click that link, so it’s important to be diligent about every email you get. You can hover over a link with your mouse to preview the url. Here is an example of an email from a bad actor, hoping to capitalize on the situation. As you can see, the link in this email looks suspicious, to say the least.[/cz_title][cz_gap height=”25px”][cz_image id=”cz_55608″ image=”13015″ sk_css=”box-shadow:2px 2px 10px 0px #323232;”][/cz_image][cz_gap height=”25px”][cz_title id=”cz_54535″ cz_title=””]Remember, there are many official resources for getting the information you need, so when you see that email with Coronavirus in the subject, take a deep breath and consider deleting it.[/cz_title]

[cz_gap height=”30px” id=”cz_62034″][cz_title id=”cz_88606″ cz_title=””]

Download Our Infographic

[/cz_title][cz_image fx_hover=”cz_image_zoom_in” link_type=”custom” id=”cz_80785″ image=”13018″ link=”url:http%3A%2F%2Flesolson.com%2Fwp-content%2Fuploads%2F2020%2F03%2Fcoronavirus-phishing-Infographic.pdf|||”][/cz_image][cz_gap height=”30px” id=”cz_62034″]

[cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_39112″ sk_overall=”background-repeat:no-repeat;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/12/Artboard-1cybersecuritytraining.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_title title_pos=”cz_title_pos_left” id=”cz_84253″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

REQUEST YOUR

FREE EMPLOYEE

CYBERSECURITY TRAINING

[/cz_title][cz_gap][cz_button title=”Learn About Our” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_71392″ subtitle=”SECURITY TRAINING” link=”url:%2Fservices%2Fcybersecurity%2Femployee-cybersecurity-training%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][/cz_content_box]

The post Coronavirus Phishing Scams on the Rise appeared first on Les Olson IT.

]]>
Tips to Avoid the Microsoft Support Phone Scam https://lesolson.redpeppersoftware.net/blog/tips-to-avoid-the-microsoft-support-phone-scam/ Tue, 16 Feb 2016 17:21:55 +0000 https://lesolson.com/?p=10549 Recently, Microsoft “Tech Support” Phone Scams have been carried out even more frequently than usual. You may get a phone call from someone claiming to be a Microsoft Support Technician. Be prepared so you can protect yourself and your business from becoming the prey of scammers.

The post Tips to Avoid the Microsoft Support Phone Scam appeared first on Les Olson IT.

]]>
[cz_image id=”cz_89989″ image=”11780″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_19416″ cz_title=””]Recently, Microsoft “Tech Support” Phone Scams have been carried out even more frequently than usual. You may get a phone call from someone claiming to be a Microsoft Support Technician. Be prepared so you can protect yourself and your business from becoming the prey of scammers.

 

HOW THE SCAM WORKS
Someone claiming to be a support technician with Microsoft (or another tech company) will call your office or even your personal phone to let you know that your computer has “registered a problem” and they can help you fix it.

 

They will then attempt to persuade you to download software that will allow them to gain remote access to your computer or direct you to fraudulent sites with the promise of “fixing your computer.” While there are legitimate remote help sites used by honest technicians, installing such applications at the request of a stranger claiming to be a technical support technician can result in your computer being compromised.

 

Many times they will try to get you to provide them with usernames, passwords, credit card numbers or other personal information. They may even request card information so they can “bill” you for their phony services. Some scammers can be quite convincing and seem very knowledgeable about your business.

 

THE FIRST THING YOU SHOULD KNOW
While many companies including Microsoft and Les Olson Company do offer technical support services – they will NEVER make unsolicited phone calls to ask for money in exchange for computer security or software fixes.

 

SO YOU SUSPECT YOU’RE TALKING TO A SCAMMER, WHAT NOW?
If you believe that you’re speaking with a scam artist, the best advice is to hang up. While it is best not to engage at all with the scammer, if you find yourself talking with them for any length of time DO NOT give them any information or agree to pay for any software or services. If possible, take down their name and phone number and submit a complaint to the Federal Trade Commission. Complaints help them detect patterns of fraud and abuse. If you receive one of these calls at your office, be sure to let your network administrator know.

 

Scammers can be very persistent. People have been known to give in to their requests out of sheer exhaustion. No matter how many times they call, they never comply with their instructions.

 

WHAT IF YOU ALREADY GAVE THEM INFORMATION?
If you think you may have already given a scammer access to your computer or information, it’s important to change your computer’s password, the password to your email account and especially passwords for your financial accounts such as your bank or credit card company. If you think they may have gained access to a work computer, let your network administrator know immediately so they can quickly address the breach. Don’t let embarrassment keep you from telling someone as quickly as possible.

 

YOUR BEST LINE OF DEFENSE
Your best line of defense is keeping all computer users, whether at home or in your business, informed about this scam. Make sure they know how to recognize this scam and what to do in the event of a fishy phone call.[/cz_title]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_19454″ sk_overall=”background-repeat:no-repeat;background-position:right top;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/11/Artboard-1NetworkAnalysis.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_27621″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

GET A FREE,

COMPREHENSIVE

NETWORK ANALYSIS

[/cz_title][cz_gap][cz_button title=”Request Your Free” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_21447″ subtitle=”NETWORK ANALYSIS” link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_39112″ sk_overall=”background-repeat:no-repeat;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/12/Artboard-1cybersecuritytraining.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_84253″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

REQUEST YOUR

FREE EMPLOYEE

CYBERSECURITY TRAINING

[/cz_title][cz_gap][cz_button title=”Learn About Our” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_71392″ subtitle=”SECURITY TRAINING” link=”url:%2Fservices%2Fcybersecurity%2Femployee-cybersecurity-training%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

The post Tips to Avoid the Microsoft Support Phone Scam appeared first on Les Olson IT.

]]>