Tips

Tips to Avoid the Microsoft Support Phone Scam

Tips to Avoid the Microsoft Support Phone Scam
[cz_image id=”cz_89989″ image=”11780″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_19416″ cz_title=””]Recently, Microsoft “Tech Support” Phone Scams have been carried out even more frequently than usual. You may get a phone call from someone claiming to be a Microsoft Support Technician. Be prepared so you can protect yourself and your business from becoming the prey of scammers.

 

HOW THE SCAM WORKS
Someone claiming to be a support technician with Microsoft (or another tech company) will call your office or even your personal phone to let you know that your computer has “registered a problem” and they can help you fix it.

 

They will then attempt to persuade you to download software that will allow them to gain remote access to your computer or direct you to fraudulent sites with the promise of “fixing your computer.” While there are legitimate remote help sites used by honest technicians, installing such applications at the request of a stranger claiming to be a technical support technician can result in your computer being compromised.

 

Many times they will try to get you to provide them with usernames, passwords, credit card numbers or other personal information. They may even request card information so they can “bill” you for their phony services. Some scammers can be quite convincing and seem very knowledgeable about your business.

 

THE FIRST THING YOU SHOULD KNOW
While many companies including Microsoft and Les Olson Company do offer technical support services – they will NEVER make unsolicited phone calls to ask for money in exchange for computer security or software fixes.

 

SO YOU SUSPECT YOU’RE TALKING TO A SCAMMER, WHAT NOW?
If you believe that you’re speaking with a scam artist, the best advice is to hang up. While it is best not to engage at all with the scammer, if you find yourself talking with them for any length of time DO NOT give them any information or agree to pay for any software or services. If possible, take down their name and phone number and submit a complaint to the Federal Trade Commission. Complaints help them detect patterns of fraud and abuse. If you receive one of these calls at your office, be sure to let your network administrator know.

 

Scammers can be very persistent. People have been known to give in to their requests out of sheer exhaustion. No matter how many times they call, they never comply with their instructions.

 

WHAT IF YOU ALREADY GAVE THEM INFORMATION?
If you think you may have already given a scammer access to your computer or information, it’s important to change your computer’s password, the password to your email account and especially passwords for your financial accounts such as your bank or credit card company. If you think they may have gained access to a work computer, let your network administrator know immediately so they can quickly address the breach. Don’t let embarrassment keep you from telling someone as quickly as possible.

 

YOUR BEST LINE OF DEFENSE
Your best line of defense is keeping all computer users, whether at home or in your business, informed about this scam. Make sure they know how to recognize this scam and what to do in the event of a fishy phone call.[/cz_title]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_19454″ sk_overall=”background-repeat:no-repeat;background-position:right top;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/11/Artboard-1NetworkAnalysis.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_27621″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

GET A FREE,

COMPREHENSIVE

NETWORK ANALYSIS

[/cz_title][cz_gap][cz_button title=”Request Your Free” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_21447″ subtitle=”NETWORK ANALYSIS” link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_39112″ sk_overall=”background-repeat:no-repeat;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/12/Artboard-1cybersecuritytraining.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_84253″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

REQUEST YOUR

FREE EMPLOYEE

CYBERSECURITY TRAINING

[/cz_title][cz_gap][cz_button title=”Learn About Our” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_71392″ subtitle=”SECURITY TRAINING” link=”url:%2Fservices%2Fcybersecurity%2Femployee-cybersecurity-training%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

Related Posts