Security Issues: Tech Support Phishing Scams

Cybercriminals are constantly evolving their methods to disrupt and cause damage, even by impersonating tech support specialists. That’s why in this week’s One-Minute Wednesday, we’re going to cover how guard yourself from Tech Support Scams.

Fake Support

A Tech Support Scam occurs when a cybercriminal tries to contact a user and inform them something is wrong with their device. This communication can come in the form of a notification that popups on screen or by a phone call. Their messages try to sound as convincing as possible to convince you that you actually have a problem, and that any attempt to shut down your machine or closing the error window will only cause further problems.

In order to “fix” the issue, the scammer will ask you to submit your credit card data to purchase software that will resolve the info. Other times, they will ask you to take steps to hand over full control of your system, which gives them full access to your files, information and other private data.

With risks like these, there are still steps you can take to remain safe. First, realize that real companies like Microsoft, Apple or Google won’t cold call you about a tech support issue you didn’t submit. Secondly, if you get a suspicious looking phone call, hang up. Legitimate tech support services won’t ask you to divulge private information like passwords, credit card PINs or social security numbers. If one of these messages pops up on your device, look out for the style, grammar and logos, as misspelling or words in all caps that sound demanding can be telltale signs of an attack at play.

In conclusion, scammers are always trying to take advantage of your trust and fear to steal from you. Stay alert by paying careful attention to what comes across your screen or on your phone and you can remain secure. Thanks for tuning in and join us next week for more!

Share:

More Posts

Cup of IT: Sending Secure Emails with Microsoft 365

Microsoft 365 comes with several built-in security features that allow your organization to manage how sensitive information is handled via email. On this episode of Cup of IT, we’ll be discussing how to send secure emails using sensitivity labels, email encryption, and the do-not-forward options in Microsoft 365.

Clean Your Inbox with Outlook Folders

Using Outlook folders is a great way to begin relieving the stress of managing your inbox. On today’s One-Minute Wednesday, you’ll learn how to create customizable folders that can automatically categorize your email, giving you a better experience with your inbox.

Blocking Senders in Microsoft Outlook

Tired of junk mail getting past your built-in spam filter? You can quickly and easily train your junk folder in Microsoft Outlook. On today’s One-Minute Wednesday, Sean Mountain will show you how to mark email as junk and block senders, giving you more power over what shows up in your inbox!

Getting Started With Two-Factor Authentication

Today’s cybersecurity landscape is filled with a variety of evolving threats, demanding new ways to protect your data. On this week’s One-Minute Wednesday, we’ll cover how Two-Factor Authentication can keep you safe from the vast majority of cybersecurity breaches.