person answering cell phone next to laptop

Don't Be Scammed by Fake Tech Support Calls

Network Security
February 7, 2017
Courtney Phillips

In recent months, we have had a lot of questions regarding support calls to users that claim to be from Microsoft.

Most often, these calls are to users at home and typically the person calling says they are from Microsoft and that malware has been discovered on the user's computer. As a "courtesy" they are just calling to remote in and help out - sometimes for a modest fee. What winds up happening is malicious software gets installed on the unsuspecting user's machine, personal information is compromised, and files are deleted.

Scammers do their best to look legitimate, often using a mix of spoofed phone numbers and social engineering in attempt to gain access or information.

From the official Microsoft Site:

Q: "Will Microsoft Ever Call Me?"

A: There are some cases where Microsoft will work with your Internet service provider and call you to fix a malware-infected computer—such as during the recent cleanup effort begun in our botnet takedown actions. These calls will be made by someone with whom you can verify you already are a customer. You will never receive a legitimate call from Microsoft or our partners to charge you for computer fixes."

For more information on how to avoid fake tech support calls and other safety and security information from our partners at Microsoft, follow this link to their Safety and Security Center.

¹Source:  Checkpoint Security Report 2016
Are you a small or medium sized business local to Spartanburg, Greenville, Boiling Springs, Greer,
Duncan, Gaffney, Hendersonville or Asheville with questions about Managed Technology Services?
Drop us a line or give us a call - We're happy to help! 

Unauthorized use and/or duplication of this material without express and written permission from Pivotal IT is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Pivotal IT with appropriate and specific direction to the original content

more articles
Fileless Malware: How It Works and How To Avoid It
Occasionally know as non-malware, fileless malware lives in your computer’s RAM, doesn’t use software, and attacks vulnerabilities within the computer’s operating system and software programs.
Network Security
9 Attack Patterns of a Data Breach
Since 2014, the majority of Data Breaches have used the same nine attack patterns - understanding them is key to developing an effective Cybersecurity Strategy.
Network Security
The Risks and Benefits of Shadow IT
Like it or not, it is a part of your small business network. Discover how to strike a balance between the needs of your end-users and keeping your sensitive data is secure.
Network Security