Users Beware of Remote Tech Support Scammers

Users Beware of Remote Tech Support Scammers

Cyber criminals are using the phone to try to break into your computer pretending to be remote tech support from well-known companies like Microsoft and Apple. Find out how to protect yourself and business.

When contacted, the cyber criminals state that they have detected viruses or other malware on your computer.  They ask that you them remote access or pay for software to fix it.  These cyber criminals take advantage of your of peoples fear of viruses and other threats. They know that computer users have heard time and again that it’s important to install security software to protect yourself but the purpose behind this to make money.

Once these cyber criminals gain your trust, they may perform one of the following tasks:

  • Ask you to give them remote access to your computer
  • Make changes to your settings that could leave your computer vulnerable
  • Enroll you in a worthless computer maintenance or warranty program
  • Ask for credit card information so they can bill you for phony services
  • Install malware that could steal sensitive data, like user names and passwords
  • Direct you to websites and ask you to enter your credit card number and other personal information


What do you do if you get a remote tech support call?

First off, if you use a managed IT services company and they are using the right tools to manage your network, you will never have to give them access to your network.  If you unfortunately do get a call from someone who claims to be a tech support person, the best advice is to get the contact information and contact the company yourself to verify the person and company.  Remember, real IT support services professionals do not create a sense of urgency or uses high-pressure tactics. Also, you should never give control of your computer to a third party who calls you out of the blue and do not rely on caller ID to authenticate a caller as it can be easily spoofed.


What do I do if I gave these remote tech support scammers access?

If you have given them access to your computer, you should follow the next steps listed below.

  • Get rid of malware or security software they installed and scan your computer.
  • Delete all items that are identified as a problem or security issue.
  • Change your passwords immediately. If you use these passwords on other accounts, change those accounts also.
  • If you paid for bogus services with a credit card, call your credit card provider and ask to reverse the charges.

In either case, the scammers eventually ask for a bank or credit card account number. Or they ask you to create a Western Union account. They might even ask for remote access to your computer to help you fill out the necessary forms. But instead of putting money in your account, the scammers withdraw money from your account.

Is your managed service provider identifying themselves to your employees properly?


365 iT SOLUTIONS partners with its clients to ensure uptime and profitability. We are Toronto’s leading IT consulting firm and offer cutting edge Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Enroll in our Complimentary Network and Security Audit by or 416-398-9889


More News

Get a Free Network
Assessment (Value $1,997)

No Obligation. No Risk. Completely Free.