Blog

Tip of the Week: How to Spot a Scam

Tip of the Week: How to Spot a Scam

What would you do if you sat down at your desk one morning, coffee still kicking in, to discover a pop-up message on your computer announcing that Microsoft has detected a fatal issue with your workstation, and if they aren’t allowed to remote in and fix it, the entire network could be at risk? Would you be able to, in the heat of the moment, recognize it for the scam that it is and disregard it?

Tech support scams are only too common, as blending phishing with social engineering has proven to be an effective means of scamming users. Today, our tip will cover how to recognize some of these scams so that they may be avoided… but first, it is important to recognize that scams like these are a serious problem everywhere, and not just for those targeted.

An Issue Around The World
These scams target users all over the world, although the impact is most clearly felt by users in China, India, and the United States. Regardless, other regions are also subjected to tech support scams - and India gets hit with a double-whammy.

The service-and-support-rep-in-India stereotype has its roots in a truly unfortunate reality. The level of competition in the job market is astronomical in India, especially for the generation that should be entering the workforce right about now. For example, a state-owned bank received over one and a half million applications for just one and a half thousand job openings. This job shortage affects even those with high qualifications. Someone could have a Master’s degree in business administration and have to fight for a position as a street sweeper.

Circumstances like these make any job opportunity to inherently be too good to pass up, even if your work comes at the expense of others.

Indian call centers use these circumstances to their advantage, using a secretive and convoluted process to hire those young people in search of a job, often not even revealing the identity of their employer. Applicants are often charged money for their attendance at interviews and job trainings, only being given a start date if they are accepted.

Many of these positions, however, are not the customer support jobs that were expected. Instead of providing customer service, these recruits are used as the initiators of a scam. They call their target and deliver the scam’s pitch, whatever it may be, and send their newly terrified connection to a senior scamming employee who ends the scam. These workers are soon stuck in an unenviable position: their pay is usually terrible and the emotional burden significant, yet there aren’t really any other avenues to make money in the overburdened job market.

As a result, it isn’t long before these scammers, themselves exploited, embrace their position and apply themselves to exploiting others simply to fulfill their need to survive.

Spotting Scams
Unfortunately, even if you feel for the person on the other end of a scam call, you need to protect yourself and your business from their influence. To do so, you need to be able to identify these scams. Below are a few tips for doing so:

  • Who’s On the Line? - Basic rule of thumb: if you get a call from someone claiming to be from “Microsoft” or any other technology brand, it’s almost a sure bet that they aren’t. These organizations aren’t in the habit of reaching out to people first, despite what your (potentially spoofed) caller ID might tell you.
  • Not Something You Want Linked to You - Scammers are also fond of using links, sharing them in an email to send the user to a website that displays plenty of falsified pop-up warnings. These links shouldn’t be clicked, and if you do inadvertently or are presented with a pop-up alert message, restart your computer. Other scammers will use search engines against their victims, using sponsored ads to target those looking for help by appearing at the top of results pages. While Google has put the kibosh on Remote Support IT advertisements, these links should still be avoided as they haven’t stopped everything.
  • Keep Control - Many scammers will pose as an IT resource and request remote access to a computer. Unless you know for a fact that someone from a third party is completely trustworthy, never surrender your computer to anyone. Doing so could easily allow a scammer to steal your data, or do something worse.

The Easiest Way to Avoid Scams
If you just so happen to have a trusted IT resource on your side, you won’t have to worry about scams like these - after all, you can have your provider check any claims and thereby protect your business from fraudsters. White Mountain IT Services can be that trusted IT provider for you. Give us a call at 603-889-0800 to learn more, and in the meantime, tell us about any scams you’ve spotted in the comments!

Related Posts

Small business owners are always on the lookout for that “special something” that will bring added value to their offering. In 2020, with COVID-19 sticking around, it has been difficult for businesses to commit to any new investments. To keep revenue...
Of all the technology that you have in the office, your printers may not be at the top of your list of security concerns. This is a mistake, as an unprotected printer could easily serve as an access point to someone with less-than-righteous motives. ...
A security audit is designed to test the overall integrity of your business when it comes to its IT security. In today’s environment, businesses need to have strengthened fortifications in place to protect themselves from cyberthreats, and these fort...
Recent events have shown how useful a remote workforce can prove to be, but this method of maintaining productivity isn’t without its challenges. For instance, a staff that is used to working side-by-side in an office may have difficulties in adjusti...
Starting in 2008, Verizon has produced a report outlining the cybersecurity incident trends that the previous year demonstrated. In doing so, they have provided a resource that gives businesses greater insights into where their cybersecurity efforts ...
If you were to look at any company’s list of priorities, chances are that “productivity” could be found somewhere at the top of the list. Current circumstances being what they are and many processes shifting as a result, this productivity is likely m...
With so many things that need to be accomplished each day, it always helps to have all the information needed to complete these tasks. If a task has no context assigned to it or no insight into how to approach it, productivity and morale are going to...

Quick question. If I were to ask you, on the spot, to tell me where all of your company data is, right this moment, could you tell me with absolute confidence? What if I could prove you wrong?

Collaboration is critical for a business’ success, but with more teams than ever split amongst their homes, it is arguably even more crucial to their operations. For this week’s tip, we’re going over three ways that your team can collaborate more eff...
Businesses are just now starting to reopen as stay-at-home orders are lapsing or going to lapse. For many of those businesses, remote solutions have got them through this ordeal and for many others they continue to deploy a remote workforce. For comp...
Conferencing has been an important tool for businesses as stay-at-home orders have moved their operations out of the office and into worker’s homes. While there are dozens of video conferencing solutions on the market, businesses should consider secu...
“Stuff” happens. While this may not be the kind of thing you want to consider in terms of your business’ operations, it is something that must be done if you want to be prepared for the moment when all of that “stuff” hits the fan (as so many busines...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our office in NH.  For locations outside of our service area, we will manage a local vendor to provide onsite assistance when needed.

 

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

White Mountain IT Services
33 Main Street, Suite 302
Nashua, New Hampshire 03064

 

603-889-0800

map nashua4 1

 

Open Positions