By Caroline Akinnigbagbe | Information Systems Technician | Administration
At Redstone Bank, our top priorities are the security and protection of your personal and financial information.
Unfortunately, scammers are becoming more sophisticated, especially regarding tech support scams, where fraudsters pose as legitimate technical support personnel to gain access to your sensitive information. In honor of Cyber Security Month, we’ve compiled this guide to explain how these scams work and how to protect yourself.
What Are Tech Support Scams?
Tech support scams involve cybercriminals tricking individuals into believing their computer or device has a serious problem, such as a virus or system failure. The scammer typically contacts you in one of the following ways:
- Unsolicited Phone Calls: You receive a call from someone claiming to be from a well-known tech company (e.g., Microsoft, Apple, etc.), warning that your device is infected or compromised.
- Pop-up Warnings: While browsing the internet, a pop-up appears on your screen, claiming that a virus has infected your computer. It provides a phone number or link to connect with “tech support.”
- Fake Emails: An email appears to be from a legitimate company and asks you to call a tech support number to resolve a fake issue.
Once connected with the scammer, they may ask you to grant them remote access to your computer, where they can install malware, steal your financial information, or ask for payment for “repairs” you don’t need.
“Always try to be on the safer side when you receive unexpected phone calls or emails posing as tech support.”
How Do These Scams Work?
Scammers use fear tactics to make you think something is seriously wrong with your device. Here’s how a typical scam might unfold:
- The Initial Warning: You see a pop-up or get a phone call saying your device is infected. The message may appear urgent, sometimes using flashing lights or alarming language like “Your computer is at risk!” to create a sense of panic.
- Offer of Help: The fraudster offers to “fix” the problem, but first, they need remote access to your computer. They may ask you to download software that allows them to control your computer remotely.
- Request for Payment: Once they have access, they’ll claim to have “fixed” the problem and request payment, either for the fake service or to purchase unnecessary software. They may even suggest transferring money via wire transfer or gift cards, which are harder to trace.
- Potential Identity Theft: Beyond the immediate scam, once a fraudster has access to your computer, they can install malware, steal personal information, such as your banking credentials, and commit identity theft.
How to Protect Yourself
At Redstone Bank, we want to help you stay aware to protest yourself from these scams. Here are some tips to keep your information and finances safe:
- Never Trust Unsolicited Contact: Legitimate tech companies will not contact you out of the blue to warn you about a virus or computer issue. If you receive such a call, hang up. Do not call back any numbers provided in pop-ups, emails, or unsolicited calls.
- Avoid Granting Remote Access: Never allow someone to remotely control your computer unless you verify their legitimacy. Scammers can misuse this access to steal sensitive data.
- Use Trusted Security Software: Protect your devices with reliable and up-to-date security software. These programs can help detect and block malware before it causes harm.
- Don’t Pay for Unnecessary Services: Be wary of anyone asking for payment for “tech support” services, mainly through untraceable means such as wire transfers or gift cards. Real companies won’t ask you to pay this way.
- Verify Before Taking Action: If you’re ever uncertain about a potential scam, verify the information before taking action. Contact the supposed company directly using their official website or customer service number.
- Monitor Your Bank Accounts: Regularly check your bank and credit card statements for any unauthorized transactions. If you spot suspicious activity, report it immediately.
What to Do if You’re Targeted by a Scam
If you believe a tech support scam has targeted you, follow these steps:
- Disconnect Immediately: If you gave a scammer remote access to your computer, disconnect from the internet immediately to limit further access.
- Run a Virus Scan: Use your security software to scan your device for malware and remove any suspicious programs.
- Contact Your Bank: Contact your bank immediately if you’ve shared any financial information or made a payment. We can help monitor your accounts for fraudulent activity and take steps to secure your financial information.
- Report the Scam: Notify the Federal Trade Commission (FTC) or your country’s relevant consumer protection agency about the scam. Reporting these incidents helps authorities track and shut down these criminal operations.
Your Safety is Our Priority
At Redstone Bank, we are committed to helping you stay informed and protected from scams. Remember, if you ever have doubts about a suspicious interaction or feel uncertain about the legitimacy of a tech support call, always err on the side of caution. For more information on how to protect yourself from other types of fraud, click here.