
You get a phone call, a pop-up message, or an email claiming there’s something wrong with your computer. It sounds alarming, but often, scammers are behind these messages. Their goal? To steal your money, personal information, or access to your files—putting your network, data, and business at serious risk.
How the SCAM works
Scammers often pretend to be from well-known tech companies like Microsoft. They use lots of technical jargon to make the “problem” sound real and convincing. They might ask you to open certain files or run a scan, telling you the results show issues with your computer—but there’s no real problem.
Once they’ve gained your trust, they may:
- Ask for remote access to your computer, which allows them to access all your files and any connected networks.
- Install malware to steal sensitive data, like usernames and passwords.
- Try to sell you useless software or repair services, often at a high price, when the same services may be available for free elsewhere.
- Enroll you in a bogus computer maintenance or warranty program.
- Request credit card information to charge you for fake services or products you could get elsewhere at no cost.
- Direct you to websites where they ask for credit card, bank account, and other personal information.
How to PROTECT your business
1. Hang Up on Unexpected Calls
- If someone calls saying there’s an issue with your computer, hang up immediately. Unsolicited tech support calls are scams, even if the number looks local or familiar. Scammers often use fake caller ID information to pose as local businesses or trusted companies.
2. Ignore Pop-Up Messages
- Some pop-ups about computer issues are legitimate, but never call a number or click a link from a pop-up warning you about a problem. These are often scams designed to trick you.
3. Consult a Trusted Source
- If you’re genuinely concerned about a virus or other threat, contact your security software company directly. Use the phone number from the company’s official website, your sales receipt, or the product packaging—or reach out to a trusted security professional for help.
4. Never Share Your Password or Give Remote Access
- Don’t give anyone your password, and never allow remote access to your computer if they reach out to you unexpectedly.
What to do if you’re SCAMMED
1. Change Your Passwords
- If you shared your password with a scammer, change it immediately on all accounts where you’ve used it. Use unique passwords for each service, and consider using a password manager to keep track of them securely.
How to setup a strong password
2. Remove Malware
- Download or update legitimate security software, scan your computer, and remove any threats the software identifies. If needed, consult a trusted security professional to help clean your system.
3. Check Your Network
- If the compromised computer is part of your business network, have a security professional check the entire network for potential intrusions.
4. Reverse Fraudulent Charges
- If you paid for fake services, contact your credit card company to dispute the charges. Monitor your statements for any unauthorized transactions and make sure the scammer doesn’t attempt to charge you again in the future.
Tech support scams can be damaging, but by staying vigilant and knowing the warning signs, you can protect your business from falling victim. Remember, never trust unsolicited tech support calls and always verify the source of any unexpected computer issues.
Stay tuned, stay secure, and let’s make Cybersecurity Awareness Month count!
*Article inspired by the guide “Cybersecurity for small business” written by the Federal Trade Commission (FTC).
——————–
We at APIS Consulting can assist you in enhancing your cyber security knowledge and IT security procedures. If you require any trainings, cyber security audits, to boost your IT security, or to outsource your IT security, you can get in touch with us via email at contact@apisconsulting.cn or by adding Antoine on WeChat using the QRcode below.


Antoine Pilarczyk founded APIS Consulting in 2021 to help companies in China to improve their cybersecurity awareness. He is a certified Lead Auditor and Lead Implementer ISO 27001.




Leave a Reply