News Feed Item

Four Ways to Protect Your New Computer from the "Tech Support Scam"

Department of Banking and Securities Promotes Holiday Scam Protection Week

HARRISBURG, Pa., Dec. 6, 2017 /PRNewswire-USNewswire/ -- While many Pennsylvanians can expect to find a new computer under the tree later this month, Secretary of Banking and Securities Robin L. Wiessmann urges consumers to consider four strategies to protect their new computers from the "tech support scam."

Wiessmann explains how this scam works:

  • You receive an unexpected phone call or an email from someone claiming to work for a computer software company like Microsoft or even a prominent e-commerce brand such as Amazon or LinkedIn. This person claims that they have identified your computer as being infected with a virus, and offers to fix the problem.

  • In order to perform the "fix," you will be asked to pay a fee by providing your credit or debit card information (this could be $50 or more). This person – a scam artist -- will ask for access to your computer's systems and software from wherever they are located.

  • While performing the so-called fix, malware and even viruses are being downloaded to your computer. Your system, files, and information have been compromised.

  • You may not discover that your computer has been taken over by a scam artist for days, weeks, or even months – and during this time, the scammer has been watching your every move on your own computer.

  • The scam artist may even have downloaded "ransomware" onto your computer – you will not be able to access your computer files until you pay a ransom to the scammer. And once you've paid, you still may not get back access to your computer files.

"These con artists are like the proverbial geese-a-laying, but instead of eggs, you will get a computer virus," said Wiessmann. "In this age where technology makes tasks easier, it is more important than ever for consumers to take the time to investigate offers and take control before handing over money or sharing personal information."

Wiessmann points to four strategies that can help consumers protect their computers:

  1. Make sure you have current, effective anti-virus software installed on your computer.
  2. If a person calls claiming to work for specific company like Microsoft, LinkedIn, or Amazon, tell them you will call them back. Call that company using a phone number you have verified as legitimate (using, for example, the company's website).
  3. If you have received an email, contact the company's customer support website and ask the company to verify that this person is actually one of their employees.
  4. If you believe your computer is infected, avoid using the Internet and:
    1. Run a scan using your anti-virus software; or
    2. Contact a reputable computer repair technician or company and have them check your computer.

As part of the department's "Holiday Scam Protection Week," Wiessmann urges consumers to be informed. Know the "red flags" of scams and fraud and who you can contact if you believe you are a victim. Check out the publication: "Scams: Protect Yourself. Protect Your Money" www.dobs.pa.gov/Documents/Publications/Brochures/Scams%20Booklet.pdf

"Although scams may take different forms, the underlying method is often the same: preying on emotions, circumstances, or lack of knowledge to take financial advantage of another party," Secretary Wiessmann added. "Consumers and businesses cannot afford to take every financial opportunity or transaction at face value. This holiday season, everyone is going to have to be more diligent and investigate before investing their money or sharing personal or financial information."

Anyone can contact the Department of Banking and Securities at 1-800-PA-BANKS or 1-800-600-0007 to ask questions or file complaints about financial transactions, companies, or products. Members of the public are also invited to connect to the department through Facebook and Twitter, or subscribing to the department's newsletter.

MEDIA CONTACT: Ed Novak, 717-783-4721

View original content:http://www.prnewswire.com/news-releases/four-ways-to-protect-your-new-computer-from-the-tech-support-scam-300567802.html

SOURCE Pennsylvania Department of Banking and Securities

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta Chakraborty, Chief Customer Officer at Ayasdi, provided a tactical framework to become a truly intelligent enterprise, including how to identify the right applications for AI, how to build a Center of Excellence to oper...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
In his session at 21st Cloud Expo, James Henry, Co-CEO/CTO of Calgary Scientific Inc., introduced you to the challenges, solutions and benefits of training AI systems to solve visual problems with an emphasis on improving AIs with continuous training in the field. He explored applications in several industries and discussed technologies that allow the deployment of advanced visualization solutions to the cloud.
"ZeroStack is a startup in Silicon Valley. We're solving a very interesting problem around bringing public cloud convenience with private cloud control for enterprises and mid-size companies," explained Kamesh Pemmaraju, VP of Product Management at ZeroStack, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...
22nd International Cloud Expo, taking place June 5-7, 2018, at the Javits Center in New York City, NY, and co-located with the 1st DXWorld Expo will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud ...
Enterprises are adopting Kubernetes to accelerate the development and the delivery of cloud-native applications. However, sharing a Kubernetes cluster between members of the same team can be challenging. And, sharing clusters across multiple teams is even harder. Kubernetes offers several constructs to help implement segmentation and isolation. However, these primitives can be complex to understand and apply. As a result, it’s becoming common for enterprises to end up with several clusters. Thi...
"Infoblox does DNS, DHCP and IP address management for not only enterprise networks but cloud networks as well. Customers are looking for a single platform that can extend not only in their private enterprise environment but private cloud, public cloud, tracking all the IP space and everything that is going on in that environment," explained Steve Salo, Principal Systems Engineer at Infoblox, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventio...
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
Widespread fragmentation is stalling the growth of the IIoT and making it difficult for partners to work together. The number of software platforms, apps, hardware and connectivity standards is creating paralysis among businesses that are afraid of being locked into a solution. EdgeX Foundry is unifying the community around a common IoT edge framework and an ecosystem of interoperable components.
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation. In the years since the publication of the Agile Manifesto, the conn...
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Large industrial manufacturing organizations are adopting the agile principles of cloud software companies. The industrial manufacturing development process has not scaled over time. Now that design CAD teams are geographically distributed, centralizing their work is key. With large multi-gigabyte projects, outdated tools have stifled industrial team agility, time-to-market milestones, and impacted P&L stakeholders.
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.