How to Spot and Manage a Scam Artist

It’s 6 O’clock on a Wednesday evening. You’re reading the news and clicking through e-mail when out of nowhere you get a huge pop up message stating “WINDOWS HAS DETECTED SUSPICIOUS ACTIVITY!”. Not only does this message look official, but you cannot click out of it. It would seem your only option is to call the phone number that they have listed. So, it must be Microsoft trying to help you, right? 

 What you are dealing with when you get a pop up or a call from a major tech company is almost always a targeted scam. Phone and imposter scammers are getting more and more clever. They sound official, they are pushy, and they caused 9 billion in damages in 2017 alone. 

In the past two years, due to the sheer number of clients who have had an impostor scammer call them and gain access to their machine, we created a special security assessment to handle them.  Our security assessment scans for unwanted applications, viruses and backdoors into a computer.  Best practice dictates that if an unwanted guest has gained access to your machine, or you suspect that someone has, to do a full security sweep. If you do not, you risk giving our social media accounts, banking and credit card information.

Wondering what you can do to prevent this from ever becoming an issue? The FTC has written an excellent article about how these scams work, and what to do if you get contacted. Take a look at the FTC article here.

If you are worried a scammer has been inside of your machine, give us a call at (920)-885-0141, or contact us online.  Let us run a security assessment and ensure you are protected. 

Scroll to Top