Protect Yourself from Tech Support Scams

Computers and smartphones have become an important part of daily life for most people. As a result, tech support scammers will prey on people’s reliance on these devices to try and trick targets into believing the device has a problem that the scammer can fix. Usually, the problem they present, such as a claim of a virus or a program tracking the user’s search history, does not actually exist on the device.

After telling you there is a problem that likely doesn’t exist, the scammer will ask for payment, usually in the form of gift cards, wire transfer, cryptocurrency, or a money transfer app such as Venmo or Zelle®. Scammers prefer these methods of payment because they are difficult to reverse if the sender recognizes the scam after the payment was made.

Examples of Common Tech Scams

There are several common tech scams used by scammers attempting to gain access to your device, information, and money.

  • Fake Virus or Malware Pop-ups – Scammers will create websites with pop-ups featuring alarming sounds, images, and possibly flashing graphics and large text stating a virus has been found on your device. The pop-up may also include a digitized voice. The pop-ups will have a phone number to call for assistance in removing the virus from your device. Once on the phone with you, the scammer will attempt to convince you to install software that will allow them to remotely access your device and they will pretend to fix the problem in exchange for payment.
  • Phone Calls – Sometimes the scammer will skip tricking you into calling them and will call you directly. They will say there is a problem with your smartphone or computer and that they need to remotely access your device to fix it. They might also tell you that your bank account or other accounts are compromised, and they need you to verify your login information to protect your account. As with the fake pop-ups, the intent is to trick you into thinking they are scanning and fixing your device and then asking for an online payment to fix the non-existent problem and/or stealing your credentials.
  • Fake Support Companies – You may notice that when you search for a computer issue online, sometimes several suspicious websites pop up as the top results. These websites are usually fake sites created by scammers to attempt to trick you into installing software to fix your computer problem. This software usually contains malicious code or adware to compromise your device.
  • Tracking Software Pop-ups – Some websites will contain pop-ups that cover your entire screen with an alert that your browsing history is being tracked and you need to call a number to stop the tracking from occurring. These pop-ups will create a sense of urgency by mentioning the FBI or other government agencies to convince you the scam is legitimate. Once on the phone, the scammer will follow similar steps to the ones above, trying to gain access to your device and asking for payment to resolve the tracking issue.

Stay Informed to Help Protect Yourself from Scams

There are steps you can take to help protect yourself, your device, and your personal information from tech scams.

  • Restrict Access to Your Device – Always verify the identities of anyone who asks for access to your device. If it’s not a tech support company you are familiar with, do not install anything they ask you to, or give them your credentials.
  • Keep Software Up to Date – Ensure your antivirus and other software is up to date with the latest security patches and updates.
  • Change your passwords – It’s a good practice to change your passwords often and change them immediately if you suspect your accounts have been compromised by a scammer.

What If You Already Spoke to a Scammer?

If you think you allowed a scammer access to your computer or your information, there are steps you can take.

  • If you gave a scammer remote access to your computer, consider having a local technology expert assist with scanning your computer for malware and updating your computer’s security software.
  • If you gave your username and password to a scammer, change your password right away. If you use the same password for other accounts or sites, change it there, too.
  • If you gave a scammer your Social Security number (SSN), visit identitytheft.gov to learn how to monitor your credit report to see if your SSN is being misused. Notify your financial institutions.

The information contained in this article should not be construed as financial, legal, or tax advice, and may not be reflective of terms and features currently offered by Enterprise Bank. Please contact us for details on current product offerings and rates.

If you think you are the victim of fraud related to your account with Enterprise Bank, please contact the Bank’s Call Center at 978-459-9000 or toll-free at 877-671-2265. For additional information on how to protect your accounts, visit https://www.enterprisebanking.com/security.

More Learning

ACH and Wire Fraud Awareness

ACH and wire fraud scams are on the rise. Here are signs to be aware of to help protect your business.

What is the Deal with Leap Year?

Approximately every four years, February has 29 days instead of 28 and the year has 366 days. The extra day is called “leap day” and the year it happens is called “leap year.” But why do we have this?

Banking 101: What is an IRA?

An IRA is an Individual Retirement Arrangement set up with a financial institution that allows someone with earned income to save money for retirement.

Do you want to call or text us?

Leaving Site Confirmation