Blue Lightning IT Services Logo
CALL US
470-236-2584
Blue Lightning IT Services Header
  • Home
  • Services
  • Plans
    • Home Support Plans
    • Business Support Plans
    • Cybersecurity Protection Plans
    • Data Backup & Recovery Plans
    • Network Management Plans
    • Business Phone Plans
      • Hosted PBX Features
    • Video Surveillance Cloud Storage Plans
    • Video Surveillance Cloud AI Storage Plans
  • Blog
  • Sign In
  • Contact
  • About

How To Spot A Tech Scam Before You Get Stung

June 13, 2018 by Matthew Schulz

In this edition, I'm calling out tech scammers and the tricks they're using to con millions out of computer owners each year.

If your computer had a virus, you'd want to know about it ASAP, right?

Your important files become corrupted. You lose your photos and your digital life is essentially destroyed. Even thinking about it is terrifying.

Tech scammers know we'd be lost without our computers, and that we don't always know what's going on behind the screen - which is why they've been able to swindle millions from every day people across the world.

Spot a Tech Scam Before You Get Stung

The scam goes like this:

You receive a random phone call from someone with a heavy accent saying they're from Microsoft, or an alarming pop-up appears on the screen, saying it looks like your system has been infected with a virus.

To fix the problem, they need you to download some support software, which they'll give you a special link for.

A technician then uses that software to gain access to your system and make it appear your system is riddled with viruses. Flashing screens, mysterious diagnostics whizzing by, fabricated errors...they'll do or say anything to make you panic. They'll even go as far as claiming your system has been infected with illegal content and if not corrected, you'll face criminal charges.

Demands for credit card information follow immediately after. Once paid, they simply stop fiddling with your system to make it seem the problem is fixed. To continue the scam, they'll soon access your system to recreate the problem, this time offering a subscription for ongoing protection.

What to do if you're targeted by a tech scam

  1. Don't taunt them. Just hang up. Right now you're only a phone number in their system and they'll move onto the next - if you give them cause to target your personally, you may find yourself in a dangerous situation. The real Microsoft will never randomly call people like this. Ever.
  2. If a pop-up appears, immediately run an antivirus scan. Don't click the pop-up or call the number.

What to do if you've already been scammed

It's okay. If feels horrible, but you're not alone and the situation can be corrected.

Call your financial institution and have the charges reversed and your card reissued. It's easier than you might think and helps the authorities locate the scammers.

 

Need assistance with protecting from cyber attacks?

Contact us today!

Contact Us

Filed Under: Tips

Share:

Services

  • Technology Asset Disposal Service
  • Print and Copier Services
  • Video Surveillance
  • Proactive Computer Management
  • PC & Mac Support
  • Cybersecurity Protection
  • Data Backup & Recovery
  • Network Management
  • Microsoft 365 Administration
  • Business Phone Service
  • Managed Print Services Partnership
  • 5 Red Flags of Phishing Emails: Think Before You Click
  • What Hackers Target in a Small Business
  • LetMeIn101: How the Bad Guys Get Your Password
  • Is Misconfiguration Making Your SMB Vulnerable?

Categories

  • Antivirus
  • Managed Print Services
  • Microsoft 365
  • Phone Services
  • Security
  • Tips
  • Tune Ups

Blue Lightning IT Services

470-236-2584
1911 Grayson Hwy STE 8-113
Grayson, GA 30017

Services

  • Technology Asset Disposal Service
  • Print and Copier Services
  • Video Surveillance
  • Proactive Computer Management
  • PC & Mac Support
  • Cybersecurity Protection
  • Data Backup & Recovery
  • Network Management
  • Microsoft 365 Administration
  • Business Phone Service

Recent Posts

  • Managed Print Services Partnership
  • 5 Red Flags of Phishing Emails: Think Before You Click
  • What Hackers Target in a Small Business
  • LetMeIn101: How the Bad Guys Get Your Password
  • Is Misconfiguration Making Your SMB Vulnerable?

Copyright © 2025 · Blue Lightning IT Services · 1911 Grayson Hwy STE 8-113, Grayson, GA 30017