IT Scams

Scams that target users with fake pop-up warnings and impersonated tech support calls, and discover tips to recognize red flags, protect your information, and respond if affected.

Understanding IT Scams

What is an IT Scam?

IT Scams, also known as tech scams, impact everyone with a computer, tablet and/or phone. Scammers use two main approaches to hook their victims into providing access to their device or financial institution for their “services.”

  • Scammers rely on pop-up windows on one’s device that warns the victim of a virus or malicious software that has been detected and urges the victim to call the phone number listed on the pop-up for immediate service.
  • The second form of this scam includes calling victims and pretending to be a representative from a tech company. Be especially mindful that with this technique the fraudulent caller may spoof a real tech company in your area.
security-it-scam-feature

Pop-up warnings and tech support scams

If you find a pop-up window on one of your devices, disregard the message and run your own virus scan to determine if the device is infected. Do not click on the pop-up window. 

If you receive a phone call from someone impersonating a tech company, it is highly encouraged to disconnect the call and do not provide any information to the caller. Companies such as Microsoft and Apple will never call their customers when a virus is on one’s device. 

If you engaged in the scam and provided sensitive information such as system access, banking account or credit card information to the fraudsters, it is important to notify your financial institutions immediately to secure your accounts. 

Additionally, if you accidentally provided system access information or downloaded software it is vital to remove it immediately. If you need assistance, please contact a local IT professional directly. If you are unable to locate a local IT professional, try contacting Microsoft and/or Apple support teams for further assistance. 

Guiding Principles for Fraud Prevention

Review the tips below to prevent becoming a victim of a Social Engineering attack.

verify-sources
Directly verify with trusted sources

Research the offer, verify with trusted sources, and seek second opinions from friends, family, or neighbors.

think-carefully
Avoid pressure and think carefully

Resist pressure, take your time, and don’t be afraid to say “no” before sharing sensitive information or making payments.

red-flag
Be aware of red flags

Observe the situation and disconnect from the conversation without sharing any private information if something feels off.