facebook linkedin twitter

Want Proof that You Need to Monitor Your Solutions?

Want Proof that You Need to Monitor Your Solutions?

When discussing the practice of monitoring solutions to prevent threats, it isn’t uncommon for many businesses to put these concerns on the back burner. However, every so often, an example comes around to help inspire businesses to take their monitoring seriously. This time, the example was the arrest of 24 spammers in October for scamming American citizens by impersonating Microsoft support staff members.

Working with Microsoft’s international Digital Crime Unit, the cyber cell of the Delhi police leveraged data analytics to take down illegal call centers that had been targeting Microsoft Windows users in the United States with fraudulent tech support scam attempts.

These scams were pretty predictable, if you know how a tech support scam usually takes shape. First, the employees of the call centers would send out a manufactured notification warning their targets that their systems had been compromised, with websites created for the purpose of supporting their false claims. Once a victim reached out to them, these fraudsters would charge a tech support fee of anywhere from $100 to $500 - but since there was no problem to solve, they would steal data and install actual malware once they were granted access.

However, an employee of Microsoft named Nripenda Kashyap was able to spot these activities through his monitoring systems and thereby send word to the DCU. This report was the catalyst that resulted in raids being conducted on 10 call centers and the arrest of 24 scammers, including the owners of these businesses.

What can we take away from all this?

The first lesson to be gleaned is that there will never be a time that a technology company like Microsoft will alert you of issues that your device is having. Unless you reach out to them for assistance and initiate first contact, you are on your own. The only time that you will legitimately be notified is if you have a service provider like Computerware there to help protect your infrastructure.

Secondly, the kind of monitoring systems that Computerware offers aren’t something that your business can go without. The DCU filed a lawsuit claiming that tech support scams take 3.3 million users to the tune of $1.5 billion every year. This lawsuit was filed in 2014. How much do you think these numbers have increased since then?

Even if you try to monitor your solutions independently, there is a certain level of expertise that is necessary. Your computer will report dozens of perfectly normal, benign errors every day. An IT pro can spot the actual threat, while a layman might panic at the growing stream of issues.

If you’re intent on incorporating monitoring and maintenance into your IT management strategy, reach out to us first. Not only can we identify threats proactively, we can work to mitigate them before they have an effect.

For more information about our services, which only include remote monitoring and maintenance, give Computerware a call at (703) 821-8200.

New Collaboration Apps Building Better Businesses
Tip of the Week: Improvement Needed to Avoid Cyber...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Business Email Saving Money Network Security Malware Hosted Solutions IT Services IT Support Efficiency Google Small Business Computer Quick Tips Smartphones Mobile Devices Innovation User Tips Gadgets Business Continuity Microsoft Office Disaster Recovery VoIP Network Android Social Media Mobile Office Virtualization Collaboration Data Backup Server Productivity Mobile Device Management Communication Smartphone Data Recovery Miscellaneous Ransomware Windows 10 Upgrade communications Tech Term IT Support Unified Threat Management Windows Passwords Operating System Facebook Holiday Remote Monitoring Managed IT services Apps Cybersecurity BYOD Remote Computing Mobile Computing Vendor Management BDR Users Phishing Automation WiFi The Internet of Things Marketing Mobile Device Analytics History Firewall Apple Data Management Outsourced IT Browser Save Money App Managed IT Services Alert Artificial Intelligence Internet of Things Encryption Big data IT Consultant Spam Bring Your Own Device Antivirus Maintenance Printer Office 365 Office Cloud Computing Content Filtering Going Green Bandwidth Health Gmail Help Desk Wireless Technology Cybercrime Hiring/Firing Search Hard Drives Windows 8 Business Technology Outlook Saving Time Cost Management Best Practice Information Technology Tech Support Windows 10 Lithium-ion Battery Virus Budget Two-factor Authentication Managed IT Access Control Money Training Recovery Employer-Employee Relationship Document Management Blockchain Hacking Computers VPN Travel Healthcare Update IBM Phone System Government Website Managed Service Administration It Management Legal Proactive IT Networking Running Cable Hard Drive Regulations Mobility Twitter Humor Information Intranet SaaS Education Law Enforcement Risk Management Customer Service Augmented Reality Compliance Data storage PowerPoint Applications Save Time Black Market Telephone Systems Current Events Flexibility Router Downtime Cryptocurrency Laptop Comparison Tablet Business Growth Word Data Security Company Culture Computer Repair File Sharing Password Cortana Patch Management Social Networking Value Fax Server Data Loss Google Maps Avoiding Downtime Paperless Office Scam Hacker Sports Social Engineering iPhone Disaster Data Breach Computing Hosted Solution End of Support Project Management Robot Excel User Digital Websites Securty Social Customer Relationship Management Wireless Business Intelligence Solid State Drive DDoS Digital Payment Machine Learning Distributed Denial of Service Uninterrupted Power Supply Storage Text Messaging Co-managed IT Webcam User Error Computer Accessories Conferencing Bitcoin Google Docs Public Cloud Experience Trending Data Protection Retail Cleaning Mouse Identity Theft eWaste Monitors Monitoring Office Tips Lifestyle Statistics Inbound Marketing Cooperation Programming Virtual Reality YouTube Network Congestion Politics Vendor Processors Management Redundancy Emails Unified Communications Settings Automobile Chromebook USB Pain Points Evernote Computing Infrastructure Hack Vulnerabilities Streaming Media Presentation How To Specifications Safety Download Virtual Desktop IT service Private Cloud Net Neutrality Start Menu Tech Terms Documents Telephony Mobile Technology Chrome Gaming Console Entertainment Software as a Service Microchip Taxes Heating/Cooling Bluetooth Smart Tech Distribution Google Drive Windows Server 2008 Debate Modem Piracy Upload Reading Samsung Harddrive Proxy Server G Suite GPS PDF Term Fiber-Optic Database Vulnerability Deep Learning Employer Employee Relationship Electronic Medical Records HTML Spyware Mobile Payment Work/Life Balance online Currency Webinar Directions Telephone System Hacks Physical Security External Harddrive Best Available Keyboard Recording Mobile Security Electricity Printing Visible Light Communication Memory Licensing Domains Multi-Factor Security Cost Windows 7 LinkedIn Banking Botnet SSID Software License Trends IT consulting Relocation Tablets Dark Web Sync 3D Ebay Processing Fraud Tactics Thin CLient Health IT Public Speaking Devices cache Television Managed IT Service CIO Skype Notifications CCTV Smart Phones Shortcut UTM Content WannaCry Downloads Advertising Flash Archive Troubleshooting Bookmark Legislation Error Time Management Freedom of Information Staffing Google Wallet Business Metrics Computer Malfunction Entrepreneur IT Plan Enterprise Resource Planning Corporate Profile Windows XP Reliable Computing Society In Internet of Things Adminstration Pirating Information Environment Google Play email scam Addiction Displays Point of Contact Leadership HIPAA Best Practives Accountants A.I. Assessment SharePoint Electronic Payment Processor Tip of the week Micrsooft Competition Multi-factor Authentication Google Calendar Business Owner Browsers Wireless Headphones Telephone Touchscreen News Drones Motion Sickness Microserver Medical IT Migration Connected Devices VoIP Scalability Consultation Recycling Security Cameras Network Management Knowledge Analytic Messenger Tracking User Tip IP Address Equifax Fleet Tracking Navigation Human Resources Virtual Assistant Product Reviews Rental Service Meetings Get More Done Application Device security MSP Technology Tips Permissions Language Upselling Printer Server Data Analysis Nanotechnology Social Network Fake News Web Server Turn Key Professional Services Desktop Finance Audit Read Cabling Asset Tracking Data Warehousing Music Wi-Fi Administrator Video Surveillance GDPR Business Cards Service Level Agreement switches Writing Books Workers Trojan Startup Organize Tech Unified Threat Management Backup and Disaster Recovery Emergency Hard Drive Disposal Upgrades Supercomputer Saving ZTime Digital Signature Username Access Device Management Fileless Malware Screen Reader Customer Resource management Microsoft Excel Business Managemenet Teamwork Voice over Internet Protocol Gamification Computer Care LiFi Content Management Worker Managing Stress 3D Printing Regulation CrashOverride Capital Printers Productuvuty