Savy savy.jpg
IFPA award ifpaaward.jpg

Defensive Driving for Your Computer

Defensive Driving for Your Computer Tech-Scam.png

Part 2 – Spotting Scams

Editor’s Note: In August, the tech consultants at POST Computer Systems of Wilbraham, MA, continue their deep dive into computer infections, this time showing us how to identify – and avoid being snared by – tech-based scams.

By Kate Thresher and The Team at POST Computers
prime@pocosys.com

Scams are, in the most simple of terms, someone or something pretending to be something they are not. Scams can come in the form of calls, messages, emails, and even friend requests on Facebook. Being aware of what you are clicking on is one huge way to keep yourself protected, however consistently being leery of who you may be talking to is important as well.

Phone-based scams

In the past few years, phone scams have been very common. I’m not just talking about cell phones or smart phones here either. I’m talking anything used to call out or receive calls in. Cell phone, TracFone, home phone, rotary phone – you name it, if it has a number, it’s a target. People calling “on behalf of the IRS” have been known to collect and inappropriately use sensitive information from unknowing people such as social security numbers, names, birthdays, and bank account numbers. I just got a call the other day from the “Social Security Administration” telling me that my Social Security Number had been compromised and that I should dial in my number to prevent it from “being shut down.” The IRS (or any government agency for that matter) will never call you to tell you that there is an issue with your accounts or that your social security number is compromised.

Scammers calling claiming to be Microsoft have also gotten bad over the past several years. In the case of someone calling you about your alleged “computer problems,” the only way they can do you any harm is if you let them remote into your computer system. If someone calls you out of the blue, asks you to log into your computer, and follow directions to a website that allows for remote access, tell them to go fly a kite!

Social media-based scams

Although not quite as common as phones, social media and social media based messenger programs have in the more recent years become huge targets for scammers as well. People trying to get as many “Friends,” “Followers,” and “Likes” as possible accept requests from people they don’t know. Many of these people are scammers. Don’t get me wrong, there are some real people who go around “Friending” whomever, but social media has become a huge platform for scamming. For maximum security and personal protection, do not accept friend and follow request from people that you don’t know. Furthermore, do not click on links sent to you in messenger programs from people that you don’t know.

Email-based scams

Most people in this age of technology use email in some way or another. Whether it’s for business use or for communicating with a loved one, most Americans have an email address.

Regrettably, with the joys of email come some concerns as well. Misleading links that direct you to a bogus website can come by way of email. If you don’t know why you are getting an email or who it is from, most of the time your best bet is to not open it. The idea of looking before you leap (see www.primeontheweb.com/technology/defensive-driving-for-your-computer-part-1--comput/) applies to searching the web as well as with email.

Another scam attempt to watch out for in emails is phishing. Phishing, according to phishing.org, is “a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.” Scammers will often send out phishing emails in attempt to steal personal information. This can appear to you in the form of a pop up as well, but in email form, these scams can be difficult to recognize. Question any email that requests personal information. Chances are, your accountant will not be emailing you asking for your social security number, the IRS will never email you at all, and Google never asks to you enter your password into an email. There may be cases in which your email provider or another account-based service (Netflix, Facebook, Dollar Shave Club, Amazon, etc.) will ask you to change your password for security reasons, however you should always go directly to the website. Do not click on a “change your password” link unless you specifically requested it, such as in an “I Forgot My Password” situation.

Another email attack that appears frequently is blast emails from unknown sources. The main goal with these is to get a user to click on a link that then infects the computer being used. Never click on links or open attachments from unknown senders.

Most of the time, you will be aware of something being sent to you, or it’s from someone you know, like your daughter, boss, or best friend. If there is any question to whether you know the person, just don’t click the link. Give your friends and family a call. Anyone will understand you not getting a message because you chose to be safe over sorry!

It’s OK to be rude to scammers!

Growing up, we were taught to be kind, generous, and understanding. Our parents encouraged us to show courtesy to all and give people the benefit of doubt. When it comes to your protection online and your personal security, I am personally imploring and encouraging you to be rude to these scammers, selfish with giving out personal information, and skeptical about everything that comes up on your computer screen.

As always, if you have any questions PLEASE ask. Your security is our priority.

POST Computer Systems has been serving the Western Mass. community since 1992. Started in a basement in Wilbraham, the company continues to grow year after year thanks to the strength of their service department and the continued support from the local community.

If you have any questions or concerns, or to request a future Prime article topic, please reach out to the crew at POST Computer Systems by emailing: prime@pocosys.com