Get Started Today!  217-475-0226

croom new

Decatur Computers Inc. Blog

Want Proof that You Need to Monitor Your Solutions?

Want Proof that You Need to Monitor Your Solutions?

When discussing the practice of monitoring solutions to prevent threats, it isn’t uncommon for many businesses to put these concerns on the back burner. However, every so often, an example comes around to help inspire businesses to take their monitoring seriously. This time, the example was the arrest of 24 spammers in October for scamming American citizens by impersonating Microsoft support staff members.

Working with Microsoft’s international Digital Crime Unit, the cyber cell of the Delhi police leveraged data analytics to take down illegal call centers that had been targeting Microsoft Windows users in the United States with fraudulent tech support scam attempts.

These scams were pretty predictable, if you know how a tech support scam usually takes shape. First, the employees of the call centers would send out a manufactured notification warning their targets that their systems had been compromised, with websites created for the purpose of supporting their false claims. Once a victim reached out to them, these fraudsters would charge a tech support fee of anywhere from $100 to $500 - but since there was no problem to solve, they would steal data and install actual malware once they were granted access.

However, an employee of Microsoft named Nripenda Kashyap was able to spot these activities through his monitoring systems and thereby send word to the DCU. This report was the catalyst that resulted in raids being conducted on 10 call centers and the arrest of 24 scammers, including the owners of these businesses.

What can we take away from all this?

The first lesson to be gleaned is that there will never be a time that a technology company like Microsoft will alert you of issues that your device is having. Unless you reach out to them for assistance and initiate first contact, you are on your own. The only time that you will legitimately be notified is if you have a service provider like Decatur Computers Inc. there to help protect your infrastructure.

Secondly, the kind of monitoring systems that Decatur Computers Inc. offers aren’t something that your business can go without. The DCU filed a lawsuit claiming that tech support scams take 3.3 million users to the tune of $1.5 billion every year. This lawsuit was filed in 2014. How much do you think these numbers have increased since then?

Even if you try to monitor your solutions independently, there is a certain level of expertise that is necessary. Your computer will report dozens of perfectly normal, benign errors every day. An IT pro can spot the actual threat, while a layman might panic at the growing stream of issues.

If you’re intent on incorporating monitoring and maintenance into your IT management strategy, reach out to us first. Not only can we identify threats proactively, we can work to mitigate them before they have an effect.

For more information about our services, which only include remote monitoring and maintenance, give Decatur Computers Inc. a call at 217-475-0226.

Data Backup Is a Staple of the Modern Business
Tip of the Week: Improvement Needed to Avoid Cyber...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Network Security Privacy Business Computing Tech Term Hackers Productivity IT Support Innovation Data Software Efficiency Data Backup Android Google Cybersecurity User Tips Data Recovery Email Business Management Malware Internet Collaboration Communications Computer Windows 10 Small Business IT Services Smartphone Cloud Communication Backup Ransomware Phishing Hosted Solutions Managed IT Services Mobile Device Hardware VoIp Browser Mobile Devices Facebook IT Management Microsoft Office Business Artificial Intelligence Social Media Outsourced IT Business Technology BDR Mobile Device Management Applications Cloud Computing Automation Cybercrime Information Cost Management Blockchain Smartphones Office 365 App Access Control Managed Service Microsoft Holiday Passwords Data Security Patch Management Apps Websites Encryption Scam Server Workplace Tips Gadgets Internet of Things Network Two-factor Authentication Maintenance Data Management Hard Drive Managed IT Services Antivirus Update Saving Money Disaster Recovery Vulnerabilities Alert Touchscreen Digital Managed Service Provider Augmented Reality Data Protection Google Maps Document Management Bandwidth Windows Healthcare Law Enforcement Start Menu Printer Laptop VPN Vendor Vulnerability Bitcoin Operating System Mobility Conferencing Analytics Social Engineering Data loss Users SaaS Business Continuity Remote Monitoring Hacking Apple Tech Terms Quick Tips Gmail Cooperation Money Project Management Saving Time Search Spam Data Breach Word Save Money Big Data Electronic Medical Records Medical IT Tip of the week Retail Hard Drive Disposal Compliance Content Fileless Malware Specifications Telephony Microsoft Excel Upgrades Website YouTube Download Bookmark Outlook Samsung Piracy Bluetooth Vendor Mangement Error Social Twitter Addiction Downloads Computing Infrastructure Miscellaneous Disaster Distributed Denial of Service Unified Threat Management History VoIP Health IT PowerPoint email scam Regulations Access BYOD Directions Emergency Television Virtual Reality Screen Reader Router Cryptocurrency Settings Upload Browsers Google Docs Software License Wireless Headphones Business Mangement Telephone Mobile Security Machine Learning Proxy Server Networking Legislation Tech Freedom of Information IBM Professional Services Unified Communications Cortana Automobile Windows 7 Accountants Running Cable Spyware Microchip Mouse WiFi Company Culture Social Network Modem Audit Telephone Systems HTML Administration Trends Redundancy Budget Cleaning Solid State Drive Best Practice Paperless Office Tablet Software as a Service Network Management Help Desk IT Support Business Cards Virtualization Monitoring Term Knowledge News Corporate Profile Time Management Sports Printing Microsoft 365 eWaste Training Cabling Travel Processor DDoS Wireless Identity Theft Customer Resource management SSID Consultant Voice over Internet Protocol Virtual Assistant Employer-Employee Relationship Gamification Entertainment Information Technology Computers Unsupported Software Multi-factor Authentication Database How to Service Level Agreement Vendor Management Managed IT Password Management Google Play Fake News Desktop Chromebook Government Solutions Robot Equifax Username Navigation Telephone System Computer Care Excel iPhone Devices Data Analysis Comparison Mobile Technology Nanotechnology Uninterrupted Power Supply Google Drive Device security Tactics Virus Going Green Google Calendar Downtime Emails Computing Security Cameras Backup and Disaster Recovery Unified Threat Management User Tip Legal Integration Startup Worker Evernote SharePoint Multi-Factor Security Printers Upgrade Windows 10 Regulation Marketing Office CrashOverride Office Tips Managing Stress

Latest Blog

Productivity is something that either happens or it doesn’t, but it’s important to keep in mind that nobody can work at optimal efficiency at all times. This doesn’t mean you can’t leverage some best practices to make better use of your time, though. Today we’ll examine thre...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.