HUB TechMinutes

Business technology news, tips and events.

HUB TechMinutes

Better business through better information.
2 minutes reading time (495 words)

Want Proof that You Need to Monitor Your Solutions?

Want Proof that You Need to Monitor Your Solutions?

When discussing the practice of monitoring solutions to prevent threats, it isn’t uncommon for many businesses to put these concerns on the back burner. However, every so often, an example comes around to help inspire businesses to take their monitoring seriously. This time, the example was the arrest of 24 spammers in October for scamming American citizens by impersonating Microsoft support staff members.

Working with Microsoft’s international Digital Crime Unit (DCU), the cyber cell of the Delhi police leveraged data analytics to take down illegal call centers that had been targeting Microsoft Windows users in the United States with fraudulent tech support scam attempts.

These scams were pretty predictable if you know how a tech support scam usually takes shape. First, the employees of the call centers would send out a manufactured notification warning their targets that their systems had been compromised, with websites created to support their false claims. Once a victim reached out to them, these fraudsters would charge a tech support fee of anywhere from $100 to $500 - but since there was no problem to solve, they would steal data and install actual malware once they were granted access.

However, an employee of Microsoft named Nripenda Kashyap was able to spot these activities through his monitoring systems and thereby send word to the DCU. This report was the catalyst that resulted in raids being conducted on 10 call centers and the arrest of 24 scammers, including the owners of these businesses.

What can we take away from all this?

The first lesson to be gleaned is that there will never be a time that a technology company like Microsoft will alert you of issues that your device is having. Unless you reach out to them for assistance and initiate the first contact, you are on your own. The only time that you will legitimately be notified is if you have a service provider like HUB Computer Solutions there to help protect your infrastructure.

Secondly, the kind of monitoring systems that HUB Computer Solutions offers aren’t something that your business can go without. The DCU filed a lawsuit claiming that tech support scams take 3.3 million users to the tune of $1.5 billion every year. This lawsuit was filed in 2014. How much do you think these numbers have increased since then?

Even if you try to monitor your solutions independently, there is a certain level of expertise that is necessary. Your computer will report dozens of perfectly normal, benign errors every day. An IT pro can spot the actual threat, while a layman might panic at the growing stream of issues.

If you’re intent on incorporating monitoring and maintenance into your IT management strategy, reach out to us first. Not only can we identify threats proactively, but we can also work to mitigate them before they have an effect.

For more information about our services, which only include remote monitoring and maintenance, give HUB Computer Solutions a call at 204-772-8822 or 1-833-874-0725.

New Collaboration Apps Building Better Businesses
Tip of the Week: Improvement Needed to Avoid Cyber...

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Guest
Wednesday, December 19, 2018

Captcha Image

Get Updates On Our New Blog Posts!

Book your free introductory consultation now.

Let's Talk

Happy Clients

Don't Miss Our Next Newsletter!

Subscribe to our free monthly newsletter! It's packed with valuable information, useful tips, and important security alerts.
* indicates required
Your email address is secure with us - we never share our subscriber information.

HUB Tech Minutes

14 December 2018
If you need to condense data into a concise and comprehensible form, Microsoft Excel is tough to beat. This is despite the fact that your average spreadsheet isn’t exactly an eye-catcher. However, Excel provides a few native options that boost your d...
12 December 2018
Hardware, software, malware, ransomware. These are all terms that share two things in common - you probably have heard them fairly often, and they all end the same way. This is no accident. To better understand what these programs are, let’s dig into...
10 December 2018
Sometimes it might feel like your technology never works as you want it to. You might try to open up a software application only to find an error message that keeps you from being productive. The error doesn’t go away no matter how many times you rel...