Archive for the ‘Security’ Category:

Is Your IT Professional Also a Trusted Business Advisor? They Should Be!

Posting Date: 03/17/2014  |   Filed Under: Data Back-up, Security, Technology, Tips  |   No Comments
Tags: , ,

As a business owner, one of the best moves you can make is to outsource your IT services to a professional provider. When it comes to outsourcing your IT service needs, there are a wide range of service options that involve varying levels of management responsibilities and costs. An IT professional can provide service for a single specific task such as help desk support or managing network security. At the other end of the service spectrum, an IT professional can assume management responsibilities for a client’s entire IT infrastructure. The advantages of outsourced services are improved operational efficiencies, cost savings and predictable service for a nearly-fixed monthly fee.

Redefining the Role of Your IT Professional
Redefining the Role of Your IT Professional

An increasing number of businesses have switched to the outsourced IT service model. If you are already working with a contracted IT professional, then you have given your business the advantage of a head-start on the competition. The next big question is whether your business is actually making the best use of your contracted IT professional? It is likely that your IT professional is responsible for repairs, fixes and upgrades for your business’ computers and network problems. Computer repairs might be a key part of the contracted job, but there are probably some value-added IT skills that your business might not be fully utilizing.

Do You Need a Trusted Business Advisor or a Computer Repair Service?
Do You Need a Trusted Business Advisor or a Computer Repair Service?
  • Trusted advisor is an important role that an IT professional can fill by understanding the business owner’s goals and long range plans for the business. By understanding the “big picture,” an IT professional can share expert technical information while understanding various solutions, costs and the latest technology trends. Functioning as a trusted advisor, an IT professional can make experienced recommendations that are in the best interests of the business’ long term goals as opposed to implementing quick fix, computer repairs.
  • Decisions about new technologies might not be in the comfort zone of most business owners. How can a business owner be fully versed in technology and able to identify the difference between the latest hype and a proven strategy? Which technology is going to provide the best return on investment? Is it the best strategy to implement a new technology now or wait until next year? Is your business currently compliant with network security requirements? Is your data safe? If your business needs to update its operating system, is now the time to purchase new computers? If your IT professional is acting as a trusted advisor, these larger issues can be explored together with the shared goal being the long term sustainability and success of your business.
  • Technology coach is another important element of the trusted advisor’s role. As a member of the client’s “inner circle,” the IT professional needs to bring a variety of skills to the table including the ability to carefully explain technology solutions. The ability to really listen to the business owner is also critical. One size does not fit all – especially when it comes to technology decisions. A knowledgeable IT professional must be able to not only recommend the best technology solutions, but also make the best recommendations for a business’s particular needs in the context of their industry, finances and long range goals. A proactive IT professional will be constantly evaluating new technology products, solutions and reliable vendors that will best serve the needs of the client’s business.
Thinking Beyond Computer Repair Services

As a business owner, you know that we all need to think “outside the box” more often. Geeks On Call encourages you think outside of the “computer repair” box and see that your IT professional is a valuable asset that you might be able to utilize to even greater advantage. Geeks On Call values your business and we want to be your trusted advisor when it comes to technology solutions! Give your local Geeks On Call office a call today. We are ready to listen.

The Final Countdown to Microsoft’s April 8th Deadline

Posting Date: 02/20/2014  |   Filed Under: Security, Technology, Tips  |   No Comments
Tags: , , , , ,

In 2002, Microsoft presented its official Support Lifecycle Policy that was based on detailed customer feedback. The predictability of support services was cited as a very important issue for Microsoft’s customers. Microsoft responded accordingly by alerting customers years in advance that the XP operating system and Windows 2003 have an “end of life” date scheduled for April 8, 2014. Although XP and Windows 2003 have been very popular, Microsoft will no longer support these products after the April 8th deadline. This information has been well-publicized by Microsoft for many years. There are still over 600 million worldwide XP users and it seems that many have chosen to simply ignore these repeated notifications. We can assume that users who have not upgraded by now fall into one of two categories. The first group includes those who are willing to take their chances and plan to continue using Microsoft legacy products that are no longer supported. The second group is XP users who are truly unaware of the deadline. Do you fall into one of these two groups?

The Final Countdown is Now!

The Final Countdown is Now!

After years of these “end of life” warnings, XP and Windows 2003 are now in the final days of the deadline countdown. Surprisingly, one of Microsoft’s latest strategies has been to ask for help. Geeks On Call recently posted a story on our Facebook page about how Microsoft had begun taking a grassroots approach to spreading the word. Microsoft resorted to asking for help by seeking volunteers to remind business owners, friends, family and colleagues about the upcoming XP deadline. Via their blog, Microsoft asked experienced and technically savvy users to help others understand why it is important to make the switch to Windows 8 and to make the upgrade now!

Ignoring this Deadline is Not an Option

Some users claim a variety of reasons for resisting this XP upgrade, but don’t forget that there are a few key reasons you cannot ignore this deadline. The issues for residential users can be serious, but the consequences for businesses hold additional threats and even possible legal ramifications.

Here’s How You and Your Business Can Be Impacted by Not Upgrading

Here’s How You and Your Business Can Be Impacted by Not Upgrading
  • Security Risks: Without the security provided by an updated operating system, all of your business data and personal information are vulnerable to harmful viruses and spyware. Malicious viruses will very likely be unleashed on XP’s “zero day.” Undefended computers can be completely immobilized with viruses quickly spreading over the net to PCs still operating on XP. No business owner wants to think about a virus spreading through all of their computers. All of the data that keeps your business functioning will be placed at risk.
  • Compliance Issues: Businesses that continue to operate on XP can actually face compliance issues. Resulting compliance issues can lead to suspension of certifications, and/or public notification of the organization’s inability to securely maintain its systems and customer information. Compliance problems can place your business in legal peril and seriously damage your business’ reputation in the process.
  • Upgrade Expenses: If you think a system upgrade is just too expensive, Geeks On Call urges you to reconsider this viewpoint. Many technical experts consider using an unsupported product such XP, as an act of irresponsibility on the part of the business. Remember that the problems that are likely to arise can cost your business significantly more than the upgrade. Don’t be penny-wise and pound foolish when it comes to investing in an upgrade.
  • Custom Support Available for a Price: In fact, there will still be some support available to XP users after the deadline, but at the annual cost of $200 per device. Depending on the number of computers your business is using, it’s not much of a bargain. In reality, this is only a temporary, contingency plan.

Upgrade Today!

Playing “chicken” with this deadline is tempting fate and there can be serious consequences. You can find yourself in the cross-hairs of cybercriminals on April 8th and potentially face business compliance problems. If you are still using XP, take action today. Call Geeks On Call and one of our experts can help you understand your XP migration options and work with you to develop an upgrade strategy. Call Geeks On Call before it’s too late. The final countdown is now! Are you prepared?

Why you should upgrade from XP today!

Posting Date: 02/17/2014  |   Filed Under: Consoles, Internet, Security, Technology  |   No Comments
Tags: , , , , ,

>

Business IT Support: Are you prepared for 2014?

Posting Date: 12/27/2013  |   Filed Under: Data Back-up, Internet, Security, Technology, Tips  |   No Comments
Tags: , ,

As 2013 comes to a close, many will spend this time reviewing the what they achieved this past year and begin making plans of the things they hope to achieve in 2014. For the majority of people this will include both personal and professional plans. When developing new business goals, it often includes increased efficiency while saving time and money and learning to work smarter not harder.

As you begin to establish and outline your goals and resolutions for 2014, we would like to take this opportunity to encourage you to consider establishing an IT support plan for your business.

 

How a Business IT support Plan can Benefit your Business

Moving into a Business IT Support Plan (also known as a Managed Service Contract) provides you the opportunity to find someone who can assess your current technology systems and understand the needs of your business.  After the initial assessment and understanding of future needs, a service plan can be developed that will move the IT responsibility into the hands of an expert IT professional, freeing you up to run the business.

Advantages of Establishing a Business IT Support Plan in 2014: 

•You have the ability to control costs, and have less “surprise” technology costs, when you outsource this to a true IT professional.  With this model you are only paying for services that your business needs, you are not responsible for many of the costs associated with a traditional employee, and you have someone monitoring your equipment that will be able to inform you of issues on the horizon that you can proactively address.

•When you move to this model you gain an immediate increased level of efficiency and expertise.  The IT professional that you have chosen to hire should provide an extremely high level of technology knowledge and have the ability to stay ahead of product trends for you and your business.

•New viruses and technology threats are emerging every day.  Are you convinced that your business is properly protected?  Your IT professional should make your business needs regarding security a number one priority, establish a plan if something were to go awry, and maintain updated knowledge on how to protect you against new threats.

•Save time and money by running and managing your business not your technology.  A Business IT Support Plan will allow you to rely on the suggestions and guidance of highly skilled IT professional so you can make informed decision on how to move and maintain your business technology at a managed cost.

Viruses of 2013

Posting Date: 12/16/2013  |   Filed Under: Internet, Security, Tips  |   No Comments
Tags: , , , , , ,

As 2013 comes to a close, everyone produces lists for the year in review. I love these, and look forward to reading them every year.   As we jump into 2014, we wanted to review the computer viruses, scams, and issues that made their appearance in 2013 and will probably continue into 2014, so you can make sure you and your technology continue to be informed and protected.  When you log on remember to STOP. THINK. CONNECT.

CryptoLocker – Emerging into the computer world in the fall, hackers were hitting computer systems and holding personal information and files for ransom.  The concept of holding something for ransom has been around for ages, but this is the first time it has taken a 21st century twist holding your computer hostage and demanding money to get it back.

This virus was developed by organized criminals overseas, and is spread through phony attachments in emails.  The best way to protect yourself is to avoid opening email attachments from unfamiliar senders or that you are not expecting to receive.

You should also invest in good anti-virus protection software, and if you are hit they suggest unplugging your computer immediately before the program as had a change to run completely.  The hope is that the virus stalled when you unplugged your equipment and an expert technician will be able to salvage your data.


Microsoft Phone Scam – This was making its rounds during the summer months, and even happened to one of our franchise owners.  Its goal is to catch people off guard, lull them into a false sense of trust by saying they are from Microsoft and there is an issue with your computer, and you give them remote access to your computer.
Once the representative, claiming to be from Microsoft, has access to your computer they install a virus.  Then charging you money to remove and repair your computer.

FBI Virus – This global Internet scam gets into your computer and preys on your fear of being contacted by the FBI and threatened with jail time.  A fake message with the FBI logo will appear on your screen claiming, virtually locking your computer, that you illegally downloaded some type of material.  Then like a ransom notice, the attacker forces a payment for access to the computer.

Computers become infected, most of the time undetected by the user, when a unfamiliar email attachment or an untrustworthy website is accessed.

Facebook Virus – The Facebook Virus is transmitted through Facebook by clicking a link, then find its way to your bank account and drain all of the available money.  This virus, commonly called Zeus, will remain inactive on your computer until someone log into a banking website.  It then swiftly moves into action, stealing username and passwords so the funds can be accessed by thieves.

The best line of defense is to only click on links from people you know that do not look suspicious or contain strange patterns or characters.  Also, because this virus targets bank accounts, making sure your banking establishment’s website is secure and has a 2-step verification process will help protect your money.

Search Conduit – Our final virus is not a traditional virus, it is actually a browser hijack.  It is a menace that exhibits malicious traits. It is most commonly bundled and installed  through something you downloaded, it will add the Conduit Toolbar and change your browser homepage and default search engine to search.conduit.com.

The Conduit search engine will display advertising and sponsored links in your search results and will act very much like Google and Bing.  It will also collect search terms from your queries in an effort to boost their advertising revenue, which is a black hat SEO tactic. It is pretty difficult to remove since it takes hold of some many pieces of your computer including your browser and operating system.

Protecting Your Business from Cyber Security Threats

Cyber Security is a concern for all business and residential computer users.

We are delighted to present Protecting Your Business from CyberSecurity Threats conducted by Michael Kaiser, Executive Director of the National Cyber Security Alliance.

Geeks On Call was proud to have been a 2013 Champion of National Cyber Security Awareness Month. During October we presented information about Cyber Security safety through our monthly newsletter, blog posts and a social media campaign. We felt that this webinar would continue to help educate and make everyone understand how to be safe and protect their business online.

Leave us a comment and  let us know how you are protecting yourself from Cyber Security Threats!

 

Creating a Technology Plan for the New Year

Posting Date: 11/22/2013  |   Filed Under: Data Back-up, Security, Technology, Tips  |   No Comments
Tags: , , , ,

We all make personal New Year’s resolutions on January 1st. This year, why not commit to a few professional resolutions for your business, too? Geeks On Call strongly encourages you to put a new technology plan at the top of that list for 2014. We are offering some technology planning guidelines that can help you form a strategy as you think about your business resolutions and professional goals for 2014.

Technology Solutions That Can Benefit Your Business in the New Year

Backup Services: Cloud services include data storage and backup systems plus access to software programs. Information stored on the cloud can be shared with other users anywhere and at any time. Data shows that 61% of surveyed small businesses are currently using some form of cloud-based service with another 5% planning to add cloud services by 2014. If your business is not currently using the cloud for backup service, it’s time to make a plan for switching over. The cloud can provide data storage plus a variety of services and benefits. Put the cloud at the top of your list.

Security Measures: Bring Your Own Device (BYOD) research shows that over two-thirds of surveyed companies already have employees using their own computers on the job. The advantage is that BYOD makes it easier for employees to stay in constant contact and also work from home more productively. The efficiency of BYOD comes with the responsibility on the part of the business for training employees on security policies and standards. Safeguarding your network and ensuring the confidentiality of your data is critical to the security of your business.

Disaster Recovery: Within the past year unexpected weather-related disasters, such as Hurricane Sandy, have raised the business community’s concerns over data recovery solutions. As you consider your disaster recovery plan, try to consider the consequences of losing all of your business’ data. Think of the lost revenue if your business is off-line for several days. This will remind you of how important it is to have a solid disaster recovery plan in place. There are a variety of disaster recovery plans available. After the disaster occurs, it’s too late to wish you had kept that New Year’s resolution for a disaster recovery plan! Commit to a disaster recovery plan now.

Managed Services: Technology is a key component tied to the success of your business. It enables your business to stay efficient, productive and competitive in today’s marketplace. That is as long as your technology systems are up to date and functioning properly. Have you considered a managed service plan? A managed service provider develops a customized IT service plan that will suit the budget and the needs of the client’s business. A service plan can help your business reduce IT operational costs while actually providing a higher level of IT service. The need for a managed service provider has become increasingly important as business owners need to make informed and increasingly complex choices about technology solutions.

Please visit our blog  for additional information about technology planning in the New Year.

Prepare for 2014 – TODAY!

Geeks On Call can work with you to assess your IT needs and develop a customized plan for your business. If your business needs to develop a backup system, move to cloud services or develop a Mobile App – we can help. Geeks On Call is here to help your business stay productive, efficient and competitive in 2014. Give your local Geeks On Call office a call and one of our computer professionals will be happy to help you.

 

October Newsletter: Is Your Business Prepared to Fight Cyber Crime?

Posting Date: 10/24/2013  |   Filed Under: Security, Tips  |   No Comments
Tags: , , ,

October is Cyber Security Awareness Month. This annual event is sponsored by the Department of Homeland Security in cooperation with National Cyber Security Alliance and the Multi-State Information Sharing and Analysis Center. The aim of Cyber Security Awareness Month is to inform and educate all levels of our government, the private business sector and the general public about issues of safety and security in our cyber environment. Their tag line says it all: Stop. Think. Connect.

What does “cyber environment” actually mean? We can interchange that term with others such as information technology, computer networks, Internet, digital, wired and virtual. It’s the non-physical terrain created by computer systems that is keeping us more interconnected than ever before. The average American spends over five hours a day in online activities related to jobs, education, e-mail, mobile banking, health care, online shopping, travel, entertainment and social media communications. All of this digital convenience also presents a wide range of threats, dangers and responsibilities. Especially with more information shared via Smartphones, tablets and other mobile devices, we need to be increasingly vigilant about the security of our personal data.

Upgrade or Your Business Might Face the Consequences of Security and Compliance Issues

The Dangers of Cyber Crimes

For individuals, the ever-present danger of cyber crimes includes hacker theft of confidential information, money, credit, banking and even medical information. This type of crime often results in personal identity theft. Other facets of cyber crime include online bullying and stalking that can affect your children. Malicious business scams are probably the most common. The threats to businesses include the loss of intellectual property, stolen client data or harm to the business’ computer network. The statistics on cyber crime are sobering. In 2013, online scams had increased by 355%. Cyber attacks on small businesses had increased by 18% over the past two years, with over 60% of these targeted businesses closing their doors within six months.

How to Protect Yourself, Your Family and Your Business from Cyber Crime

How to Protect Yourself, Your Family and Your Business from Cyber Crime

In both our professional and private lives, each of us needs to assume responsibility for our online activities. These responsibilities involve a combination of equipment maintenance and software updates coupled with appropriate online behavior and a constant vigilance against criminal activities. We suggest that you start with this brief checklist:

  • Maintain a Clean Machine by running the most recent operating system, security software, apps and web browser as a defense against online threats such as viruses and malware.
  • Firewalls and Encryption should be in use by businesses to secure their internet connection. Educate employees about passwords and internet security guidelines.
  • Spam and Phishing are hazards you can avoid. Don’t open e-mailed attachments from strangers and never click on unknown links contained within e-mails. Enable the filters on your e-mail programs to screen for spam. Beware of messages indicating upgrades, technical updates and special offers. These tactics are no longer limited to e-mail, so be vigilant when on social networking sites.
  • Backup Your Computer and Mobile Device in the event that your equipment is physically stolen or lost. You might have lost the device, but the data is preserved by the backup system. The theft of smartphones has become a major crime. Be aware of where your smartphone is at all times. If your phone is missing, consider using locator apps and you can even use a remote wipe to clear information from your missing phone.
  • Secure Your Device by activating the key-lock feature and using a passcode. A particularly complex password is suggested. Change your passwords periodically.
  • Safeguard Your Personal Information when using unsecured, public connection by avoiding apps or websites that require your password. These are the types of connections accessed in airports, hotels, coffee shops and libraries. You might want to reconsider doing your online banking in an airport.
  • Manage Your Social Network Privacy by reviewing the latest changes to privacy settings and be sure you are using these settings properly. Think twice about what you are posting on these sites – more people might see this than you think. Educate your children about social media behaviors. Hide your e-mail address from online profiles.
  • Disposal of Older Computers is another source for the theft of data. Remember when you delete files, the information is not actually erased. The hard drive should be overwritten, degaussed or physically destroyed. Never dispose of a computer that hasn’t been secured. Your information could end up in the hands of a criminal.

 

Geeks On Call Can Help Your Business with Cyber Security

Geeks On Call Can Help Your Business with Cyber Security

Geeks On Call is proud to be a Champion of National Cyber Security Awareness Month. Our entire team supports their mission throughout the year. Geeks On Call can do an assessment of your business’ computer network. We can also provide recommendations for establishing a strategic approach to cyber security and assist you with a variety of solutions to reduce the risk of a security breach.

We strongly encourage you to prepare your business for the threat of a cyber security crime.
Call your local Geeks On Call office today.

Cyber Security Month Champion Partner!

It’s Official! Geeks On Call is a Champion Partner for National Cyber Safety Awareness Month. We are  proud to be a champion partner and demonstrated our commitment to Cyber Safety!

Our franchise owners are dedicated to cyber security and its impact on residential and commercial businesses year round. Throughout October, we will be sharing cyber security information through newsletters, social media posts, blog posts, and available promotions.

STOP. THINK. CONNECT. This is a simple message that the National Cyber Security Alliance believes everyone must adopt. Everyone has to take safety precautions and understand the outcomes of our related to our on-line activity.

The National Cyber Security Alliance concentrates on these guidelines to ensure safety on-line:

•Awareness –Increasing public knowledge and understanding surrounds cybercrimes that are taking place on the Internet every day.

•Education – Informing everyone about on-line safe practices and who to contact with if they are a victim of cybercrime or think they may be a victim. Encouraging business owners to teach their about online safety measures and making sure parents are communicating with their children about being safe online.

•Culprits – Knowing what contributes to cybercrime, and what cyber criminals focus on puts you in a powerful positions.  Malware – short for “malicious software package” is many times a cyber criminals go to maneuver.   Malware incorporates viruses and software which is installed on your computer or mobile system without your knowledge. These programs could potentially cause your computer to be to crash or be used to monitor and control your web activity.

•Prevention – The number one line of defense is to avoid Malware, keeping a “clean machine” will help! Install the latest security software, complete automatic updates and protect all of your devices that connect to the Internet.

Since it is National Cyber Safety Awareness Month, we have assembled this short quiz to help you test your very own online awareness. We encourage that you put your Cyber Security knowledge to the test (but don’t worry, the answers are at the bottomJ).

1. You are deciding on what personal information to post about yourself in an online profile.      You decide to:

A. Review the information carefully before you post it because you do not want to post too much information about yourself.
B. In order to prevent misuse of your information, don’t post too much information about yourself on Facebook, personal websites, your blog, or in chat rooms.
C. Go ahead and post information about yourself online, because you can always choose to edit it later if you don’t want people viewing certain information. 
D. BOTH A & B.
2. You should be aware of pop-ups and downloads.  (True or False)
3. Malware is a type of software designed to cause viruses.  (True or False)
4. When you create passwords, you should make them easy to guess.  (True or False)
5. When it comes to online shopping, you can safely shop from any site. (True or False)

 

  1. D.  Own your online presence. When available, take the time to understand and set privacy and security settings on websites to your comfort level for information sharing. You should know who will see the content before you post it.
  2. TRUE.  Pop-ups and downloads can contain viruses that could infect your computer. You can avoid viruses by Keeping a Clean Machine and having the latest operating system, software, web browser, anti-virus protection and apps on your computer and mobile devices.
  3. TRUE. Malware, short for malicious software, is designed to cause damage or disruption to a computer system or to use a computer to send spam, distribute malware or launch an attack on other computers. You can avoid malware by Keeping a Clean Machine and having the latest operating system, software, web browser, anti-virus protection and apps on your computer and mobile devices. Remember, all devices that connect to the Internet need protection.
  4. FALSE.  You should create passwords or use passphrases (a group of words) that are easy to remember, BUT hard to guess.  Make your passwords long, strong and unique by using a combination of upper and lowercase letters, numbers and symbols. Don’t use the same password for different accounts. Write your passwords down and keep them in a safe place away from your computer.               
  5. FALSE.  When shopping online, you should always shop from trusted and well-known websites and always with a parent or other adult present. When banking and shopping, check to be sure the sites is security enabled. Look for web addresses with “https://,” which means the site takes extra measures to help secure your information. “Http://” is not secure.

 

If you have questions about National Cyber Security Awareness Month or would like to get involved you can go to the National Cyber Security Awareness Website: http://www.staysafeonline.org/ncsam/landing-page/.

Make Sure to Stay Alert for Technical Support Scams

Posting Date: 10/21/2013  |   Filed Under: Internet, Security, Technology, Tips  |   No Comments
Tags:

A blog post in August featured one of the most lucrative cybercriminal scams of the past year. This con involves fraudulent phone calls from cybercriminals posing as representatives from Microsoft tech support. A fake tech support representative places a call to home owners to alert them that your computer has any virus, and has alerted Microsoft to the issue. The fake tech support representative then tries to convince the home owner to allow them remote access of the computer so they can “fix” the issue.  The combination of the phone call allegedly from Microsoft along with the request for remote access to the computer catches many people off-guard and they allow them to access their computer.

Our warning to all consumers should you receive a call like this; is to NOT provide them remote access to your computer.  This access could result in a range of crimes including theft of your personal information, bank account details and PIN numbers to installing a virus and selling you the services repair your computer. This may sound like any far-fetched scam, but countless individuals have fallen victim to these phone calls. Over several years, millions of dollars have been lost to cybercriminals who use this scam.

If you can’t believe that this is actually going on, please continue reading!

Last month one of our franchise owners was contacted at home by a fake Microsoft tech support representative. Here’s how the conversation went with the fake Microsoft tech support representative (Support):

Support, “Do you have a computer on?”

Franchisee, “Yes.”

Support, “Are you in front of it.”

Franchisee, “Yes.”

Support, “You see there is a <Ctrl> key at bottom left corner of your keyboard?”

Franchisee, “Yes.”

Support, “You see right next to it, there is a “Window” key?”

Franchisee, “Yes.”

Support, “Now press that “Window” key and “R” keys”

Franchisee, “Ok.”

Support, “Now enter this….”

Franchisee cuts in, “So how do you know my phone number?”

Support, “Your computer sent us error information. We are then contacted to fix it, because we are your Windows manufacturer provider.”

Franchisee, “But Windows is made my Microsoft. Are you working for Microsoft? Plus, I never knew error messages from my computer will send my phone number out!”

Support, “Microsoft doesn’t fix your computer.”

Franchisee, “Then what is your company?”

Support, “We are Windows Service Department.”

Franchisee, “I heard that, but what is the company that your department is under?”

Support, “We’re here to fix your computer.”

Franchisee, “I will not allow anyone to have remote access to my computer!”

Click. Hang up.

Our franchise owner added, “The caller was unbelievably rude, then he simply hung up the phone on me. I’m sure he was immediately making another phone call to someone else running that same scam.  After enough phone calls, he must eventually gain access to someone’s computer. Otherwise, why would they continue to operate this scam?”

We are sharing this story to shed light on how easy it is to be caught off-guard.  We encourage you to put your home phone number on the National Do Not Call Registry.  If you do receive one of these suspicious phone calls, contact Microsoft and report the call. If you believe that your computer is infected with a virus, contact your local Geeks On Call.

October is National Cyber Security Awareness Month. Stop. Think. Connect. It’s a good policy. We encourage you, your family and your business to be vigilant against cybercriminals throughout the year. Stay safe!