Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

Want Proof that You Need to Monitor Your Solutions?

Want Proof that You Need to Monitor Your Solutions?

When discussing the practice of monitoring solutions to prevent threats, it isn’t uncommon for many businesses to put these concerns on the back burner. However, every so often, an example comes around to help inspire businesses to take their monitoring seriously. This time, the example was the arrest of 24 spammers in October for scamming American citizens by impersonating Microsoft support staff members.

Working with Microsoft’s international Digital Crime Unit, the cyber cell of the Delhi police leveraged data analytics to take down illegal call centers that had been targeting Microsoft Windows users in the United States with fraudulent tech support scam attempts.

These scams were pretty predictable, if you know how a tech support scam usually takes shape. First, the employees of the call centers would send out a manufactured notification warning their targets that their systems had been compromised, with websites created for the purpose of supporting their false claims. Once a victim reached out to them, these fraudsters would charge a tech support fee of anywhere from $100 to $500 - but since there was no problem to solve, they would steal data and install actual malware once they were granted access.

However, an employee of Microsoft named Nripenda Kashyap was able to spot these activities through his monitoring systems and thereby send word to the DCU. This report was the catalyst that resulted in raids being conducted on 10 call centers and the arrest of 24 scammers, including the owners of these businesses.

What can we take away from all this?

The first lesson to be gleaned is that there will never be a time that a technology company like Microsoft will alert you of issues that your device is having. Unless you reach out to them for assistance and initiate first contact, you are on your own. The only time that you will legitimately be notified is if you have a service provider like Tekie Geek there to help protect your infrastructure.

Secondly, the kind of monitoring systems that Tekie Geek offers aren’t something that your business can go without. The DCU filed a lawsuit claiming that tech support scams take 3.3 million users to the tune of $1.5 billion every year. This lawsuit was filed in 2014. How much do you think these numbers have increased since then?

Even if you try to monitor your solutions independently, there is a certain level of expertise that is necessary. Your computer will report dozens of perfectly normal, benign errors every day. An IT pro can spot the actual threat, while a layman might panic at the growing stream of issues.

If you’re intent on incorporating monitoring and maintenance into your IT management strategy, reach out to us first. Not only can we identify threats proactively, we can work to mitigate them before they have an effect.

For more information about our services, which only include remote monitoring and maintenance, give Tekie Geek a call at (347) 830-7322.

Data Backup Is a Staple of the Modern Business
Tip of the Week: Improvement Needed to Avoid Cyber...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, December 11, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the week Vendor Management Content G Suite Tech Support Laptop Corporate Profile Going Green Term Bookmark Safety Email Google Calendar Document Management Data Freedom of Information Download Microsoft Retail Hacking Redundancy Multi-Factor Security Domains Startup Saving Money Computer IT consulting firms IT Management Computing Passwords Monitors Evernote IT consulting company computer services Staten Island Smartphone Management Motion Sickness managed services Staten Island Tablets Virtual Assistant Tablet today ’s organizations Password Antivirus Outsourced IT CCTV Audit communications Flash Employer-Employee Relationship Disaster Regulations Webcam Information Technology Encryption malware Hard disk Windows 10 Accidental deletion HTML Social Engineering App Staffing Search User Tips Telephone System Hackers Software Addiction Firewall Microsoft Excel Data Security Printers Small Business Hosted Solutions Business Management Virtual Reality Bandwidth IT support Television Bluetooth Apple Fake News Workplace Tips computer support Staten Island Vulnerability Virtualization Politics ransomware attacks it support Staten Island IT support data recovery Staten Island VoIP Social Network Cabling Mobility Health Business Metrics IT consulting Staten island Artificial Intelligence Data storage Innovation Bring Your Own Device Wireless Technology Hardware Solutions Laptops Analytics Downloads Chromebook Lithium-ion battery Tactics Telephony Proactive IT Hosted Solution User Tip computer services Update Society Unified Communications Applications IT consulting Healthcare Best Practices Windows 8 IT consulting firm Operating System Compliance Automation Telephone Systems Vendor Network Security Content Filtering Scalability BYOD tech support Vendor Mangement Computing Infrastructure Knowledge 3D Printing Cryptocurrency Office YouTube IT support Staten Islans Workers Cleaning Solid State Drive Gmail Cybersecurity Streaming Media managed IT services NYC Google Drive Office Tips Access Deep Learning Health IT Regulation Quick Tips Business Growth Worker Fileless Malware SaaS Managed IT Services computer support Printer Recovery Work/Life Balance Backup and Disaster Recovery Mobile Device Management Time Management Holiday Legislation computer support NYC Username Vulnerabilities managed it services Government managed IT services staten island Uninterrupted Power Supply Devices IT consulting Staten Island Congratulations Business Google Outlook Customer Service Machine Learning Mobile Devices Two-factor Authentication Unified Threat Management Microchip DDoS Error Browser Cortana Screen Reader Distributed Denial of Service IT support firms Upload Web Server Virtual Desktop Training Google Wallet Managed IT Processor Data Backup Administration Drones Printing Service Level Agreement computer support firms Music Word IT services New York City IT Consultant Efficiency Phishing Microsoft Office Spam Customer Resource management Conferencing WiFi computer repair Travel Desktop Maintenance Mobile Security Electronic Medical Records Business Continuity Mobile Technology Staten Island IT consulting IT services NYC Productivity Networking computer repair Staten Island Comparison Alert IBM Google Maps Sports Software as a Service IT support Staten Island Wireless Headphones Saving Time Tip of the Week End of Support Identity Theft Miscellaneous Scam Mouse Accountants LiFi Staten Island computer support Excel email scam Money File Sharing IT Services Emails Administrator Black Market Company Culture Digital Robot Tech Communication Physical Security Automobile managed services tech support Staten Isalnd IT services Staten Island Computer Malfunction Nanotechnology Windows Hardware Downtime Advertising Specifications Running Cable Equifax Telephone Bitcoin Ransomware Computers Business Computing Data Protection Notifications Internet of Things Cybercrime Business Mangement Big Data Remote Monitoring staten island managed services Managing Stress Cloud Disaster Recovery data recovery Security VoIP Smartphones data loss Start Menu malware worms Flexibility Reliable Computing Gadgets Privacy Hacks Writing Thank You Private Cloud Hack Server eWaste CrashOverride Unified Threat Management How To Emergency Trends Workstations SharePoint Android Access Control Network Management Blockchain Malware Patch Management PDF Piracy Office 365 Browsers IT consulting NYC Mobile Device tech support Staten Island Tech Terms Text Messaging datto Backup Productivity Data Management Project Management Cloud Computing Website Users Staten Island tech support Rental Service Budget IT support New York City Remote Computing Directions Paperless Office Managed Service Provider Public Cloud Managed Service Processors Wi-Fi Data Breach Navigation Collaboration Device security Business Technology Legal News Hacker IT support NYC Employer Employee Relationship Information Powerful Technology Solutions Cloud computing Staten Island Hard Drive Disposal Banking CryptoLocker Cache Language Twitter BDR Help Desk Virus Computer Care Hiring/Firing Technology Apps Internet Best Practice Business Cards Tracking Google Docs Proxy Server Windows XP Documents Social Media Settings Visible Light Communication Cost Management Botnet Network Congestion History Law Enforcement Securty Network Facebook Hard Drive Social Entertainment Taxes end-user files VPN Websites Digital Payment Multi-factor Authentication Augmented Reality Data Analysis Memory In Internet of Things Supercomputer Tech Term Gamification Database Monitoring Education Managed IT Services Meetings Wireless Spyware Samsung IT Support Relocation Displays Save Money Windows 10 Touchscreen Experience The Internet of Things Lenovo Upgrade Software License

Newsletter Sign Up