Bank Building
FDIC Member

FDIC-Insured - Backed by the full faith and credit of the U.S. Government

 EspañolAboutContact UsHelpMake a Loan Payment
Company LogoCompany Logo

How to Recognize Tech Support Scams


Scammers execute tech support scams by pretending to be computer technicians to gain remote access to your device.

Scammers execute tech support scams by pretending to be computer technicians from reputable companies. The scammer will generally request access to your device and then conduct fraudulent diagnostic tests. Once remote access is enabled, identifiable information may be accessible, including names, dates of birth, Social Security numbers, and banking information. While accessing the device remotely, scammers can download malware or ransomware to steal personal information.

  • Malware is used to gain unauthorized access to a device and record personal information.

  • Ransomware is designed to block access to a device and hold personal information captive.

How It Starts: Caller-ID Spoofing

When tech support scammers contact consumers via phone call, the method of caller-id spoofing will be used to raise the perception of legitimacy.

Caller-id spoofing is the process of changing the displayed name on an incoming call. The consumer will receive a caller ID with the name of a legitimate company instead of a 10-digit number.

Common Warning Signs

  • You may receive an unsolicited phone call from a source claiming to be associated with a tech company.

  • You may see pop-up ads stating your device has been infected with viruses.

  • The caller will request payment via money transfer apps, gift cards, wire transfers, or reloadable cards. It's important to remember that well-known tech support companies will never ask you to pay using unconventional methods like these.

How to Avoid Scams

When browsing unsecured websites, be cautious of pop-up ads as they may indicate a tech support scam. Don’t click on these ads or provide any personal information to third-party sources.

How to Report Scams

Tech support scams can be reported to the Federal Trade Commission to help assist with constructing cases against the scammers. Visit ReportFraud.ftc.gov to begin the process.

Scammers may also try to get your credit or debit card information to process transactions, so it's important to contact your bank or credit card company immediately if you've disclosed any information to them.

Update Your Software & Security

Remote access can compromise sensitive information and allow malware and ransomware to be downloaded on your device. Update your device’s software and complete a diagnostic test. Delete the files and applications that are highlighted as problematic.

Accounts that store sensitive information should be updated with new passwords. Strong passwords have 12 characters that include letters, numbers, and symbols. (f$A-A0HSTi62)

Business BankingBusiness Banking