- Computer / Internet Tips & News for Computer Techs clients - https://computertechsreno.com/tips -

What to do after your computer has been compromised by a scammer

Updated 12/12/25:

Below is a scenario that we hear about many times each month – it could happen to you.

You’ve just spoken on the phone with someone claiming to be from Microsoft, Amazon, your Internet provider or other well-known company. You’ve given the stranger remote access to your computer and they’ve shown you a bunch of things that’s wrong with it – errors, security or firewall problems, exposed social security numbers, or even offered to help transfer funds to or from your bank account. But they have a “fix” – they can remedy the “problems” for a few hundred dollars. You may or may not have gone so far as given out your credit card number or purchased gift cards for payment, but the damage has already been done. Sometimes it happens so quickly and convincingly that you may not realize that you’ve been conned until long after you’ve hung up the phone.

You’ve let a stranger get into your personal business. What should you do now? You should immediately turn off your computer or device that was remotely accessed – then call Computer Techs or another honest, reliable and local computer professional. Don’t be embarrassed – the con artists are good at what they do and are very persuasive and convincing. Millions of people get scammed by these telemarketers each year. Computer Techs will check your computer for data they may have compromised or malicious programs left behind – such as stolen or changed passwords, deleted files, changed settings, malware or remote access tools.

In a matter of minutes a scammer can obtain or change passwords, purchase goods or services on your behalf, create accounts, or obtain passwords and credit card numbers stored in your web browser.

If you’ve allowed someone you don’t know to remotely control your computer – no matter what company they say they’re from – please contact us ASAP so that we can make sure that you’re computer is safe to use.

Since you’ve read this far, if you haven’t let a stranger remotely access your computer – please read how to avoid fake tech support calls in the first place.

Other resources and education

When Information Is Lost or Exposed – IdentityTheft.gov

The surprising things we’ve discovered with our cybersecurity checkups for individuals.

How to manage your passwords – easily and safely.

Spend a few minutes to check out these scams so that you don’t become a victim.