{"id":2214,"date":"2015-06-01T00:43:04","date_gmt":"2015-06-01T07:43:04","guid":{"rendered":"http:\/\/computertechsreno.com\/tips\/?p=2214"},"modified":"2025-12-12T06:05:24","modified_gmt":"2025-12-12T14:05:24","slug":"what-to-do-after-someone-calls-you-claiming-to-be-from-a-well-known-company-and-youve-given-them-remote-access-your-computer","status":"publish","type":"post","link":"https:\/\/computertechsreno.com\/tips\/what-to-do-after-someone-calls-you-claiming-to-be-from-a-well-known-company-and-youve-given-them-remote-access-your-computer\/","title":{"rendered":"What to do after your computer has been compromised by a scammer"},"content":{"rendered":"\n<p><em>Updated 12\/12\/25:<\/em><\/p>\n\n\n\n<p><em><strong>Below is a scenario that we hear about many times each month &#8211; it could happen to you. <\/strong><\/em><\/p>\n\n\n\n<p>You&#8217;ve just spoken on the phone with someone claiming to be from Microsoft, Amazon, your Internet provider or other well-known company. You&#8217;ve given the stranger remote access to your computer and they&#8217;ve shown you a bunch of things&nbsp;that&#8217;s wrong with it &#8211; errors, security or firewall problems, exposed social security numbers, or even offered to help transfer funds to or from your bank account. But they have a &#8220;fix&#8221; &#8211; they can remedy the &#8220;problems&#8221; for a few hundred dollars. You may or may not have gone so far as given out your credit card number or purchased gift cards for payment, but the damage has already been done. Sometimes it happens so quickly and convincingly that you may not realize that you&#8217;ve been conned until long after you&#8217;ve hung up the phone.<\/p>\n\n\n\n<p>You&#8217;ve let a stranger get into your personal business. What should you do now?\u00a0You should immediately turn off your computer or device that was remotely accessed &#8211; then call Computer Techs or another\u00a0honest, reliable and local computer professional. Don&#8217;t be embarrassed &#8211; the con artists are good at what they do and are very persuasive and convincing. Millions of people get scammed by these telemarketers\u00a0each year. Computer Techs will\u00a0check your computer for data they may have compromised or malicious programs left behind &#8211; such as stolen or changed passwords, deleted files, changed settings, malware or remote access tools.<\/p>\n\n\n\n<p>In a matter of minutes a scammer can obtain or change passwords, purchase goods or services on your behalf, create accounts, or obtain passwords and credit card numbers stored in your web browser.<\/p>\n\n\n\n<p>If you&#8217;ve allowed someone you don&#8217;t know to remotely control\u00a0your computer &#8211; no matter what company they <em>say<\/em> they&#8217;re from &#8211; please <a href=\"http:\/\/CTreno.com\/contact\" target=\"_blank\" rel=\"noopener\">contact us<\/a> ASAP so that we can make sure that you&#8217;re computer is safe to use. <\/p>\n\n\n\n<p>Since you&#8217;ve read this far, if you haven&#8217;t let a stranger remotely access your computer &#8211; please read <a href=\"http:\/\/computertechsreno.com\/tips\/many-of-our-monthly-tech-support-calls-could-have-been-avoided-had-the-caller-read-our-monthly-newsletter\/\" target=\"_blank\" rel=\"noopener\">how to avoid fake tech support calls<\/a> in the first place.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Other resources and education <\/h3>\n\n\n\n<p><a href=\"https:\/\/www.identitytheft.gov\/Info-Lost-or-Stolen\" target=\"_blank\" rel=\"noreferrer noopener\">When Information Is Lost or Exposed &#8211; IdentityTheft.gov<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/computertechsreno.com\/tips\/the-surprising-things-weve-discovered-with-our-cybersecurity-checkups-for-individuals\/\" target=\"_blank\" rel=\"noreferrer noopener\">The surprising things we\u2019ve discovered with our cybersecurity checkups for individuals<\/a>.<\/p>\n\n\n\n<p><a href=\"https:\/\/computertechsreno.com\/tips\/how-to-safely-manage-your-passwords-with-a-password-manager\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to manage your passwords \u2013 easily and safely.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/computertechsreno.com\/tips\/scam-examples-you-can-avoid-scams-by-following-this-simple-advice\/\" target=\"_blank\" rel=\"noreferrer noopener\">Spend a few minutes to check out these scams so that you don\u2019t become a victim.<\/a><\/p>\n\n\n<a href=\"https:\/\/computertechsreno.com\/tips\/what-to-do-after-someone-calls-you-claiming-to-be-from-a-well-known-company-and-youve-given-them-remote-access-your-computer\/print\/\" title=\"Print This Article\" rel=\"nofollow\"><img decoding=\"async\" class=\"WP-PrintIcon\" src=\"https:\/\/computertechsreno.com\/tips\/wp-content\/plugins\/wp-print\/images\/printer_famfamfam.gif\" alt=\"Print This Article\" title=\"Print This Article\" style=\"border: 0px;\" \/><\/a>&nbsp;<a href=\"https:\/\/computertechsreno.com\/tips\/what-to-do-after-someone-calls-you-claiming-to-be-from-a-well-known-company-and-youve-given-them-remote-access-your-computer\/print\/\" title=\"Print This Article\" rel=\"nofollow\">Print This Article<\/a>\n","protected":false},"excerpt":{"rendered":"<p>Updated 12\/12\/25: Below is a scenario that we hear about many times each month &#8211; it could happen to you. You&#8217;ve just spoken on the phone with someone claiming to be from Microsoft, Amazon, your Internet provider or other well-known company. You&#8217;ve given the stranger remote access to your computer and they&#8217;ve shown you a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,14,13,4],"tags":[],"class_list":["post-2214","post","type-post","status-publish","format-standard","hentry","category-computing-tips","category-passwords","category-scams","category-security"],"_links":{"self":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/2214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/comments?post=2214"}],"version-history":[{"count":18,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/2214\/revisions"}],"predecessor-version":[{"id":4132,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/2214\/revisions\/4132"}],"wp:attachment":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/media?parent=2214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/categories?post=2214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/tags?post=2214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}