Recognize

If you or someone you know has experienced a technical support imposter scam, we recommend that you act immediately, by following our guidelines below, and then proceed to our ReportRecover, and Reinforce sections for further assistance.

Some Immediate Action Steps to Take

  • Update or download legitimate security software and scan your computer or device.
  • If a virus was found on your computer or device, reinstall your operating system and wipe your hard drive clean with the help of an IT professional.
  • Stop all contact with the individual or company that contacted you.
  • Change any passwords that you have automatically saved on your computer or device.
  • If you paid with a credit card, dispute the charge with your credit card provider right away.
  • Contact your bank or financial institution to close or change any compromised accounts.
  • Go to annualcreditreport.com to see a copy of your free annual credit report.
  • Save all information or messages about the offer, technical issue that was reported to you, and/or the individual(s) who contacted you. You may need to provide this information when you file a report.

Report

Contact the Money Service Company You May Have Used and Report the Fraud

Recover

These resources have been gathered, selected and vetted to help simplify the process of recovering after a cybercrime incident has taken place. You may need to contact organizations outside FightCybercrime.org. Results will vary depending on your circumstances.

Contact Credit Reporting Agencies to Monitor Your Accounts

Reinforce

Once you have notified the appropriate organizations and you are on the road to recovery, it is time to reinforce your cybersecurity, using these resources and tools.

Implement Preventive Measures

  • Remember that legitimate technical support companies do not call, text, or email users offering immediate security scans or repair services.
  • Don’t give out your credit card or bank account information over the phone to a company representative, unless you’ve already researched them and established trust.
  • Download our Six Steps to Better Security PDF.

Community Resources

Helpful Videos