Security Guide: Fake IT Support / Social Engineering Impostor

 Disclaimer: This quick reference can’t replace professional incident response. If you’ve encountered impostor tech support, click the big red button or call us.

Impersonating IT staff is a common trick, attackers show up in person or call employees claiming to fix an issue, then harvest passwords or install malware.


Immediate Steps:

  • Verify Identity: Instruct staff to ask for official ID or check internal directories if “IT support” arrives unannounced.

  • Terminate Sessions: If an impostor accessed a workstation, log them out and shut down the PC.

  • Change Credentials: Any user who shared passwords must reset them immediately.

  • Notify Team: Alert everyone about the incident, encouraging caution about unexpected IT visits.

  • Check for Installed Tools: Run scans to find suspicious remote-control software or keystroke loggers.

  • Implement IT Policies: Have a clear procedure for verifying legitimate IT personnel.

 Fake support scams rely on human trust. Reinforcing strict ID checks and immediate action upon suspicion reduces the chance of employees handing over critical info to impostors.

Think an impostor gained access to your systems? Click the big red button for help or call us now to speak with a specialist

© 2025 Cyber Emergency Network. All Rights Reserved.

Service Provider?

We are always looking for top-tier cybersecurity service providers