Impersonating IT staff is a common trick, attackers show up in person or call employees claiming to fix an issue, then harvest passwords or install malware.
Immediate Steps:
Verify Identity: Instruct staff to ask for official ID or check internal directories if “IT support” arrives unannounced.
Terminate Sessions: If an impostor accessed a workstation, log them out and shut down the PC.
Change Credentials: Any user who shared passwords must reset them immediately.
Notify Team: Alert everyone about the incident, encouraging caution about unexpected IT visits.
Check for Installed Tools: Run scans to find suspicious remote-control software or keystroke loggers.
Implement IT Policies: Have a clear procedure for verifying legitimate IT personnel.
Fake support scams rely on human trust. Reinforcing strict ID checks and immediate action upon suspicion reduces the chance of employees handing over critical info to impostors.
Think an impostor gained access to your systems? Click the big red button for help or call us now to speak with a specialist
We are always looking for top-tier cybersecurity service providers
LinkedIn