Recognize Remote Access Scams

ISL Online's remote access software is trusted by thousands of IT professionals worldwide, helping them resolve technical issues for their clients efficiently. However, it's important to stay vigilant as scammers and other bad actors exploit these powerful tools to gain unauthorized access to devices. They usually employ social engineering tactics to steal critical personal information, passwords and access codes. It is crucial to understand the risks and recognize the signs of a scam to protect yourself effectively.

Key Guidelineslink

Never Give Access to Strangers

Never Give Access to Strangers

Always verify the identity of the person asking to connect to your computer.

Never Share Your Bank Details

Never Share Your Bank Details

Legitimate banks will never ask you to provide your login details to them.

Never Share or Enter Your Passwords

Never Share or Enter Your Passwords

Never share or tell anyone the passwords you use.

Enable 2-Factor Authentication

Enable 2-Factor Authentication

Wherever possible, enable 2FA on your account and never share the authentication code with anyone.

How to Recognize a Scamlink

Cold Call

Often, but not always, the scammer will be the one that contacts you and initiates the conversation - a phone call, an SMS, an email… Be wary of unexpected offers! Legitimate companies will almost never call you out of the blue asking to connect to your device.

Monetary Incentive

The scammers will usually approach you with a promise of money. Some common examples are: offering you dividends or an unexpected refund, suggesting that you have won a prize, creating a tempting job offer or exciting investment opportunity.

Sense of Urgency

Whatever approach the scammers use it will almost certainly include a sense of urgency. Usually, the offer they are promising is valid only for a very short period, this creates pressure on the victim and gives them less time to think rationally about the situation.

Sense of Fear

In addition to creating a sense of urgency, the scammers will try to induce a sense of fear. They will often tell the victim that their computer is infected or that they are in legal trouble. Then the scammer will present themselves as the person who can solve the problem.

In Case You Get Scammedlink

Symmetrical AES 256-bit end-to-end encryption

Contact your bank immediately, as some transactions can be reversed.

Symmetrical AES 256-bit end-to-end encryption

Reset any passwords for the accounts you believe may have been compromized.

Symmetrical AES 256-bit end-to-end encryption

Notify local authorities or law enforcement agencies for further assistance.

Symmetrical AES 256-bit end-to-end encryption

Have a trusted professional check your computer for signs of compromize.

Think you've been scammed?link

If you suspect you've been targeted by a scam, please send a report using the form below. ISL Online actively combats misuse of our tools and reviews all reports to identify and shut down fraudulent accounts, enhancing web safety for everyone

Please note, if a crime has occurred you should contact the relevant authorities first. ISL Online will only be able to assist with the investigation after being contacted by the authorities.

close

Hello,

how can we help you?