Contact us today!  (512) 494-6978
2 minutes reading time (364 words)

Tip of the Week: Victims Of November 2014 Scam Can Get Fraction Of Funds Back

Tip of the Week: Victims Of November 2014 Scam Can Get Fraction Of Funds Back

In November of 2014, the Federal Trade Commission announced that “two massive telemarketing operations” had been temporarily shut down after collecting over $120 million by “deceptively marketing computer software and tech support services.” It wasn’t long before these companies lost significant court judgements to the FTC, but by then, the money was gone.

Naturally, this does not bode well for those who were scammed of that money.

The Story
In December of 2016, the FTC came to a settlement with Advanced Tech Support, one of the perpetrators of these scams. This settlement recovered $10 million of the company’s ill-gotten gains.

Advanced Tech Support had been running the old scam where they would push the sale of their ‘services’ by telling their customers/victims that their computers were infected--when they weren’t--to get them to call Advanced Tech Support. Once they called, these victims were coerced into signing up for tech support subscriptions that did little more than drain hundreds from their bank accounts.

Advanced Tech Support is permitted to continue business, but they will have to pay to have a court-appointed monitor make sure they don’t slip back into their old ways, in addition to the $10 million settlement mentioned above.

Why Victims May Be Out of Luck
As it would turn out, that $10 million settlement may very well be what is to be used to pay back the victims of these scams. Another company was ordered to pay $36.4 million, but were unable to due to lack of funds. This company wound up having to relinquish all of their assets as a term in the case settlement.

When all's said, and done, victims of these scams may be refunded somewhere below 10% of their total losses.

While our hearts go out to the victims, we can’t help but wonder what would have happened if this scam had been leveraged against a business. Jobs would be lost, clients alienated, and the business would have failed long before the case would get to trial.

Taking this into consideration, you need to ensure that your business is protected against scammers like these, and that your employees have a trustworthy source of support that they can rely on. We can help. Call Austin Technology Group at (512) 494-6978 to learn more.

Why Boarding Pass Selfies Are A Really Bad Idea
Make Sure Your Software Is Licensed, Or The BSA Ma...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, June 23 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

IT Support Tech Support Apple Data loss The Internet of Things Printer Data Breach File Sharing Paper Tech Terms Security Password Cybersecurity Disaster Recovery Hackers Cost Management Windows Telephone System Holiday Telecommuting Company Culture Analytics RAM Sports User Security Virtualization Congratulations Malware Alert Paperless Office Mobile Security Bandwidth Comparison Backup and Disaster Recovery User Tip Google Maps Phone System Patch Management Phishing Access Cybercrime Virus Multi-Factor Security Staffing Voice over Internet Protocol Live Streaming Downloads Unified Communications Cloud Botnet Streaming Media Document Management Threat Software Smart Technology Small Business Movies Network Security Microsoft A.I. Sales Hybrid Cloud CrashOverride PowerPoint Credit Cards Lead Generation Blockchain Hardware iPhone Internet of Things Scam Workers Email Management Cleaning Cortana Hosted Solutions Artificial Intelligence Government Biometrics VoIP Paste Websites Remote Computing Microsoft Office Shortcut Networking Net Neutrality Wireless Charging Automation Access Control Recovery Telephony Collaboration WannaCry Office 365 User Tips Mobile Devices Managing Stress Gmail Wi-Fi Tech Term Thank You Gadgets VoIp Twitter Saving Money Passwords Internet Tip of the week Spam Telecommute Current Events Managed IT Services Google Drive Spyware Business Management Data Management Best Practices Printer Server Backup Staff Printers Files Server Management Business Technology Google Computers Save Money Millennials Education Mobile Device Management Voice over IP Android Hard Drive Tactics Internet Explorer Battery Technology Tips IT Support Environment Travel Remote Support Automobile Facebook Content Filtering Managed IT Service Telephone Systems Innovation Online Shopping Dongle Cloud Computing Tip of the Week Marketing eCommerce BDR Connectivity IT budget Spam Blocking Business Intelligence Miscellaneous Dark Web Communications Smartphone SSD Laptop Information Technology Database Computer Two-factor Authentication Social Media WhatsApp Retail disposal Data Protection Maintenance Antivirus Operating System Business Computing Edge Hard Drives Wireless Trends Browser Word Specifications Machine Learning Law Enforcement Digital Licensing Excel Safety HP G Suite Settings Email IT Management Business Processors Hiring/Firing App Server Physical Security Network Attached Storage Website Bring Your Own Device Chrome Tablet Productivity VPN Communication Employer-Employee Relationship Privacy Smartphones Cables Windows 10 Remote Control e-waste Technology Conferencing Budget Applications WIndows 10 Managed IT Value Router Emergency Data Gadget Copy Managed IT Services Efficiency Business Continuity Inventory Remote Monitoring Entertainment Virtual Assistant Ransomware BYOD News Vulnerability Outsourced IT Hosted Solution Knowledge IT Services HIPAA Office Politics Data Recovery Ink WiFi Data Backup Printing Microsoft Teams Apps How To Worker Big Data