About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Tech Support Scams Exploit Your Reliance on the Experts

photo

SPONSORED CONTENT -- (StatePoint) Ever received an unexpected alert by text or email claiming there is a problem with your computer that the sender needs your help to fix? That could very well have been a tech support scam.

The scammer impersonates an expert that may have more technical knowledge than you and pretends there is a problem with your system or device that you can’t see.

They want your personal information, passwords and access to your systems, and the easiest way to get it is to ask you for it. These things give scammers the keys to install programs that steal personal and financial information saved on your computer or phone and do tremendous damage.

Tech support scams can be delivered in a variety of ways. Sometimes they cause a pop-up on your screen that looks like a legitimate message from your software provider. Sometimes they create lookalike websites or web ads that list fraudulent phone numbers. If you call, the scammer will ask for personal information and in some cases, payment for services needed to “fix” the problem.

No matter how the scammer approaches you or what story they tell, the aim is to cause you to panic that something is broken or compromised and may lead to loss of access to your valuable records, photos, etc. This is especially upsetting to those who may be less tech-savvy, especially when scammers are able to convincingly impersonate trusted brands.

There are ways to protect yourself, your information and your devices, though.

The most important thing to remember is not to panic! Scammers want you to react out of fear and respond without thinking. Pause, breathe and take time to verify. Contact trusted brands through their official websites and exercise a zero-trust approach, particularly when someone unknown contacts you with unsolicited advice.

Tech companies will not call you directly and won’t ask you to call them. They also won’t ask for your passwords, one-time passcodes or remote access to your computer. Other red flags to watch for include:

• Someone claiming to want to help applying undue pressure, claiming time sensitivity

• Demands for payment – particularly in an irretrievable form (cryptocurrency, gold, cash, wire transfer, gift card, money order, etc.)

• Requests for your personal information, passwords or account numbers

• Calls from phone numbers that are legitimate but unexpected, unknown, private or a phone number that can’t be found on the company’s website

Actions you can take to protect yourself from this type of scam include:

• Restarting your computer if a pop-up appears and freezes your screen.

• Keeping your systems and antivirus up to date and running scans regularly.

• Not clicking links if you receive a message or alert and instead, typing in the official website address and making contact to verify whether there was a legitimate request.

• Disconnecting and independently locating a customer service number for the brand in question, then calling to verify the IT support contact was legitimate.

• Blocking unknown numbers and email addresses.

• Never giving anyone your password or verification code, and making sure passwords are not the same for multiple places.

If you are scammed, it’s critical to take immediate action to minimize the damage the fraudsters can do. Contact your bank, financial services providers and credit bureaus to alert them and institute a freeze. And file a report with the Finance Trade Corporation.

To learn more about scam prevention, consult PNC Bank’s Security and Privacy Center (pnc.com).

Tech support scams can be expensive. Be extra cautious when someone claims to be IT support.

*****

Photo Credit: (c) Carlos Pascual / iStock via Getty Images Plus

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.