Windows Autopatch: Some admins may have seen Quality and Feature Update reports incorrectly showing "SYSTEM_SCRUBBED" in Windows Autopatch (incident).
⚠ Security Alert

Scam Center

Think you've been targeted? Act fast — every minute matters when credentials or funds are at risk. Review the warning signs, take immediate action, and report suspicious activity to OpenTech Support.

🚨 Critical reminder
OpenTech Support will never ask for your password, MFA codes, or remote access without a verified support request you initiated. If someone claiming to be us does — hang up or delete the message immediately.
If in doubt — stop and verify
⚠ If someone is claiming to be OpenTech and demanding passwords, MFA codes, or payment — it is a scam. Stop all contact now.
If this is happening right now — stop everything.

Do not approve any MFA prompts, share passwords, or send money. Close suspicious windows and contact us immediately through your verified Client Portal.

Phishing emails

Lookalike logins, urgent messages, fake invoices, and “account locked” notices.

Smishing texts

Delivery alerts, payment issues, and “verify now” links sent via SMS.

Vishing calls

Fake IT/support calls asking for access, codes, or urgent payments.

Immediate action
If you think you were scammed

Do these steps in order — do not wait.

  • Stop communication with the sender/caller immediately.
  • Do not click additional links or open attachments.
  • If you entered credentials, change passwords right away (email first).
  • Enable MFA on email and critical accounts.
  • If money or gift cards were involved, contact your bank/card issuer immediately.
  • Run a malware scan and update your device.
  • Report it to OpenTech so we can help you contain and document.
Most common scam patterns we see
  • Invoice / payment redirect (vendor “changed bank details”)
  • Microsoft 365 login phishing (“your mailbox is full”)
  • Fake support calls (“your device is infected”)
  • Gift card / urgent request impersonation (“need this in 10 minutes”)
  • Payroll / W-2 requests
  • Shipping / package delivery text scams
  • Domain / DNS / “SSL expiring” renewal scams
Warning signs
Red flags — stop and verify

If you notice any of these, do not proceed. Contact OpenTech through your portal to verify before taking any action.

  • Urgency or pressure to act immediately
  • Requests for gift cards, crypto, or wire transfers
  • Unexpected login prompts or “re-authenticate” links
  • Misspelled domains, strange sender addresses, or lookalike URLs
  • Attachments you weren’t expecting (especially ZIP/HTML/ISO)
  • Requests for MFA codes or password reset approvals
Check a suspicious link

Paste a URL to check for known malicious activity, lookalike domains, and deceptive Unicode tricks. Do not log in on pages you haven’t verified.

Existing Clients
Need active support right now?

If you are already an OpenTech client and need technical assistance, account help, or incident support, use the OpenTech Client Portal to open and track your request.

Report incident
Report a scam to OpenTech

Submit the details below and our security team will review your incident, advise on next steps, and help reduce further risk. The more detail you provide, the faster we can help.

Tip: Include: Screenshot of the email/text/website • Full sender address or phone number • Any link you clicked (copy/paste the URL if safe) • Time and date it occurred • Whether you entered credentials or approved an MFA prompt • Whether money was sent (amount + method)
Use full contact form
FAQs
What’s included in managed IT?

Proactive monitoring, patching, endpoint security, help desk support, and guidance to keep systems stable and secure.

How fast is response?

We prioritize by impact and severity. Urgent outages are escalated immediately, and we keep you updated through resolution.

Will OpenTech ever ask for my password or MFA code?

No. OpenTech Support will never ask for your password or MFA codes. If anyone asks, treat it as suspicious and contact us using the site contact form.

I clicked a link. What should I do first?
  • Close the page and stop interacting with the sender.
  • If you entered credentials, change your email password immediately.
  • Enable MFA (or reset MFA if you approved an unexpected prompt).
  • Contact OpenTech so we can review activity and advise containment steps.
How do I verify a message is really from OpenTech?

If something feels urgent or unusual, do not reply directly. Start a fresh contact request through the website and reference the message you received.

Want proactive protection?

We can harden Microsoft 365, enforce MFA and conditional access, and reduce phishing risk through layered security controls, policy, and user training.

Security Reminder
Never share passwords, MFA codes, or remote access with anyone claiming to be support unless you initiated the request through OpenTech.