Windows Autopatch: Some admins may have seen Quality and Feature Update reports incorrectly showing "SYSTEM_SCRUBBED" in Windows Autopatch (incident).
Security

Scam Center

Learn how to spot common phishing emails, text scams, fake support calls, payment fraud, and impersonation attempts. Report suspicious messages or links to OpenTech Support.

Important
OpenTech Support will never ask for your password, MFA codes, or remote access without a verified support request.
Verify requests
Security Tip: If someone claims to be OpenTech and asks for passwords or MFA codes, it is a scam.
Phishing emails

Lookalike logins, urgent messages, fake invoices, and “account locked” notices.

Smishing texts

Delivery alerts, payment issues, and “verify now” links sent via SMS.

Vishing calls

Fake IT/support calls asking for access, codes, or urgent payments.

If you think you were scammed
  • Stop communication with the sender/caller immediately.
  • Do not click additional links or open attachments.
  • If you entered credentials, change passwords right away (email first).
  • Enable MFA on email and critical accounts.
  • If money or gift cards were involved, contact your bank/card issuer immediately.
  • Run a malware scan and update your device.
  • Report it to OpenTech so we can help you contain and document.
Most common scam patterns we see
  • Invoice / payment redirect (vendor “changed bank details”)
  • Microsoft 365 login phishing (“your mailbox is full”)
  • Fake support calls (“your device is infected”)
  • Gift card / urgent request impersonation (“need this in 10 minutes”)
  • Payroll / W-2 requests
  • Shipping / package delivery text scams
  • Domain / DNS / “SSL expiring” renewal scams
Red flags

If you see any of these, slow down and verify.

  • Urgency or pressure to act immediately
  • Requests for gift cards, crypto, or wire transfers
  • Unexpected login prompts or “re-authenticate” links
  • Misspelled domains, strange sender addresses, or lookalike URLs
  • Attachments you weren’t expecting (especially ZIP/HTML/ISO)
  • Requests for MFA codes or password reset approvals
Check a suspicious link

Paste a URL to check for known malicious activity, lookalike domains, and deceptive Unicode tricks. Do not log in on pages you haven’t verified.

Existing Clients
Need active support right now?

If you are already an OpenTech client and need technical assistance, account help, or incident support, use the OpenTech Client Portal to open and track your request.

Report a scam

Send the details below so we can review the incident, advise next steps, and help reduce further risk.

Tip: Include: Screenshot of the email/text/website • Full sender address or phone number • Any link you clicked (copy/paste the URL if safe) • Time and date it occurred • Whether you entered credentials or approved an MFA prompt • Whether money was sent (amount + method)
Use full contact form
FAQs
What’s included in managed IT?

Proactive monitoring, patching, endpoint security, help desk support, and guidance to keep systems stable and secure.

How fast is response?

We prioritize by impact and severity. Urgent outages are escalated immediately, and we keep you updated through resolution.

Will OpenTech ever ask for my password or MFA code?

No. OpenTech Support will never ask for your password or MFA codes. If anyone asks, treat it as suspicious and contact us using the site contact form.

I clicked a link. What should I do first?
  • Close the page and stop interacting with the sender.
  • If you entered credentials, change your email password immediately.
  • Enable MFA (or reset MFA if you approved an unexpected prompt).
  • Contact OpenTech so we can review activity and advise containment steps.
How do I verify a message is really from OpenTech?

If something feels urgent or unusual, do not reply directly. Start a fresh contact request through the website and reference the message you received.

Want proactive protection?

We can harden Microsoft 365, enforce MFA and conditional access, and reduce phishing risk through layered security controls, policy, and user training.

Security Reminder
Never share passwords, MFA codes, or remote access with anyone claiming to be support unless you initiated the request through OpenTech.