banner cyber security privacy

E-Mail Phishing Scams, what you need to know!

The Scam

Phishing scammers employ various online techniques such as fake emails and pop-up ads.  These scams often use fear tactics in order to get their victims to divulge sensitive information.

These E-Mail are designed to appear as if they come from reliable sources, like the IRS, Home land security or Microsoft. It is smart to know the difference between real and fraudulent messages and how to spot some of the clues that a message may be a scam.

These messages often appears to be from a person or company known to you. It attempts to gather personal and/or financial information from the recipient.

The message typically includes a link to a fake website, designed to mimic the site of a legitimate business. Phishers have also been known to use real company logos to make their communications and website seem legitimate.

The message entices the recipient to provide personal information that could be used for identity or online financial theft like your email address and password which in turns could be used to reset your financial institution web access and still from you.

 How to protect yourself

Never click unfamiliar links or download unfamiliar attachments. This may seem like a no-brainer, but all it takes is one employee in a company seeing a message from their boss or someone else in the company to open an attachment to expose the entire corporate network.

Many of us think we're above being tricked that way, but it happens all the time. Pay attention to the messages you get, don't click links in email (go directly to your bank's website or any other website, and log in), and don't download email attachments you're not explicitly expecting.

Look for spelling error

Cybercriminals don't necessarily have a good education, or speak the primary language of the email as a second language.

Prevention

Use an internet security package that provides antivirus, spyware, malware and spam protection, keep it up to date with the latest definitions and run scans regularly.

Only install software from their official website and pay attention to the install process for third party components that are not "required". Take your time installing it and during the installation uncheck the components you do not want.

Turning up your spam filters setting a little stronger may—depending on your mail provider—make the difference between a message landing in the spam folder versus your inbox, you can always review your spam messages before deleting them.

If you need assistance securing your computer against these threats, give us a call, we’ll be glad to help.

[shareaholic app="share_buttons" id="25201127"]

A rating on Angie's list

Microsoft certification cyber security and privacy

Apple certified pro cyber security and privacy

A+certification cyber security and privacy