24/7 Phone Support
Toll Free: (877) 779-4822
8 a.m. - 5 p.m.
IT Core Service Support
8 a.m. - 5 p.m.
Cybercriminals have become quite savvy in their attempts to lure people in and get you to click on a link or open an attachment.
They send emails that look like they come from a credible financial institution, e-commerce site, government agency or any other service or business. These emails often urge you to act quickly, because your account has been compromised, your order cannot be fulfilled or another matter.
If you are unsure whether an email request is legitimate, try to verify it with these steps:
Spam is the electronic equivalent of junk mail. The term refers to unsolicited, bulk – and often unwanted – email.
Here are ways to reduce spam:
Phishing attacks use email or malicious websites (clicking on a link) to collect personal and financial information or infect your machine with malware and viruses.
Spear phishing is highly specialized attacks against a specific target or small group of targets to collect information or gain access to systems. For example, a cybercriminal may launch a spear phishing attack against a business to gain credentials to access a list of customers. From that attack, they may launch a phishing attack against the customers of the business. Since they have already gained access to the network, any emails they send may look authentic, and because the recipient is already customer of the business, these emails are more likely to make it through filters and into the recipient’s inbox, increasing the probability of the recipient opening the email.
Spam, phishing and other scams aren’t limited to just email. They’re also prevalent on social networking sites. The same rules apply on social networks: When in doubt, throw it out. This rule applies to links in online ads, status updates, tweets and other posts.