Top 5 Types of E-Mail Scams

E-Mailing is the heart of many business operations. From internal emailing to emailing customers, clients, and vendors, your company probably sends and receives hundreds to thousands of emails a month. Along the way you may run into some email scams. Some are painfully obvious, while others may be dangerously disguised as a customer or coworker. Here’s a quick list of the top email scams currently and how to avoid them!

The Inheritance Scam

This is a scam almost everyone has heard of and has become relatively harmless to the more skeptical email users. This email scam starts off explaining that the sender has a large wealth that they need help bringing to the United States and that if you help them you will receive a reward. When you respond to the sender (please don’t) , they will request your banking information to send you the “money”, all you have to do is send them a few hundred dollars so that a processing fee is paid. The scammer will continue to request money for processing fees until the user realizes they have been scammed. This scam also appears on various listings such as Craigslist in the form of “make money instantly” or “make easy money”.

How to avoid this scam: Never give you banking information to anyone over email. If it sounds to good to be true, it is.

The Fake URL Scam

This scam can be harder to detect for the average email user. Users may receive an email that seems to be a legitimate promotion or news story. When the user clicks on the link, it leads them to a site that is covered in malware and spyware, crippling you computer and potentially your whole network. What happened? The sender of any email can hide the destination of a link or have a link forward you to a completely different website.

How to avoid this scam: Check to see where a link is going to take you before you click it. Either hover you mouse over the link or google the destination if you are not familiar with the site.  If it is an honest sender, you should always be able to google the site they want you to visit.

The “Your Invoice is Attached” Scam

This scam is relatively newer than most. This scam will seem like it is from someone you know, mostly likely a customer or client you have dealing with. It will be an email with a subject line similar to “Your Invoice is Attached” with a pdf or excel sheet attached. When you click to download this attachment, your computer and network will most likely be hit with malware and ransomware.

How to avoid this scam: Keep on your toes! Users are cautioned to be very careful with this scam.
Contact your IT Managed Services Firm Immediately. Ask the customer or client, in a separate email using the email address you normally contact them with, if they sent you an invoice. Do not forward them the scam email or you may cause them to get a virus.

The Job Posting Scam

Scams often go after targets they find susceptible to clicking their links. This scam appears to be a standard job posting. They can even be emailing you because of a resume you posted to a job site. The scammer will either ask for sensitive information or money with the promise of an interview in return.

How to avoid this scam: Again, never give sensitive information such as banking numbers or social security numbers over email. Also, it’s probably not appropriate to look at job postings on or using your business email account (if you don’t own the business).

The F.B.I. Scam

This scam should hopefully be easy to catch, but it is still around because it still manages to net victims. You may receive an email saying that the F.B.I. has discovered unlawful content and practices on you devices and you will be arrested  unless you reply back with the payment information of prepaid visa cards.

How to avoid this scam: While the prospect of being arrested may cause a lapse in judgement to some people, please remember that the Federal Bureau of Investigations is not going to take a bribe of prepaid VISA cards.

Phishing attacks can happen to businesses of any size

Sign up to our newsletter and get a FREE Cyber Threat Report 

If your company is like many organizations, your IT infrastructure progressed over time, trying to keep up with the pace of your business. Without the right kind of IT planning and careful technology management all along, your technical environment probably has gaps.

Our IT assessments provide a clear picture of your current IT infrastructure and operations. Whether faced with budget shortfalls, limited resources, aging infrastructure or an outdated strategy, our detailed assessment reports provide relevant findings and recommendations to spur meaningful organizational change.

VISN-IT provides comprehensive assessments of both IT infrastructure and IT operations. Our IT infrastructure assessments evaluate all major infrastructure components, including servers, storage networks, security, desktop infrastructure, end-device hardware and applications. Our IT operations assessments evaluate critical operational areas, such as IT strategic planning, IT staffing, IT operational processes, IT governance, IT vendor management and IT support.

 


DATA BREACHES CAN HAPPEN TO BUSINESSES OF ANY SIZE

SIGN UP TO OUR NEWSLETTER AND GET A FREE CYBER THREAT REPORT 

If your company is like many organizations, your IT infrastructure progressed over time, trying to keep up with the pace of your business. Without the right kind of IT planning and careful technology management all along, your technical environment probably has gaps.

Our IT assessments provide a clear picture of your current IT infrastructure and operations. Whether faced with budget shortfalls, limited resources, aging infrastructure or an outdated strategy, our detailed assessment reports provide relevant findings and recommendations to spur meaningful organizational change.

VISN-IT provides comprehensive assessments of both IT infrastructure and IT operations. Our IT infrastructure assessments evaluate all major infrastructure components, including servers, storage networks, security, desktop infrastructure, end-device hardware and applications. Our IT operations assessments evaluate critical operational areas, such as IT strategic planning, IT staffing, IT operational processes, IT governance, IT vendor management and IT support.

CALL 718-227-5500 NOW FOR A NETWORK ASSESSMENT

Preparing for an IT Disaster

IT disasters are devastating to the infrastructure of any business. In 2018, threats to your IT infrastructure are growing no matter what sector your business ...
Read More →

Building an Incident Response Program

In part one of our series, our overview of Building an incident response plan, we discussed what regulations organizations will need to meet in order ...
Read More →

NetConnect / VISN-IT Featured in StorageCraft Press Release

New StorageCraft Partner Success Program Boosts Profit Paths Across All Channel Partner Business Models DRAPER, Utah, Sept. 27, 2018 /PRNewswire/ — StorageCraft®, whose mission is to protect all ...
Read More →

Small Business Cyber Security Concerns

The truth is that Small Businesses have a lot to fear when it comes to Cyber Security. Any disruption that causes downtime or loss of ...
Read More →

Email Compromise – How Does it Work?

Email compromises are becoming more and more dangerous every year, and it’s important to know how they work.  Email Compromises involve the hacking of a ...
Read More →
Cloud Computing

Cloud Computing Pros and Cons

What is the cloud?  Cloud Computing is “the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, ...
Read More →

Phishing Threats

Phishing threats are getting more and more sophisticated as cyber security measures become smarter. The main reason why phishing must be handled differently than other ...
Read More →

The Dark Web and You

Why Should I Care About the Dark Web? Chances are that somewhere out on the Dark Web lies passwords, email address, and other compromising information ...
Read More →

The New Extortion Scam you’ll want to look out for!

Email Threats constantly evolve and try to find new ways to steal your money or steal your information. A large part of Cyber Security is ...
Read More →

Two Factor Authentication – Do I Really Need It?

Two Factor Authentication procedures or Multi Factor Authentication procedures are a part of many interactions in our daily life. Most credit and debit cards now ...
Read More →

The True Cost of a Data Breach

One of the biggest headaches your company can endure is a data breach. Whether its caused by employee error or targeted cyber attacks, the long ...
Read More →
Employee Data Risk

Employees and Data – Are You At Risk?

One of the main sources of data vulnerability is employees. When owners and executives think of data breaches, however, one of the last places they ...
Read More →

California Consumer Privacy Act and the risk to Small Business

Late last week, California passed the California Consumer Privacy Act of 2018. Effective as of January 1st, 2020, the bill is a big step up ...
Read More →

Data Regulation and the Future

Every day more and more data breaches are occurring. Virtually every consumer in the United States already has had their information leaked to the dark ...
Read More →

Best Practices for Online Safety

Online safety is something everyone should care about. All of your sensitive information such as financial data, identity data, and viewing data are all over ...
Read More →