<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.newfathom.com/blogs/tag/spam/feed" rel="self" type="application/rss+xml"/><title>New Fathom IT - Blog #Spam</title><description>New Fathom IT - Blog #Spam</description><link>https://www.newfathom.com/blogs/tag/spam</link><lastBuildDate>Fri, 10 Apr 2026 18:08:57 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[What can happen when you click a link?]]></title><link>https://www.newfathom.com/blogs/post/what-can-happen-when-you-click-a-link</link><description><![CDATA[Bad actor gets the indication that your email works Most links sent in an email will be unique to the email it's sent to. If you click the link the bad ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm__mbvJZ70SYqBoMho7KvVIA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_pOYGXCy-SiurY7oufqy25w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_75Wrw7fxTWS4zlmYWGQcjg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_75Wrw7fxTWS4zlmYWGQcjg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"] .zpimage-container figure img { width: 507px !important ; height: 338px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"] .zpimage-container figure img { width:507px ; height:338px ; } } @media (max-width: 767px) { [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"] .zpimage-container figure img { width:507px ; height:338px ; } } [data-element-id="elm_UlWTYiPqSaSQIrl7T3z0AA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/browsing-the-web.webp" width="507" height="338" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_cuKShAnZQ_qpsboN8ZSlqw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_cuKShAnZQ_qpsboN8ZSlqw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div>What are the things that can happen when you click a link in a malicious email?</div></div></h2></div>
<div data-element-id="elm_WTjwVccrpn8TqCAttkUlhQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_WTjwVccrpn8TqCAttkUlhQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-size:16px;">Stage 1 (Just by clicking the link)</span></div></div></h2></div>
<div data-element-id="elm_3UY5cMfmTc6kuKK2edsiQA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3UY5cMfmTc6kuKK2edsiQA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><ol><li style="text-align:left;">Bad actor gets the indication that your email works</li><ol><li style="text-align:left;">Most links sent in an email will be unique to the email it's sent to. If you click the link the bad actor will know that your email address is up and working. Also, they'll know that you are the type of person that clicks links so they'll probably send you more spam!</li></ol><li style="text-align:left;">Bad actor gets your browser &quot;fingerprint&quot;</li><ol><li style="text-align:left;">Your browser session (and every browser session being used) has a footprint based on the information that's available from your session on that website. There are over 50 different data points that your browser gives to a web page just by visiting it. This information (although some is trivial) can disclose information about you and your company. So just clicking a link is giving bad actors 50 clues about you and your company. Here's a few of the things that can be part of your fingerprint: Public IP address, browser used, operating system (e.g. Windows, Mac), browser language, time zone, extensions, and much more! You can go to <a href="https://amiunique.org/fingerprint" title="https://amiunique.org/fingerprint" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">https://amiunique.org/fingerprint</a> to see how unique your browser session is (the more unique the worse off you are, don't be snowflake!).<br></li></ol><li style="text-align:left;">Everything and anything</li><ol><li style="text-align:left;">It's also possible if your browser is not updated that bad guys could use a vulnerability in your browser to do lots more than just gather information. Here's a list of the vulnerabilities that Chrome has had: <a href="https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-15031/opec-1/Google-Chrome.html" title="Reference " target="_blank" rel="nofollow noreferrer noopener"><span style="text-decoration-line:underline;">Reference</span></a>. Some of these allow for someone to own your browser completely. But don't worry, Chrome does a great job of updating, but if you're using an outdated browser or turned off automatic updates you could be in trouble.<br></li></ol><li style="text-align:left;">Downloading a file</li><ol><li style="text-align:left;">Sometimes just clicking a link can begin the process of downloading a file onto your computer. Usually it will require you to open or run the file to do anything truly malicious, but just getting the file on your computer is a bad step!</li></ol></ol></div></div>
</div><div data-element-id="elm_HwH9TjzbDH5B1Z-vEMfVqQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_HwH9TjzbDH5B1Z-vEMfVqQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-size:16px;">Stage 2 (After you click the link)</span></div></div></h2></div>
<div data-element-id="elm_vd5XvFScQvEDSqiI4O9O1w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vd5XvFScQvEDSqiI4O9O1w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><ol><li>Web page asks you to enter login credentials</li><ol><li>This is call phishing or credential harvesting. These bad actors are trying to get your login information. Usually it's an attempt to get your business email login, but it could also be for other things like your Amazon account or bank account. See Brian Krebs great blog on the value of a compromised email account here: <a href="https://krebsonsecurity.com/2013/06/the-value-of-a-hacked-email-account/" title="Reference" target="_blank" rel="nofollow noreferrer noopener" style="text-decoration-line:underline;">Reference</a>.<br></li></ol><li>Web page installs a malicious extension</li><ol><li>If a malicious extension is added the bad actor will basically own your browser and be able to read information on web pages you visit including. Many times these extensions fall into &quot;adware&quot; where they will get paid to re-direct your website to a different web page or send you pop up notifications, but they could also be more malicious.</li></ol><li>You open or run a downloaded file</li><ol><li>This could be &quot;game over&quot; on your computer. Depending on the malware this could spring board to installing viruses on your system. Sometimes these files would be an office file with macros, or perhaps just an executable or a PDF that will exploit a vulnerability in Adobe or some other application.</li><li>The reason bad actors may want to do this are many, see Brian Krebs blog on the value of a compromised PC: <span style="text-decoration-line:underline;"><a href="https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/" title="Reference." target="_blank" rel="nofollow noreferrer noopener">Reference</a></span><a href="https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/" title="Reference." target="_blank" rel="nofollow noreferrer noopener">.</a><br></li></ol></ol></div></div>
</div><div data-element-id="elm__eol7u7TS9SVZ4gjR2KDNQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 24 Aug 2023 09:44:02 -0700</pubDate></item><item><title><![CDATA[Recognizing Malicious Emails]]></title><link>https://www.newfathom.com/blogs/post/recognizing-malicious-emails</link><description><![CDATA[According to Britannica, 50% of email on the internet is spam. These emails range from selling Viagra knock-offs to trying to convince you to wire the ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_lLmkKk0yQdS_vDN48udhzw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZSETJNwoTZOn5SEK-rNL9A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_jyNCqw0sSzG3tdjsPlsFgQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_jyNCqw0sSzG3tdjsPlsFgQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_V-QGsE1Bd_yJ5qa6C8lffg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_V-QGsE1Bd_yJ5qa6C8lffg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/sapm-909485_640.jpg" size="medium" data-lightbox="true" style="width:640px;"/></picture></span></figure></div>
</div><div data-element-id="elm_1fOx-qFiS8uSNGGauRqEIA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_1fOx-qFiS8uSNGGauRqEIA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-left " data-editor="true">How to Recognize and Avoid Malicious Emails</h2></div>
<div data-element-id="elm_5Crp583LQx-J_wywdxGRAA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5Crp583LQx-J_wywdxGRAA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:justify;">According to Britannica, 50% of email on the internet is spam. These emails range from selling Viagra knock-offs to trying to convince you to wire them money. Some of these emails are so obvious they need no introduction, but cyber-criminals are becoming more and more sophisticated. In this blog we're going to help you recognize a malicious email, respond appropriately, and recover if you've fallen for them. The last section is how to prevent these things happening in the first place.</p></div>
</div><div data-element-id="elm_UgVLYP0cPn53kpWrm2Ustg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> [data-element-id="elm_UgVLYP0cPn53kpWrm2Ustg"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1523537444585-432d2bacc10d?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" data-src="https://images.unsplash.com/photo-1523537444585-432d2bacc10d?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="small" data-lightbox="true" style="width:1080px;"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">Key Takeaways</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><ul><li>&nbsp; STOP! If you think an emails seems a little off, stop and investigate.<br></li><li>Check Links, Check the &quot;From&quot;, Look for Grammar mistakes and misspelled words<br></li><li>Look out for urgency and manipulation. Aka, someone wants something fast or they have something you need.</li></ul></div>
</div></div></div><div data-element-id="elm_4QvnVHpMyO9d1d5rxxapyQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_4QvnVHpMyO9d1d5rxxapyQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_FKkX2rc9m-pRMhznF_2Z-Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_FKkX2rc9m-pRMhznF_2Z-Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-type1 zpheading-align-left " data-editor="true">Types, Detecting, and Responding</h2></div>
<div data-element-id="elm_BUfzUOmmbEKYwRSQ3uz1IQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_BUfzUOmmbEKYwRSQ3uz1IQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Business Email Compromise (BEC)</h3></div>
<div data-element-id="elm_BKz4I2aiJNgIt7Nacn6rCQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BKz4I2aiJNgIt7Nacn6rCQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>When someone takes over a legitimate email account and uses that account to send malicious emails, that's called Business Email Compromise. These emails are the hardest to stop and detect because they usually appear to be from someone you know and trust because they are, in fact, from their email account. These accounts get taken over when someone has gotten the login information for the compromised account, they've signed in, and are using that account for their own practices.&nbsp;</p></div>
</div><div data-element-id="elm_zUwT1V3I5i8HRZwQu8WaBg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_zUwT1V3I5i8HRZwQu8WaBg"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Detecting BEC Emails</h4></div>
<div data-element-id="elm_qMj-uxXbj-8jhTeQynvGQA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qMj-uxXbj-8jhTeQynvGQA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>When you receive an email from a compromised account, it usually has a couple clear tell tale signs that it's a fake. Here's how to spot them:</p><ul><li>There's almost always a link</li><li>The link almost always takes you to a page requesting login information</li><li>It seems off and non-typical</li><li>You didn't request it</li><li>Check for bad grammar and spelling errors. Many of these people use a translator app and English isn't their first language</li></ul></div>
</div><div data-element-id="elm_8xWi3DU1C45dmLFlTU6nTQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8xWi3DU1C45dmLFlTU6nTQ"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Responding to BEC Emails</h4></div>
<div data-element-id="elm_OEjzQ7Hw0MHppMNYw51uxg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_OEjzQ7Hw0MHppMNYw51uxg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>If you've gotten a BEC email, or one that you suspect is a BEC email, what should you do?</p><ol><li>Verify that it's not legitimate</li><ol><li>If you get an email from someone that just seems off, use out-of-band communication to contact them. Do NOT email them back and ask &quot;Is this real?&quot; or use the phone number on the signature. If their email is compromised then of course they will say &quot;Of course it's legit,&quot; and the signature phone numbers are usually changed as well.&nbsp;</li><ol><li>Call the phone number of the person if you have one on file, or call their company's main number</li><li>Text them, fax them, or email someone else at their office. Use something other than that email address to contact the person. This is what we mean by &quot;out-of-band&quot; communication.&nbsp;</li></ol><li>​Examine links in the file. If it says it goes to a Word document, does the link go to OneDrive or SharePoint? Also, just because it does, doesn't mean you should go there, but that's a good way to tell if it's spam.&nbsp;<br></li><ol><li>Here's a great site to see where a link actually goes:<span style="color:rgb(48, 4, 234);">&nbsp;<span style="text-decoration-line:underline;"><a href="https://wheregoes.com/" title="https://wheregoes.com/&nbsp;" target="_blank" rel="">https://wheregoes.com/</a>&nbsp;</span></span><br></li></ol></ol><li>Find out who else in your company has also received the email and warn them, especially if it's really tricky. Warn your colleagues or contact your IT department about the scam. It just takes one person to give your company a really bad name.&nbsp;</li><li>Delete the email. Or if you're feeling like you want to have some fun, email the person back and see how long they'll talk with you. Maybe you can get them to wire you some money :-)</li></ol></div>
</div><div data-element-id="elm_Yc4ohdQzsNsykjMCM573Ig" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Yc4ohdQzsNsykjMCM573Ig"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">General Spam: Solicitations and Trickery</h3></div>
<div data-element-id="elm_iruUBfWoePA0nGevDRdgRg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iruUBfWoePA0nGevDRdgRg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Sometimes the email isn't from someone you know, and they try to convince you to click a link, wire money, or the like anyway. Let's look at some types of these scams, why they happen, and how to respond. These are a different category because these usually are not legitimate accounts, but they appear legitimate.&nbsp;</p></div>
</div><div data-element-id="elm_-UGFP5tuSVeM7udN5YQatQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-UGFP5tuSVeM7udN5YQatQ"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Types</h4></div>
<div data-element-id="elm_yL1KITilvQKFLmbseXu_oA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_yL1KITilvQKFLmbseXu_oA"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Faking the &quot;From&quot;</h5></div>
<div data-element-id="elm_0wpx1_jQrHjyuCF6D4_lLA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0wpx1_jQrHjyuCF6D4_lLA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>A common trick out there is to change the &quot;From&quot; name of an email address. If your boss's name is Jane Smith and their email is jane@company.com, a spammer can change their name to be &quot;Jane Smith&quot; even though their email is jane@anotheremail.com. This is usually a good trick and most people don't pay attention to the whole email address. Here are the tell tale signs of these:</p><ul><li>Check the actual email address</li><li>Eventually they will ask you to send gift cards or some strange financial request (think wiring money)</li></ul></div>
</div><div data-element-id="elm_IkYA-34gUCKxpyYNULrkZQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IkYA-34gUCKxpyYNULrkZQ"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Blackmail and Heart Strings</h5></div>
<div data-element-id="elm_JqA1V6FayvxqFchb_UnYrQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JqA1V6FayvxqFchb_UnYrQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>There's really no limit to the ways scammers will try to blackmail you. My neighbor was scammed by a company she was trying to return something she'd purchased and they said they had to get on her computer and check her bank accounts to verify the purchase... well... that wasn't all they were doing. Here are some common ones:</p><ul><li>I'm a destitute person in [name of third-world country] and I need help</li><li>I have your email and password and I have sensitive information about you i'm going to publish if you don't pay me</li><li>I have naughty pictures of you and I&quot;ll release them if you don't pay me (sometimes this one is along with the one above)</li><li>We could run away together, I just need some money to come visit</li></ul></div>
</div><div data-element-id="elm_9DmmeWRqJ8ufCGsSd6SpbA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9DmmeWRqJ8ufCGsSd6SpbA"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Too Good to be True</h5></div>
<div data-element-id="elm_SV6oU2BAYIvKRqdofDfBkQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_SV6oU2BAYIvKRqdofDfBkQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>This may come as a shock, but you probably aren't that lucky to win the lottery or that car, or whatever else they're selling. Don't fall for it and don't click the links!</p></div>
</div><div data-element-id="elm_i1CEtZVJsAI5_VBFWxNXCQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_i1CEtZVJsAI5_VBFWxNXCQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Detecting</h3></div>
<div data-element-id="elm_f_P54JEj03-AgnTv8tZfeg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_f_P54JEj03-AgnTv8tZfeg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Besides the signs of scammers mentioned above, there are usually a lot of other signs you can look for too in scammers emails:</p><ul><li>Poor use of the English language. English is usually not their native tongue and so an easy way to tell a scam is by how they handle the complex language:</li><ul><li>Bad grammar</li></ul></ul><ul><ul><li>Bad spelling</li><li>Weird phrasing</li></ul><li>​Check for links. It's a good idea to check any link before you click on it. Does it actually go where it should? When it's asking for a login to Microsoft, are you actually on a Microsoft web page?</li><ul><li>This is a great tool to check links:&nbsp;<a href="https://wheregoes.com/" title="https://wheregoes.com/" rel="" style="color:rgb(48, 4, 234);text-decoration-line:underline;">https://wheregoes.com/</a><br></li></ul></ul></div>
</div><div data-element-id="elm_8n9BrLB3lLofZgw8VTjbDw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_8n9BrLB3lLofZgw8VTjbDw"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_TKvA1EK2L_galEVWAdqLEQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_TKvA1EK2L_galEVWAdqLEQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-type1 zpheading-align-left " data-editor="true">Recovering From Spam After You've Fallen for It</h2></div>
<div data-element-id="elm_vdz1-h98KavS83raqNt4ag" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_vdz1-h98KavS83raqNt4ag"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1533234427049-9e9bb093186d?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="medium" data-lightbox="true" style="width:1080px;"/></picture></span></figure></div>
</div><div data-element-id="elm_KFYl5LaAYlHk7wdi4aW9Jw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KFYl5LaAYlHk7wdi4aW9Jw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Sometimes we all make mistakes and sometimes we realize our mistake right after we make it. If you've fallen for a BEC scam here's what you do:</p></div>
</div><div data-element-id="elm_UVttRhLMUQ_6sYkf2crRWw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_UVttRhLMUQ_6sYkf2crRWw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">If you just replied to the email</h3></div>
<div data-element-id="elm_ihlg0Qsk3Ip0Q7tZaRySTw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ihlg0Qsk3Ip0Q7tZaRySTw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><ul><li>Don't really need to do anything. You just sent them a message and engaged them. Just delete their future emails to you.</li></ul></div>
</div><div data-element-id="elm_eWvaPEUZ5DOiiRRlqBb3jA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_eWvaPEUZ5DOiiRRlqBb3jA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">If you gave them your email and password</h3></div>
<div data-element-id="elm_86oZdtIWZQcLV0avGWQSCQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_86oZdtIWZQcLV0avGWQSCQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><ul><li>Reset your password immediately</li><li>Reset any other accounts that use that same password</li><li>Make sure your account isn't forwarding emails to an unknown email account. This is a common tactic if an email has been compromised, then they can map out your organization long-after you've changed your password</li><li>Make sure you don't have an auto-reply you don't recognize</li></ul></div>
</div><div data-element-id="elm_AYYkTcBAH0tcnoHeV2f2kQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_AYYkTcBAH0tcnoHeV2f2kQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">If you've downloaded a program and run it</h3></div>
<div data-element-id="elm_NL_C6YCBKqqZ3rynIx5x-g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NL_C6YCBKqqZ3rynIx5x-g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><ul><li>Disconnect your computer from any network connections (WiFi and/or Ethernet)</li><li>Reset your computer and start over or rollback your computer to a backup before you ran the program</li><li>If you downloaded a file but didn't open it. Delete the program/file and run a virus scan. You may still need to reset your computer, but you may also be fine.</li></ul></div>
</div><div data-element-id="elm_aa4Ho6cVu2L4HN7-kzRLZg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_aa4Ho6cVu2L4HN7-kzRLZg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">If you did a remote session and they were on your computer</h3></div>
<div data-element-id="elm_tnsvFRifDyPVlwoq-pD7rA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tnsvFRifDyPVlwoq-pD7rA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>If you made it this far with someone, they're probably after your money and it's a simple scam to that extent. I would do the same thing as the program downloaded and run.&nbsp;</p></div>
</div><div data-element-id="elm_rEQxhXvelLs9Uof4EFNIGg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_rEQxhXvelLs9Uof4EFNIGg"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_DB2_fmdWAtvZUOnVjeg5WQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DB2_fmdWAtvZUOnVjeg5WQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-type1 zpheading-align-left " data-editor="true">An ounce of prevention is worth a pound of recovery</h2></div>
<div data-element-id="elm_gFjH0pCeDawtbGMoCMBOnw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gFjH0pCeDawtbGMoCMBOnw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>So, what if we just made some changes that stopped spammers in their tracks and made it much fore difficult to fall for these things in the first place? Here are some ideas that will help you be less impact if you fall for spam, and hopefully make you less likely to get it.</p><ul><li>Use Multi-Factor Authentication for your email account</li><li>Disable Auto-Forwarding in your email account (You have to be an admin to do this, but it's a really good idea)</li><li>Deploy an advanced anti-virus on your computer. This advanced anti-virus should be doing active scanning of any downloads</li><li>Deploy a password manager for you and your team</li><li>Create alerts for emails that are &quot;Faking the From&quot; so people in your company can more easily recognize them</li></ul></div>
</div><div data-element-id="elm_IV8Gvj4GREOdENU1_DLa3g" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_IV8Gvj4GREOdENU1_DLa3g"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 01 Oct 2020 08:58:00 -0700</pubDate></item></channel></rss>