Skip to content

Beware of Unsolicited E-mail

Most computer users receive unexpected, annoying Emails. It happens so frequently that most E-mail account providers integrate a way to automatically divert blacklisted senders into a special type of inbox called a spam box.

“Spam” is another term used to refer to unsolicited, annoying types of E-mail — but beware, there’s more than meets the eye to spam. The use of spam is a common avenue used by criminals to illegally obtain personal information from individuals who open and/or use spam. Spam can also be used to propagate various forms of malicious software, specifically in the forms of computer viruses and spyware.

A common and specific way that criminals can take advantage of sending spam is by posing as a financial entity such as a bank or prospective creditor.

The content of the spam will request that the receiver use a provided link to navigate to a website made to look like a legitimate financial institution and in short, request the victim to divulge personal information leading to identity theft, to say the least. Although computer users have become more aware of the said technique used by criminals, the danger of this type of attack still exists.

As said, propagating computer viruses and spyware is another reason criminals take advantage of spam.  If an unsolicited E-mail is decorated to look like the sender is honest and the

E-mail is carrying some type of computer virus, the computer being used to view and/or use the contents can become infected. The virus, installed inadvertently by the recipient of the Email, will generally log what the computer user does and forward that data to a criminal across the internet to be used for illegal purposes.

Common sense can be a powerful tool in the fight against illegal computer activity. However, some people, due to their busy schedules, do not have time to research the fundamentals of protecting themselves from criminal behavior revolving around computer usage.

Therefore, if there is a concern regarding any of the above points, please contact us so that we may assist in resolving it.

Check Out Our Blog!

a woman in a business suit is using a laptop

Reliable Network Monitoring Support

Reliable Network Monitoring Support Ensure network security and operational efficiency with robust network monitoring. A strong monitoring system is indispensable

a man holding a computer case with many wires

How to Protect Your Electronics Against Disaster

Know how to protect your business technology and electronics against natural disasters. It’s important for companies to develop a game plan that will ensure employees are able to communicate with others before, during, as well as after a natural disaster to keep the business running.

Let's Start a Conversation

Watch the video below and find out why you should fill out this form and start a conversation today.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.