Skip to content

Beware of Unsolicited E-mail

Most computer users receive unexpected, annoying Emails. It happens so frequently that most E-mail account providers integrate a way to automatically divert blacklisted senders into a special type of inbox called a spam box.

“Spam” is another term used to refer to unsolicited, annoying types of E-mail — but beware, there’s more than meets the eye to spam. The use of spam is a common avenue used by criminals to illegally obtain personal information from individuals who open and/or use spam. Spam can also be used to propagate various forms of malicious software, specifically in the forms of computer viruses and spyware.

A common and specific way that criminals can take advantage of sending spam is by posing as a financial entity such as a bank or prospective creditor.

The content of the spam will request that the receiver use a provided link to navigate to a website made to look like a legitimate financial institution and in short, request the victim to divulge personal information leading to identity theft, to say the least. Although computer users have become more aware of the said technique used by criminals, the danger of this type of attack still exists.

As said, propagating computer viruses and spyware is another reason criminals take advantage of spam.  If an unsolicited E-mail is decorated to look like the sender is honest and the

E-mail is carrying some type of computer virus, the computer being used to view and/or use the contents can become infected. The virus, installed inadvertently by the recipient of the Email, will generally log what the computer user does and forward that data to a criminal across the internet to be used for illegal purposes.

Common sense can be a powerful tool in the fight against illegal computer activity. However, some people, due to their busy schedules, do not have time to research the fundamentals of protecting themselves from criminal behavior revolving around computer usage.

Therefore, if there is a concern regarding any of the above points, please contact us so that we may assist in resolving it.

Check Out Our Blog!

a close up of a radio with the time displayed

Why You Need a UPS in Your Network Equipment

Apart from securing your computer network against breaches, it is advisable to ensure that the network hardware is plugged into a UPS (uninterruptible power supply) system.

the word rules spelled with scrabble tiles

What Are The Three Rules of HIPAA?

The Health Insurance Portability and Accountability Act (HIPAA) lays out three rules for protecting patient health information, namely: The Privacy

wheel house it logo

Let's Start a Conversation

Fill out the form below and a member of our team will contact you within 10 minutes. (Mon-Fri 8am-6pm EST)

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Let's Start a Conversation

Rory from wheel house IT

Call (954) 474-2204, option 2 to speak with a representative.

Send us an email at

Or contact us by form below:

"*" indicates required fields

This field is for validation purposes and should be left unchanged.