Email is huge! It’s become an indispensable part of our lives and our businesses. In fact, a report from Statista estimates some 281.1 billion emails are sent every day, worldwide. That’s 37 emails for every person on the planet. And of all that email, more than half is spam. It’s annoying, it impacts productivity, and it opens us up to phishing and malware attacks.
Luckily, paying attention to the following 5 tips to identify dangerous spam emails, before you open, click, download, or share data will go a long way toward protecting you and your data.
1. Install Anti-Spam & Anti-Virus Software – Liquid Web’s Protection And Remediation can help!
You can’t watch everything at once. So, one of the best ways to protect yourself from dangerous spam is to install anti-spam software that can do it for you. Liquid Web’s Protection and Remediation product handles this for you. It bundles several general server security functions, including SpamAssassin and ESET setup and configuration.
SpamAssassin inspects incoming transmissions and tags emails as spam, giving you the freedom to delete or recover as you see fit. Meanwhile, ESET monitors potentially dangerous applications.
2. Watch for Unknown, Odd or Spoofed Email Addresses
Now that you’ve got the easy-to-identify spam handled, it’s time to take the next step: educating you and your employees about how to spot dangerous emails. A great, general rule to follow: don't open email from email addresses you don't know.
Now, in business, this isn’t always possible, so pay attention to the sender’s email address, especially if the message seems suspicious. If you’re ever unsure, don’t reply or click any links. Attackers often use spoofed email addresses (email addresses that appear to come from a trustworthy source) to trick the recipient. These emails often include phishing attack attempts.
Spoofing is done in a number of ways, but a few of the more common ways include:
Changing the name of the sender so that it does not match the sender’s email address: It’s easy to change the header information of an email so that the sender’s name doesn’t match the sender’s email address.
Using characters that are similar to actual letters in order to make the sender email address to appear to be from a recognizable source: For example, many Greek characters look similar to Latin letters, such as the Greek character “ε” and the letter “e”. Emails may use the Greek character instead of the letter “e” in the sender’s address, like this: “example@liquidwεb.com.” Unless the recipient is paying attention, they might not notice the email address is incorrect.
3. Don’t Give Out Personal Information
Phishing scams usually appear to come from legitimate businesses, like your bank or a government agency like the IRS or the Social Security Administration. These emails will often contain URLs that link to malicious web pages asking for your private information, and the spoofed pages look very convincing!
Again, we understand that, in business, it’s not often possible to avoid giving away your personal information. Just remember: legitimate businesses, like the government or Apple, will never ask for personal information such as passwords, social security numbers, or credit card numbers via email.
Giving out your information can lead to drained bank accounts or even identity theft.
4. Avoid Strange Attachments or Unfamiliar Links
The best policy is to refrain from downloading files or clicking through links in a strange email unless you trust the source. Malware, viruses, and other types of malicious material can be easily downloaded to your server or computer through attachments or malicious links, such as the Dropbox link in Example #3.
5. Seem Too Good To Be True? It Probably Is.
Another sign of a dangerous spam email is when the content seems too good to be true – often in the form of a promise for large sums of money or unprompted offers for advertisement opportunities. Such emails are almost always phishing schemes trying to collect bank account information from the recipient.
The goal of an email that seems too good to be true is to encourage the recipient to click a link and provide their bank account information – a classic phishing scam. These scams come in many forms, including the story about the government owing you money in Example #4.
Spam can be dangerous and can leave your computer or server vulnerable to future attacks. Following the above tips can help you identify the most common types of spam.
Also, don’t forget that even replying to spam or attempting to “unsubscribe” can come with its own set of dangers! It is always best not to reply at all if you are unsure.
Get the complete Security Infrastructure Checklist for SMBs
A self-professed pirate captain with two decades of leadership experience, Jerry has led teams from 60+ cooks and chefs to 16 networking engineers. He brings those years of experience to his current role as Product Manager at Liquid Web, focusing on networking and security products. When not working or sleeping, Jerry can usually be found eating and having a good conversation with good people.
Keep up to date with the latest Hosting news.