So, one morning, you log onto your computer, open your email, and find yourself staring at a bunch of undeliverable emails in your Inbox. These emails were created and sent from your computer, or so it seems, and have bounced back from yonder destinations……giving you your first clue that your email account has been compromised.
I have a bunch of weird, spam emails in my Inbox, HELP!!!
Wikipedia says the term spam is derived from the 1970 Spam sketch of the BBC television comedy series Monty Python’s Flying Circus. The sketch is set in a cafe where nearly every item on the menu includes Spam canned luncheon (fake) meat and a raucous band of Vikings drowns out the conversation with their “Spam, spam, spam, spam. Spam, spam, spam, spam….wonderful Spam” chant. Hence, fake, worthless, annoying internet messages have quickly become known as Spam. Sending an irritating, large, meaningless block of text in this way is called spamming.
What do you mean compromised? What are they trying to get? Have they hacked my online financial information?
There are a multitude of reasons and techniques used by these individuals/groups in an attempt to damage or acquire whatever information they’re going after. You’ve probably heard of these common techniques, spoofing, spamming, and phishing. Here’s Wikipedia’s little definition for each:
- Spoofing – The word “spoof” means to hoax, trick, or deceive. Therefore, in the IT world, spoofing refers to tricking or deceiving computer systems or other computer users. This is typically done by hiding one’s identity or faking the identity of another user on the Internet.
- Spamming – Unsolicited, usually commercial messages (such as e-mails, text messages, or Internet postings) sent to a large number of recipients or posted in a large number of places.
- Phishing – A type of Internet fraud scam where the scammer sends email messages that appear to be from financial institutions or credit card companies that try to trick recipients into giving private information (i.e., username, password, account number, etc.).
What do I do?
With that being said, because the average user usually isn’t equipped to deal with any of these techniques, here’s a small list of actions to start with when you are seeing weird computer behavior or you find out that you’ve been compromised:
1) Change your email password. Change your system login password. Get into the habit of periodically changing those passwords on your own….and adding a 1 to the end of your previous email is not changing your password from a hacking standpoint. That’s one of the most common password changes and that hackers are aware of it.
2) Run a virus and/or malware scan on your computer. DCNC offers a suite of products in our package with tools from Webroot, Barracuda and Contiuum. Most of the “freebie” apps aren’t very good and can, in some cases, even mess your computer up even more.
3) If it looks like the previous steps aren’t having much affect, stop whatever you’re doing and call DCNC, at 303-920-9472. In most cases, we’ll be able to help you through your issue(s) with minimal, to no damage to your system, data, or information.
To finish this up, we suggest that you be a little more careful with your email and take a moment to really evaluate what’s being asked of you. Whether it’s a request for you to go get the bosses dry cleaning or notification that you’ve been selected as the recipient of $36,000,000 from your long lost uncle in Siberia, know that someone, somewhere is out there trying to get your information. As the old adage goes, if it seems too good to be true, more than likely it is, and it’s more important than ever to be wary. Think twice before clicking once!
Be safe out there!- Gene Essman
Many business owners using Office 365 believe that their data is totally secure. The reality, however, is a different story. Although Microsoft offers many benefits in productivity, efficiency, and collaboration with Office 365, the company doesn’t provide users...
“Efficient and got me working again quickly.” “Fast and efficient” “Very helpful” These are just a few of the things clients are saying about one of our newest field technicians, Tricia Farnsworth. Tricia joined the DCNC family in December and hit the ground running....
Phishing tactics exists for one purpose: to get confidential information from an unsuspecting target to get something of value in return. However, knowing about the hugely diverse set of today’s phishing tactics can help ordinary people, home and business internet...
5 Tech Tips for getting your workforce working remotely and keeping them secure Whether by choice or by government order, as COVID-19 continues to spread, companies have employees working from home. Here are some tech tips and tricks from DCNC, to help make the remote...
Jeff Lindvall has been in technology sales for near twenty years now and enjoyed working in telecom, AV integration, cloud, software, and unified communications. As far as IT sales, he’s held almost every position imaginable. He...
We Are Here To Help!
7100 Broadway #1B
Denver, CO. 80221