So, one morning, you log onto your computer, open your email, and find yourself staring at a bunch of undeliverable emails in your Inbox.  These emails were created and sent from your computer, or so it seems, and have bounced back from yonder destinations……giving you your first clue that your email account has been compromised.

I have a bunch of weird, spam emails in my Inbox, HELP!!!

Wikipedia says the term spam is derived from the 1970 Spam sketch of the BBC television comedy series Monty Python’s Flying Circus. The sketch is set in a cafe where nearly every item on the menu includes Spam canned luncheon (fake) meat and a raucous band of Vikings drowns out the conversation with their “Spam, spam, spam, spam. Spam, spam, spam, spam….wonderful Spam” chant.  Hence, fake, worthless, annoying internet messages have quickly become known as Spam. Sending an irritating, large, meaningless block of text in this way is called spamming.

What do you mean compromised?  What are they trying to get?  Have they hacked my online financial information? 

There are a multitude of reasons and techniques used by these individuals/groups in an attempt to damage or acquire whatever information they’re going after.  You’ve probably heard of these common techniques, spoofing, spamming, and phishing.  Here’s Wikipedia’s little definition for each:

  • Spoofing – The word “spoof” means to hoax, trick, or deceive. Therefore, in the IT world, spoofing refers to tricking or deceiving computer systems or other computer users. This is typically done by hiding one’s identity or faking the identity of another user on the Internet.
  • Spamming – Unsolicited, usually commercial messages (such as e-mails, text messages, or Internet postings) sent to a large number of recipients or posted in a large number of places.
  • Phishing – A type of Internet fraud scam where the scammer sends email messages that appear to be from financial institutions or credit card companies that try to trick recipients into giving private information (i.e., username, password, account number, etc.).

What do I do?

With that being said, because the average user usually isn’t equipped to deal with any of these techniques, here’s a small list of actions to start with when you are seeing weird computer behavior or you find out that you’ve been compromised:

1) Change your email password.  Change your system login password.  Get into the habit of periodically changing those passwords on your own….and adding a 1 to the end of your previous email is not changing your password from a hacking standpoint.  That’s one of the most common password changes and that hackers are aware of it.

2) Run a virus and/or malware scan on your computer.  DCNC offers a suite of products in our  package with tools from Webroot, Barracuda and Contiuum.  Most of the “freebie” apps aren’t very good and can, in some cases, even mess your computer up even more.

3) If it looks like the previous steps aren’t having much affect, stop whatever you’re doing and call DCNC, at 303-920-9472.  In most cases, we’ll be able to help you through your issue(s) with minimal, to no damage to your system, data, or information.

To finish this up, we suggest that you be a little more careful with your email and take a moment to really evaluate what’s being asked of you.  Whether it’s a request for you to go get the bosses dry cleaning or notification that you’ve been selected as the recipient of $36,000,000 from your long lost uncle in Siberia, know that someone, somewhere is out there trying to get your information.  As the old adage goes, if it seems too good to be true, more than likely it is, and it’s more important than ever to be wary.  Think twice before clicking once!

Be safe out there!- Gene Essman

5 Tips for Working Remotely

5 Tips for Working Remotely

5 Tech Tips for getting your workforce working remotely and keeping them secure Whether by choice or by government order, as COVID-19 continues to spread, more and more companies are mandating employees work from home to self-quarantine and help flatten the curve....

read more

Meet Our New Regional Sales Manager

Jeff Lindvall has been in technology sales for near twenty years now and enjoyed working in telecom, AV integration, cloud, software, and unified communications. As far as IT sales, he’s held almost every position imaginable. He...

read more

We All Share this One Single Planet Earth

Many people are guilty of not recycling their old and obsolete electronics. It’s never a good idea to dispose of your electronics in the garbage, in fact in Colorado it’s been illegal since 2013.   Instead, it should be disposed of in the proper way and through proper...

read more

Microsoft Office 2019

If you're not on Office365, you may be curious about  the newest release of Office from Microsoft. Here’s what you need to know for now: For starters, you won’t be forced to upgrade. Microsoft Office 2019 is a standalone, one-time purchase that does not receive...

read more

2 Comments

  1. Streaming Jav Online Free - JavPlay

    Howdy would you mind stating which blog platform you’re working
    with? I’m going to start my own blog soon but I’m having a tough
    time selecting between BlogEngine/Wordpress/B2evolution and Drupal.

    The reason I ask is because your design seems different then most blogs and I’m looking
    for something completely unique. P.S Apologies for getting off-topic but I had to ask!

  2. @dcncinc

    Thank you for stopping by our website. Our blog is simply a WordPress/DiviTheme blog, nothing fancy but I’m glad you like it. Good luck with your adventure.

Submit a Comment

Your email address will not be published. Required fields are marked *

We Are Here To Help!

13 + 2 =

Office

7100 Broadway #1B
Denver, CO. 80221

Call Us

(303) 920-9472

©1998-2020 DCNC, inc

All rights reserved

Privacy Policy