Spoofing: What It Is And How It’s Used In An Email Scam
Email spoofing is the use of a fake sender address in an email message. It is used by email scammers to hide the origin of their message. By modifying the “from”, “reply” and “return path” fields of the email header, they can make the email appear to be from someone else. This is easy to […]
SANS Policy Templates: Clean Desk Policy
The SANS Institute has published several information security policy templates describing best data security practices in template format. This largely means that you can ‘fill in the blanks’ when developing a security policy (although some modification will be in order for your specific circumstances). In this post we’ll look at the SANS template for developing […]
Know the signs of an email scam
Each year, well-intentioned Americans report losing billions of dollars to email scams. Some blame naivety or just plain ignorance, but the reality is that while computer users are warned to look out for scams, most never learn what to look for to identify the difference between legitimate email and something malicious. Here are some easy to spot warning […]
How To Recognize An Email Scam
Con-artists have been around long before email. When email became a reality, the con-artists became very happy. Email meant less work, and higher payoffs for their scams. Many of the scams used via email were used before email began.It seems people will always have a tendency to “fall” for them. These are the most common email […]
3 Things that Will Stop Your Business in Its Tracks
If you own or run a business, you understand how important it is to keep your business running all the time. As little as a day or two, or even a few hours of down time can ruin a good profits streak, and the effects can be seen for months, sometimes years. Unfortunately, as helpful as technology […]