3 min read
Let's Talk Mobile
We spend a great deal of time thinking about protecting our homes, our computers, and our networks. Yet the single most important device in our...
Anyone using email should be aware of phishing and spoofing emails. In many cases, these fraudulent emails rely on the user's actions to be effective.
"It's easier to hack a human than it is to hack their technology." Hackers and cybercriminals everywhere.
✓ Increased awareness and critical thinking skills for email is vital for security and safety.
Many of these emails are not on their own dangerous or malicious - they require an action by the email user to be effective for the hacker. This is known as "social engineering" - a term that means psychological manipulation.
Whack - a mole - Eventually, the email address a hacker uses for these exploits will be blocked as they become identified as malicious. But, by then, they have moved on and are sending new exploits from a fresh address.
✓ Many phishing and spoofing emails are not blocked and cannot be stopped because they do not contain anything known to be malicious.
First, you can always contact us by sending a screenshot or forwarding a suspect email for analysis. The main thing is to not trust anything until you can credentialize the email.
✓ Treat every email in your inbox as "guilty until proven innocent" and "when in doubt, delete it out."
✓ Take a screenshot of the suspect email, and forward it to support@totaldigitalsecurity.com for analysis.
✓ Refer to this handy guide "22 Red Flags" by our world-class partner KnowBe4 - the preeminent anti-phishing training firm. Click the image for a download:
For more resources, be sure to visit our Support pages:
✓ How to Avoid Email Spoofing:
https://www.totaldigitalsecurity.com/support-resources/private-email/how-to-avoid-email-spoofing
✓ How to Stop Spam:
https://www.totaldigitalsecurity.com/support-resources/private-email/how-to-stop-spam
For more about Total Digital Security and "Cybersecurity for Life" please contact us.
3 min read
We spend a great deal of time thinking about protecting our homes, our computers, and our networks. Yet the single most important device in our...
5 min read
A massive cyberattack made headlines — and the weapons it used might be sitting in your home or office right now.
5 min read
In our last post, we introduced the three primary attack surfaces every family needs to understand: email, devices, and networks. Today we're going...