Cybercrooks use clever schemes to defraud people every day. They often combine sophisticated technology with age-old tricks to get people to share personal information, send money or compromise access to their computer network. They use social engineering methods to convince people into doing things they would normally be smart about not doing.

One of the most recent phishing scams pressures people into clicking on the button that can result in infecting their computer with the virus, or to steal the information related to personal identity.

If you have received an email that looks like the image here, please know – IT IS NOT LEGITIMATE; do not click nor reply – just delete it immediately.

Scam example

Top 5 signs of a Phishy email:

  • The email is using an unusual salutation (from someone you know!)
  • The email is asking for personal information
  • The email is asking for immediate action (like changing your password or sending a wire transfer) – just as in the example screenshot above
  • The email has improper grammar or spelling
  • The email has web links or strange attachments

How is your state of IT?

Call Us: (201) 493-1414

Related Articles

Top 10 Computer Virus Symptoms [Checklist]
How Radically Changing Corporate Culture Can Optimize Security, Communications, and Productivity
Windows 7 Has Officially Reached End Of Life
Increasing risk of CEO Fraud Emails – What to Know and How to Protect Yourself
Best Approach: Online Safety and Physical Security
23 secret keyboard combinations for Windows? Plus 9 bonus combos for Mac
Cybercrime is escalating the cybersecurity workforce shortage
New Vulnerability: CPU Meltdown & Spectre
Reputable highly rated Small Business IT services and tech support company in New Jersey - powersolution industry awards

Looking for a Break-Fix support? We recommend ValueMSP »ValueMSP - Tech Support for Small Business

Scroll to Top