INBOX OVERLOAD - How to Stop Spam Texts and Emails
An email account constantly flooded with junk email can be overwhelming. The sheer volume of these bulk email blasts is annoying enough. But junk email and texts, also known as spam, often come from an unknown sender or an imposter pretending to be a trusted source. Spam is not just inbox clutter. It is a threat to your cyber security. The FTC warns that spam is often the work of a cybercriminal trying to steal your personal information.
Spam Messages Can be Phishing Lures for Launching Cyberattacks
The majority of cyberattacks start with phishing emails or texts that are loaded with malware. The scam works by encouraging the reader to click on the link that downloads a virus or by enticing the reader to share sensitive personal data like credit card numbers and passwords. Cybercriminals use many tricky and urgent approaches when creating spam. Here are a few examples:
- Warning Messages – the spam texts or emails use various methods to prompt action:
- “There’s a problem with your payment information.” In this instance, the cyber thief might impersonate a trusted source such as your bank or a website from which you make online purchases
- “We’ve noticed some suspicious activity on your account.” The sender might pretend to be your bank or a merchant with which you regularly do business, such as Amazon. Nobody likes “suspicious activity,” and this warning is designed to get your attention.
- “Delivery Notification: We’ve had a problem with your delivery. Please update your address information.” Who wants to miss a delivery? An unsuspecting target might easily be willing to confirm their address.
- “INVOICE – Please Pay Immediately!” – an urgent demand for payment is a real warning of a scam. However, if you don’t remember owing payment, don’t be too quick to click! Verify that payment is due by contacting the company directly - -not using any attached links in the suspicious email.
- “Your Account is About to be Terminated!” – If your initial reaction is “That’s impossible,” you’re probably right. So don’t click!
- Special Offers to Lure Your Attention – Nobody wants to miss out on a free offer or a special deal. This type of spam might be disguised as:
- An offer for a low or no-interest credit card
- A prize you’ve been awarded, such as a gift card or cash
- An offer to pay off your mortgage or student loan
How to Stop Spam Emails and Texts
- Resist the Urge to Reply – The good scammers can make spam very tempting. The safest practice is to not engage in any way. The reply address probably goes to a fake account that was set up to steal your login and password. Visit your account the way you usually do, never by replying to the provided link.
- Don’t Unsubscribe – An “Unsubscribe” option can itself be a launch point for malware.
- Use a Separate Email Account – If you make a high volume of online purchases, you might want to use a separate email account that isn’t linked in any way to bank accounts or other personal data.
- Do Not Reveal Your Address Online – This is a standard operating procedure. Don’t do it.
- Don’t Buy Anything from a Possible Spammer – There are many reputable and secure online vendors. Make it a practice for you to find them, not the other way around.
- Avoid Opening Unsolicited Emails from Unknown Senders – This is another standard operating procedure.
- Resist the Urge to Click on Attachments ¬ – Attachments are the most common entry points for malicious software
- Don’t Threaten the Spam Sender – Don’t let your ego lead your approach to cyber security. The last thing you want is for a hacker to make you a priority revenge target for their cybercrimes.
How to Report Spam Text Messages
- If You Have an iPhone – In IOS, you have the option to “Delete and Report Junk.” If you tap on this button, your message will report the sender info to Apple and delete the fake message from your device. After deleting it, you should take action to “Block the Contact.” In Android, select the “I” information button. Click Report. Click Block.
- For SMS and MMS Messages – Click on the down arrow next to the contact number. Click the “More” three dots at the bottom and select “Block Contact.” Delete the text. You can also contact your service provider to report suspected fraud.
When phone customers know how to report spam text messages and contacts, your phone service provider can block these cybercriminals from contacting all of their customers, reducing cyber risk on a larger scale.
Essential Network Cyber Security for Small and Mid-Sized Businesses
Spam is just one of many dangerous cyber threats that can devastate SMBs. As remote access work has increased, it has become even more essential to assess and secure the entire network against cyberattacks, including work-from-home computers and phones. All devices connected to your business network are vulnerable to cyber threats and can be used to spread malware to the rest of the business network.
Mobile device management is more important than ever. Your employees should be trained to follow company security protocols when accessing the network, even on their own or BYOD devices. Ask your IT technician to help you set up a company policy if you don’t already have one. It will help you protect valuable business and personal data from cybercriminals, and reduce the risk of liability that goes along with a data breach.
A secure and professional business email service should be a priority for your company. Having a team of IT experts to support all your systems is imperative for small to midsized businesses to avoid the disruption and financial impact of cyber threats. Your IT support team can train your staff, update your software, inspect and monitor all your devices and provide robust cyber security for all the devices that access the company network.
A full-service IT company that specializes in small businesses can train your employees to understand how to stop spam emails and help reduce the risk of a cyberattack. They can also review email filtering, firewall and server settings and other items that can help your business network operate efficiently and securely.