Business owners and managers have many concerns they must address on a regular basis, or at least be aware of. Some of security concerns revolve around fraud, more specifically email fraud. While this isn't a new concept, email fraud and scam occurrences are on the rise, and it is vital to know how to spot them.
Here's five tips to help you spot email frauds or scams.
Look at the email address One of the easiest ways to spot a fraudulent email or scam is by looking at the email address of the sender. Many credit card application scams use third party email services like Gmail or Yahoo. Some scammers go so far as to set up accounts in the name of the company e.g., AMEX_121@gmail.com.
Sophisticated scammers will actually try to copy the legitimate company's email account - a practice called spoofing. They will usually have a few changes like a missing letter from the address, or an extra . added.
The easiest thing you can do is look for the sender's site on the Internet. For example: You get an email from AMEX OPEN (American Express's small business credit card) and notice that the sender's email address just doesn't look right. Go to Google and search for amex fraud. You'll likely find the fraud page which tells you exactly how the company sends emails. If the sender is a smaller company, most of these will have email contact addresses right on the site, take a look and compare the two. If they are different, the email is likely a scam.
Look at the sender's website If you think an email is fraudulent, try looking up the website associated with the sender. Should you be unable to find the site, it's likely a scam.
If you find a website, click through some pages to see if there is anything that looks out of place. For example a website selling a new financial service has pages with Coming Soon or you get errors when you try to load the page. If it looks fishy, it likely is - delete the email.
It would also be a good idea to go to archive.org's Wayback Machine, copy and paste the website's URL into the The Wayback Machine Search bar and hit Take me back. This will bring up previous versions of the website. If you see that the site in question was something completely different a few months to a year ago (e.g., it is a financial services page now, but six months ago it was a page selling prescription drugs), chances are high it's a fraud.
Call them Many scammers will put phone numbers into emails to make them look more legitimate. If you are unsure about whether this email is legitimate or not, why not try calling the number? Many scammers run more than one fraud operating at the same time and may answer the phone with another name, or not at all.
Similarly, if you call a local number of a supposedly small business and get routed directly to voicemail, it's likely fraud.
Look carefully at the body of the message The body of the email can also be a great way to suss out email scammers and potential fraud. Because many fraudulent emails originate outside of the major English speaking countries, there will often be language that just sounds different from the way people write in your area. One great example of this would be a line like 'We wish to sell you a great product.'
You should also look for spelling errors, grammar mistakes or inconsistencies. While some fraudulent emails will have minor spelling inconsistencies, others will spell common words wrong. If you see mistakes like 'our product are a great deals', this should raise a warning flag.
Spelling and grammar errors are a part of business communication, so don't expect a perfect email from all companies, especially if you see that the company is located overseas. It's the emails with mistakes supposedly coming from companies in your area that should really raise alarm.
The sender asks for money or passwords It's kind of an unwritten rule that when sending out emails you never ask for a person's credit card number or account passwords. Banks, large companies and many social networks will never ask you for passwords or account information, credit card numbers, pin codes, etc of any kind over email. If you notice that an email selling something asks for you to reply with a credit card details so you can make a purchase, it's best to delete the email as it's likely a fraud.
Email fraud is a big deal, and unfortunately it will likely become even more common in the near future. This means you should be able to spot potentially fraudulent emails. If you think an email is a scam, it's best to just delete it immediately. Don't respond or forward it to colleagues or employees. If you need to let people know, write another email that describes the suspected email but has no links. You can also forward a screenshot to your colleagues or friends to illustrate the scam.
Looking for more ways you can protect your company? Contact us today. We can work with you to develop a security system that will meet your needs.

It can be argued what the most important invention of the last 100 years has been, but many would agree that the computer has to be among the top. These complex machines helped usher in the information age. Unfortunately, they come with a downside: Destructive malware such as viruses have become a major problem for businesses because viruses have been built up to such mythical proportions that many users simply don't know fact from fiction.
One of the more popular debates about the Internet is who exactly owns your data and information when it goes online? Most of the information regarding this is held in the Terms of Service, which most people click and agree to without reading. The interesting thing about this is that web oriented companies usually update their policies on regular basis and often introduce changes you may not be aware of. With so many websites, it can be a chore to keep track of all these changes, luckily there is an online database that makes this easy.
Think of the everyday usual precautions you take. When you get into a car, you put on your seatbelt; when you leave the house, you lock the door, the list goes on and on. Yet, when it comes to online security, most people are content with a virus scanner, and do little about securing their personal data stored online. Why is this? If a grocery store clerk asks for your home address and phone number, you’d likely ask why they need it. Online however, we usually provide it without a second thought. Instead, we should be proactive taking steps to protect our personal information.
Imagine you are in the airport waiting for a flight when you look down only to discover that your laptop is missing. This isn't a great thought, especially since many of us have important files and programs that we can't afford to lose. The problem is, if your device has gone missing, the chances of you recovering it are slim. The good news is that there is a possible solution that lets you track your device.
For many, social media is a deeply ingrained part of daily life. For companies it's become an integral part of their marketing and communications strategy. Because of this, the security of these services is something users expect. 99% of the time. However, there are breaches that can cause trouble for users.
Last week we posted part one of our three part article on how to improve your IT revenue and maximize resources in the current business economy. For those who missed it: The article covered ways you can maximize resources you already have by being an outside thinker, always looking around and using facts to help determine your actions. This week, we look at the internal aspect of your IT solutions and what you can do to save costs.
For as long as computers have been able to connect to the Internet, there have been security flaws and the two go hand-in-hand. Companies do their best to shore up security problems, and some do better than others. There's one popular Internet based program that has had a slew of security issues in the past year, prompting many experts to suggest you should disable it.
For users of Windows systems the threat of a security breach is an ever-present one that has many security experts constantly worrying. The thing is, many systems are secure enough from outside attacks, and many scammers know this. As a result, scammers have switched tactics and have taken to masquerading as Windows technicians, hoping to get users to give up their credit cards.
When it comes to security most businesses take adequate steps to ensure their networks and systems are secure from the majority of attacks. The major problem with this is that many don't look beyond what they already do, and this is where security issues can harm them. One such security threat comes from social media. Your employees are likely using these platforms right now, and if you're happy about that then it's a good idea to develop a policy that ensures your business remains secure.
