background pattern

2 Common Email Spams ComTech Sees Consistently

The security of our online communications has never been more critical. Ethan explains two prevalent email spams infiltrating our inboxes and shares expert advice on fortifying your defenses against these digital threats.


The Impersonation Tactic

A common method scammers use involves impersonation. A classic example from our own experience features an email supposedly from Sage, a technician at ComTech. This email, originating from a generic Gmail account, requests an update to Sage's paycheck account information. The deception here is twofold: the unauthorized use of a trusted name and the external, non-ComTech email address. This scam shows how hackers exploit publicly available information to target organizations.

Recognizing the Red Flags:

  • Unexpected Email Addresses: Legitimate company communications will come from official email accounts, not generic services like Gmail.
  • Unsolicited Requests: Be cautious of emails asking for sensitive updates or confirmations without prior notice.

The Self-Spoofing Email Scam

Another sophisticated scam we have encountered mimics emails from your own domain, tricking recipients into believing the communication is internal. These emails often contain malicious links requiring Office 365 login credentials, leading unsuspecting victims into phishing traps designed to harvest passwords.

Identifying Self-Spoofing:

  • Check the Origin: Verify unusual or unexpected emails, even if they appear to come from your domain.
  • Beware of Direct Links: Authentic company requests typically don't ask you to input login details through email links.

Augmenting Email Security Measures

Beyond education, advanced email security tools play a pivotal role in protecting against scams. These systems filter incoming emails for suspicious attachments or links and can alert users to potential impersonation attempts.

Actionable Steps for Enhanced Security:

  • Regular Training Sessions: Incorporate cybersecurity training into your regular staff development programs. Learn more about ComTech's free Cyber Hero training for you and your staff below.
  • Adopt Advanced Security Solutions: Explore email security tools that offer real-time scanning and threat detection capabilities.

Your Path to a Secure Inbox

The battle against email scams is ongoing, but with informed strategies and the right tools, businesses can significantly reduce the risk of falling victim to a cybercriminal. Remember, vigilance and education are your best allies in the fight against phishing and impersonation scams.

ComTech's Initiative: Free Cybersecurity Training


Recognizing the importance of cybersecurity education, ComTech is rolling out a Cyber Hero training for your office and staff members. This is a half-day free training offers a half-day free training session. This training is designed to equip you and your staff with the knowledge and skills to identify and protect against various cyber threats. If you would like to learn more, send an email to Cyberhero@comtechnc.com.

If you're seeking more in-depth insights or need personalized assistance, please visit our Contact Us Page and fill out the form and our team will be happy to help you.

Windows 10 End-Of-Life Is Coming:
What is it & why should NC businesses care?

FREE DIGITAL GUIDE


Download this FREE report now to find out how these cutting-edge solutions can save you time, streamline operations, and give you a competitive edge.