Scammers have become more sophisticated, due to recent, high profile-data breaches that have exposed unprecedented amounts and detail of personal information including but not limited to previous and current home addresses, passwords, phone numbers, social security numbers and even information on family members. A recent example even uses the recipients’ street addresses to include photos of their homes obtained from the internet. Scammers are using this data to increase the apparent legitimacy and credibility of their emails.

These attacks are targeted to both business and personal accounts and it’s important to stay vigilant. Remember you are the best line of defense.

Indicators of a targeted scam-

  • Suspicious Senders: The email might appear to come from one of your own addresses, management team, vendor etc.
  • Technical Jargon: They can claim to have installed spyware or other methods to have gained access to your computer.
  • Critical or Threatening language: They can create a sense urgency or anxiety by claiming to be a business emergency or to have evidence of embarrassing or inappropriate activities that will be disclosed if you don’t take quick action
  • Unexpected content: The email will often include a clickable link or file attachment, grammar and spelling mistakes, requests for personal information and/or offers “to good to be true”

How to Handle These Emails

  • Avoid Rushing: Take your time to think through the email and avoid the sense of urgency the scammer is working to create.
  • Do Not Respond to the email: Replying may encourage the scammer to continue contacting you.
  • Change Passwords: If your password is mentioned, change it immediately.
  • Do Not Open Attachments or click on links: Especially if the email is from a suspicious source or appears to be from yourself.
  • Verify: If in doubt contact the apparent sender directly, by phone, not email, (especially a co-worker, manager, family member or vendor) to determine if they indeed sent the email.
  • Delete the Email: Delete the email and notify your IT department if you have concerns.