Another day, another inbox full of unsolicited emails. Who is sending these messages, and why? Spam and phishing emails are similar in that both clog up your inbox with unwanted messages, but they have different agendas and pose dramatically different
risks to you and your security. Here is everything you need to know about the differences between them and what you need to do to protect yourself.
Spam is probably the more common type of unwanted email you'll find in your inbox. It's the electronic equivalent of getting ads, postcards, and other bulk mailers in your mailbox for businesses or services that you may have no interest in. If you've been unlucky enough to find your way onto a list somewhere, you may even get a dozen (or more!) a day, but as newer lists are distributed they should taper off.
Genuine spam is annoying but relatively low risk, especially if you know enough to delete the emails without clicking on anything. The real danger is spam's close cousin, the phishing email.
Spam may be low risk, but it is annoying. Here are a few ways to keep it to a minimum.
Whereas spam emails are mainly just hoping to sell something to someone, phishing emails are actually trying to steal sensitive information from you. They often masquerade as messages from friends or businesses you already know and trust. You may even see phishing attempts via social media platforms such as Facebook.
A phishing attempt is intended to look convincing enough to get you to click on a link. You'll be taken to a page that looks like a site you trust, but is actually controlled by the scammer. The page may prompt you to enter sensitive information, such as login information, and/or download malware or viruses onto your computer.
Related post: 5 most common types of ransomware
Phishing can represent a serious security risk. Submitting sensitive information such as login credentials can result in anything from account takeover to identity theft. Likewise, malware can gain control of your computer and allow access to anything you have stored on it, from passwords to financial documents.
The best way to protect yourself is by never clicking unless you're sure. If it's an email purportedly concerning an account you have, go directly to the website and search for information there. Even social media links should be treated with caution. Hover your mouse over the link to see where it goes, and avoid links to unfamiliar websites. When in doubt, check Google!
Technology improves constantly, but as it does, so do efforts to exploit it.
Don’t trust your company’s critical data and operations to just anyone! This business advisory guide will arm you with 21 Revealing Questions you should ask any computer consultant before giving them access to your network.