Manage My IT Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Posted by on in IT Blog

Is your Business a Victim of Email Spoofing?

Is your email sending out mass-mail spam messages? Have you ever received a complaint about sending unsolicited ads or obvious spam messages? Have you ever received bounced emails by the boatload that look like they have been sent from your own account, even though you know you didn't send them?

If you are in the above situation, it is likely your email is being spoofed. Email spoofing is where spammers try to trick spam filters by making spam look like it comes from a legitimate address. They do this by manipulating the email header to display your email in the "from" address, hence why you get bounces back and others believe the junk mail is coming from you.

This isn't the same as having your email compromised, which is where spammers can actually get into your email account with your password and create havoc. While it's a good practice to change your email password if you notice something fishy, spoofing doesn't need access to your account to get in. Spammers do this because an email is much more likely to get attention if it's from a recognized sender.

What To Do To Resolve Email Spoofing

In some cases, an experienced IT technician can investigate the header of the email and determine the true origin. This won't typically catch the spammer, but it will point the technician to the internet service provider. At that point, the next course of action is to reach out to that ISP and have that IP blocked. This doesn't mean you won't be targeted again; the spammer could simply reinitiate the spoofing process from a computer on a different IP, and you'd need to hunt them down all over again.

Prevention Goes a Long Way

It's very difficult to stop spoofing attacks permanently - businesses need to take action to prevent them. Be aware of phishing attacks (spam emails that link to fake pages meant to look like legitimate website login pages) and ensure you are keeping your anti-malware and antivirus software up-to-date. Unfortunately, it actually doesn't take any negligence to open yourself up to email spoofing, spammers just need to know your email address.

Using throwaway email addresses for signing up for accounts is a good way to keep this in check. Use your main email only for correspondence with people, and have a couple email accounts specifically for different accounts on the web. For example, setting up a social@ email for social networks like Facebook and Twitter, or create throwaway accounts for signing up for sites that you don't completely trust. It isn't to say that the websites you sign up for are spoofing your email, but if hackers gain access to your login data for that site, or if the site shares your personal information, it's possible your email could get into the wrong hands.

If you suspect that your email is compromised or spamming others, contact us at Manage My IT at 888-505-2880.

Last modified on
Tagged in: Email Security

Steve Copeland- A small business owner like you, Copeland has been involved with startups since 1999 most famously Adforce and Winfire FreeDSL, prior to that he was an engineer at the now defunct Cabletron Systems. After being the Projects Practice Director at a large MSP Steve Copeland left and formed his own company Manage My IT.

Comments

  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Thursday, 28 August 2014

EasyBlog Archive

Tag Cloud

Excel Business Continuity Communication Business Intelligence Small Business Privacy Mouse Outsourcing eBay Twitter Tools Information Technology Webinar Touchscreen Business Trending Internet Microsoft Operating System Efficiency Unified Threat Management Android PC Care Tech Support Google Text Messaging IT Issues Technology Scam Hard Drives Server IT Consultant Computer Accessories Managed Service Provider Going Green Smartphones Mobile Devices Current Events Saving Money Network Spam Business Management Lithium-ion Battery Inbound Marketing Maintenance Users The Internet of Things Help Desk Webcam User Tips Marketing Data Mobile Device Management Augmented Reality Bring Your Own Device Mobile Computing Passwords Fax Server Mobile 3D Backup Congratulations Software Gaming Console Remote Monitoring Digital Payment Computer Windows 8 Thank You Workplace Tips Scheduling Social Networking Point of Sale Leadership Quick Tips Smartphone Apple WiFi PowerPoint Browser Gadgets Email Piracy Best Practices Phone System Social Alerts Firewall Application Facebook Avoiding Downtime App Saving Time Vendor Management IT Services Hardware Innovation Health Customer Relationship Management Cloud VOIP Upgrade Web Marketing User Error Analytics Conferencing Mobile Office History Business Computing Security Best Practice VPN Microsoft Office Miscellaneous Outlook Streaming Media Virtualization Windows Hosted Solutions IBM Holiday Social Media iPhone Humor Macro Printer Virus Computer Repair Tutorials Disaster Recovery

Mobile: Grab This Article

Login

Sign Up for Our Newsletter

Twitter

Latest Blog Entry

b2ap3_thumbnail_cgoogle_wallet_credit_cards_on_your_phone_400.jpg
Google Wants to Know, “What’s in Your Wallet?”
IT Blog
We have been sharing different blog articles featuring some of the best digital financial solutions like Square Cash, PayPal, and Coin, and like so ma...
Continue Reading...

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at Manage My IT!

Read more...

Contact Us

Learn more about what Manage My IT can do for your business.

IT Support

Call us today 888-505-2880

3420 Bristol Street 6th Floor
Costa Mesa, California 92626

1100 Glendon Avenue 17th Floor
Los Angeles, California 90024

IT Support Los Angeles Network Services Los Angeles Tech Support Los Angeles Managed IT Services Los Angeles