To many, email scams have become a joke. Sitcoms have throwaway punchlines that reference a character getting an email from a rich uncle in Nigeria, or some friend needing funds to get home from an overseas trip. One of these scams may not at first seem to be amusing, as it threatens the recipient’s life, but if read further, proves to be quite the drama.
TREES PLANTED: 771
Last Updated: 2/1/2021
Mobile? Grab this Article!
Tip of the Week Security Technology Business Computing Best Practices Productivity Data Software Network Security IT Support User Tips Innovation Hackers Hardware Privacy Collaboration Workplace Tips Computer Efficiency Google Cybersecurity Internet Data Backup Android Phishing Small Business Communications Business Email Data Recovery IT Services Hosted Solutions Mobile Device Tech Term Business Management Cloud Backup Communication Malware Covid-19 Smartphone Microsoft Office Managed IT Services Quick Tips Network VoIp Windows 10 Smartphones Users Managed Service Outsourced IT Microsoft Social Media Cloud Computing Information Business Technology Mobile Devices Ransomware Internet of Things Upgrade Blockchain Saving Money Facebook Disaster Recovery Artificial Intelligence Passwords Windows Server BDR Browser Conferencing Access Control Holiday Miscellaneous Spam Patch Management Data Security Automation Vendor Remote Remote Work Apps Alert IT Management Data Management Two-factor Authentication Mobile Office Encryption Gadgets Operating System Data loss Cybercrime Managed Services Government Office 365 Apple Applications Cost Management Managed Service Provider Bandwidth Mobile Device Management Wi-Fi Networking VPN App Scam Augmented Reality Vulnerability Free Resource Help Desk Healthcare Virtualization Data Breach Websites Maintenance Vendor Management Windows 7 Antivirus Vulnerabilities Hard Drive Information Technology Project Management Computing Big Data Update Voice over Internet Protocol Save Money Budget Business Continuity Remote Monitoring Analytics Integration WiFi Telephone Social Engineering Retail Bitcoin Employees Multi-factor Authentication Printer Laptop Video Conferencing Managed Services Provider Virtual Assistant Gmail Monitoring YouTube Document Management BYOD Downloads Router Digital Computers History Managed IT Employer/Employee Relationship Tech Terms Hacking Processor Professional Services Display Word Meetings Employee/Employer Relationship Search Saving Time Compliance Managed IT services Health Holidays How To Mobility Software as a Service Solutions Google Maps Cryptocurrency iPhone Data Protection Images 101 Cooperation Start Menu Identity Theft Screen Reader Browsers Managed IT Service Remote Working Cortana Accountants Going Green Security Cameras CrashOverride Virtual Desktop Software License Gig Economy Virtual Machine Net Neutrality Unified Communications HTML Worker Virtual Machines Business Cards Wireless Headphones Proxy Server News Physical Security Running Cable Trend Micro Regulations Compliance Google Drive Google Calendar eWaste FinTech Legislation Content Medical IT Remote Workers Desktop Transportation Vendor Mangement Redundancy Training Download Social Network Social IT Assessment Audit Hypervisor Virtual Private Network Printing Machine Learning Teamwork Humor Time Management Knowledge Comparison Cleaning Fake News Digital Security Cameras Device security Paperless Office Microchip Cabling Tablet eCommerce Financial Data DDoS Robot Notifications Sports PowerPoint Solid State Drive Storage Computer Repair Risk Management Entertainment Customer Service Business Mangement Equifax Upload Customer Resource management Current Events Smart Devices SharePoint Hacker Procurement Excel Devices Network Management Management Tech Settings Memes Specifications Reviews Office Virus Videos Database How to Customer Relationship Management Telework Telephony Google Docs Organization Money Smartwatch Chromebook Data Analysis Private Cloud Hard Drive Disposal Startup Trends Telephone System Modem Access Value Electronic Health Records SaaS Computer Care Virtual Reality Nanotechnology Microsoft 365 IBM Licensing Supply Chain Management Password Legal Tip of the week Term Administration SQL Server IT Unified Threat Management Television Downtime End of Support Wasting Time Microsoft Excel Media Website Tactics Navigation VoIP Computing Infrastructure AI Emails Travel User Tip Uninterrupted Power Supply Distributed Denial of Service Mobile Technology CES Mobile Security Backup and Disaster Recovery Fileless Malware Avoiding Downtime Data Storage email scam Gamification Electronic Medical Records SSID Spyware Memory Surveillance Company Culture Bookmark Corporate Profile Flexibility Outlook Law Enforcement Regulations Service Level Agreement Error Google Play Azure Communitications Touchscreen Mouse Piracy Shopping Managing Costs Internet Service Provider Addiction Evernote Optimization Disaster Chrome Bluetooth Username Freedom of Information Twitter Directions Employer/Employee Relationships Cyber security PCI DSS Emergency Health IT Development Regulation Financial Thank You Multi-Factor Security 2FA Printers Congratulations Managing Stress Personal Information