To many, email scams have become a joke. Sitcoms have throwaway punchlines that reference a character getting an email from a rich uncle in Nigeria, or some friend needing funds to get home from an overseas trip. One of these scams may not at first seem to be amusing, as it threatens the recipient’s life, but if read further, proves to be quite the drama.
TREES PLANTED: 268
Last Updated: 6/27/2020
Mobile? Grab this Article!
Tip of the Week Security Technology Business Computing Best Practices Productivity Network Security IT Support Software Data User Tips Hackers Privacy Collaboration Hardware Innovation Computer Data Backup Efficiency Cybersecurity Google Tech Term Hosted Solutions Communications Data Recovery Android Email Internet Malware Small Business Managed IT Services Business Management Phishing Cloud IT Services Workplace Tips Windows 10 Backup Business Communication Outsourced IT Network Microsoft Office Mobile Device VoIp Social Media Business Technology Cloud Computing Microsoft Smartphone Smartphones Server Quick Tips Mobile Devices Ransomware Artificial Intelligence Access Control Users Upgrade Information Managed Service Facebook Two-factor Authentication Internet of Things Browser IT Management Automation Data Management Apps Alert Passwords Holiday Mobile Device Management Vendor Managed Service Provider Blockchain Cybercrime Data loss Government Spam Patch Management Data Security Office 365 Encryption Conferencing BDR Apple Disaster Recovery Applications Cost Management Remote Work App Gadgets Project Management Augmented Reality Big Data Healthcare Windows Saving Money Business Continuity Hard Drive VPN Data Breach Vendor Management Windows 7 Vulnerabilities Scam Vulnerability Update Computing Operating System Covid-19 Voice over Internet Protocol Websites Maintenance Bandwidth Analytics Antivirus Miscellaneous Remote Monitoring Cooperation Social Engineering Telephone Bitcoin Integration Meetings Laptop Retail Software as a Service Virtual Assistant Gmail Multi-factor Authentication Printer How To Google Maps Monitoring Digital Help Desk Document Management Downloads History Virtualization Hacking Mobile Office Search Word Processor Information Technology Computers Professional Services Saving Time Managed Services Provider Mobility Managed IT services Data Protection Save Money Start Menu Managed IT Solutions Managed Services Budget Networking Tech Terms iPhone SaaS Computer Care Bluetooth Username Health IT Display WiFi Office Cortana Addiction Directions Employer/Employee Relationships Customer Relationship Management Telework Software License Worker Security Cameras Value Unified Communications Electronic Health Records Password Twitter Browsers Employee/Employer Relationship Business Cards Running Cable Unified Threat Management SQL Server IT News Identity Theft Screen Reader Proxy Server Licensing Google Calendar Supply Chain Management eWaste VoIP Accountants Going Green YouTube Wireless Headphones Medical IT Wasting Time Health HTML Holidays Legislation Content Social Network Social Memory Printing Surveillance Solid State Drive Outlook Transportation Comparison Data Storage Cabling Tablet Touchscreen FinTech Azure Communitications Fake News Desktop Wi-Fi Flexibility Robot Disaster Training Download Optimization SharePoint Settings Cleaning Sports PowerPoint Managing Costs Internet Service Provider Emergency Machine Learning Microchip BYOD Customer Resource management Router Development Excel Device security Paperless Office Entertainment Customer Service Cyber security Specifications PCI DSS How to Notifications Management Tech Virtual Desktop Access Managed IT Service Google Docs Remote Working Equifax Upload Virtual Machines Money Administration Virtual Machine Net Neutrality Hard Drive Disposal IBM Google Drive Devices Network Management Audit Telephone System Modem Legal Video Conferencing Tip of the week Uninterrupted Power Supply Vendor Mangement Redundancy Database Data Analysis Private Cloud Trend Micro Television Regulations Compliance Downtime Trends Term Free Resource IT Assessment Microsoft Excel Spyware Chromebook Microsoft 365 Computing Infrastructure Time Management Knowledge Startup Navigation Teamwork Humor Distributed Denial of Service Mobile Technology Virtual Reality Nanotechnology User Tip Hypervisor Virtual Private Network email scam Corporate Profile DDoS Compliance Emails Travel Electronic Medical Records SSID Storage Law Enforcement Computer Repair Business Mangement Website Tactics Fileless Malware Avoiding Downtime eCommerce Mouse Financial Data Piracy Gamification Error Google Play Current Events Smart Devices Cryptocurrency Mobile Security Backup and Disaster Recovery Bookmark Evernote Employer/Employee Relationship Memes Freedom of Information CrashOverride Virus Company Culture Hacker Procurement Telephony Regulations Service Level Agreement Managing Stress Regulation Personal Information Financial Thank You Congratulations Multi-Factor Security Printers