To many, email scams have become a joke. Sitcoms have throwaway punchlines that reference a character getting an email from a rich uncle in Nigeria, or some friend needing funds to get home from an overseas trip. One of these scams may not at first seem to be amusing, as it threatens the recipient’s life, but if read further, proves to be quite the drama.
TREES PLANTED: 540
Last Updated: 11/2/2020
Mobile? Grab this Article!
Tip of the Week Security Technology Business Computing Best Practices Productivity Software Data Network Security IT Support Hackers Collaboration Innovation User Tips Privacy Google Hardware Efficiency Computer Cybersecurity Data Backup Email Android Hosted Solutions Communications Tech Term Data Recovery Phishing Internet Workplace Tips Small Business Business Management Cloud IT Services Malware Mobile Device Backup Business Network Managed IT Services Windows 10 Smartphone Communication VoIp Outsourced IT Smartphones Quick Tips Microsoft Office Managed Service Microsoft Covid-19 Social Media Users Mobile Devices Cloud Computing Business Technology Information Ransomware Upgrade Artificial Intelligence Server Passwords Disaster Recovery Facebook Internet of Things Browser Blockchain Access Control Windows Alert Conferencing BDR Holiday Two-factor Authentication Apps Automation IT Management Data Management Data loss Miscellaneous Cost Management Data Security Spam Patch Management Encryption Remote Work Apple Vendor Operating System Applications Gadgets Cybercrime Saving Money Mobile Device Management Government Managed Service Provider Office 365 Business Continuity Remote Update Scam VPN Data Breach Vulnerability Networking Save Money Remote Monitoring Analytics Healthcare Help Desk Websites Maintenance App Antivirus Bandwidth Augmented Reality Vendor Management Windows 7 Project Management Wi-Fi Computing Big Data Voice over Internet Protocol Hard Drive Vulnerabilities Mobile Office iPhone Video Conferencing Managed Services Provider Virtualization BYOD Cooperation Telephone Integration Mobility Computers Retail Data Protection Budget Managed Services Start Menu Display Managed IT services Monitoring Social Engineering WiFi Meetings Employee/Employer Relationship Bitcoin Tech Terms Laptop Managed IT Health Gmail Virtual Assistant Processor How To Professional Services Document Management Saving Time Downloads Digital History Hacking Software as a Service Google Maps Multi-factor Authentication Printer Word Information Technology Solutions Search Machine Learning Evernote IBM Television Downtime Trend Micro Regulations Compliance Cleaning Legal Administration Tip of the week Emergency Employer/Employee Relationships Uninterrupted Power Supply Computing Infrastructure Health IT Microsoft Excel Free Resource IT Assessment Device security Paperless Office Directions Notifications Hypervisor Virtual Private Network Equifax Upload Security Cameras Distributed Denial of Service Mobile Technology Teamwork Humor Browsers Spyware email scam Devices Network Management Corporate Profile Mouse Piracy eCommerce Financial Data Proxy Server Law Enforcement Google Drive Storage Computer Repair Reviews Audit Medical IT Cryptocurrency Vendor Mangement Current Events Redundancy Smart Devices Database Organization Time Management Hacker Knowledge Procurement Startup Trends Social Network Social Freedom of Information Employer/Employee Relationship Memes Chromebook Transportation DDoS Office Compliance Software License Customer Relationship Management Telework Virtual Reality Nanotechnology CrashOverride Cortana Microchip Business Cards End of Support Emails Travel Sports PowerPoint Worker Unified Communications Business Mangement Value Electronic Health Records Website Tactics eWaste AI Licensing Supply Chain Management Gamification Customer Resource management Router Running Cable News SQL Server IT Mobile Security Backup and Disaster Recovery Entertainment Customer Service Google Calendar Telephony Wasting Time Regulations Service Level Agreement Management Tech Virus Holidays Company Culture Comparison SaaS Computer Care Data Storage Bluetooth Username Printing YouTube Memory Surveillance Addiction Solid State Drive Robot Chrome Unified Threat Management Flexibility Telephone System Modem Cabling Tablet Fake News Password Azure Communitications Twitter Data Analysis Private Cloud VoIP Managing Costs Internet Service Provider Accountants Going Green Term SharePoint Optimization Identity Theft Screen Reader Microsoft 365 Navigation Specifications Cyber security PCI DSS Wireless Headphones User Tip Settings Excel Development HTML Google Docs Employees Touchscreen Managed IT Service Remote Working Legislation Content Electronic Medical Records SSID How to Outlook Virtual Desktop Fileless Malware Avoiding Downtime FinTech Virtual Machine Disaster Net Neutrality Training Download Error Google Play Money Virtual Machines Desktop Bookmark Access Hard Drive Disposal Printers Financial Thank You Regulation Congratulations Multi-Factor Security Shopping Managing Stress Gig Economy Personal Information