To many, email scams have become a joke. Sitcoms have throwaway punchlines that reference a character getting an email from a rich uncle in Nigeria, or some friend needing funds to get home from an overseas trip. One of these scams may not at first seem to be amusing, as it threatens the recipient’s life, but if read further, proves to be quite the drama.
TREES PLANTED: 60
Last Updated: 2/1/2020
Mobile? Grab this Article!
Tip of the Week Security Technology Business Computing Best Practices Network Security Software Productivity Data IT Support Privacy Computer User Tips Hackers Hardware Data Backup Efficiency Tech Term Innovation Email Communications Cybersecurity Hosted Solutions Data Recovery Google Android Collaboration Internet Malware Managed IT Services Business Management Windows 10 IT Services Phishing Cloud Backup Business Outsourced IT Small Business Mobile Device Workplace Tips VoIp Microsoft Communication Smartphones Smartphone Ransomware Artificial Intelligence Network Cloud Computing Social Media Microsoft Office Server Mobile Devices Information Facebook Upgrade Access Control Business Technology Managed Service Alert Passwords Internet of Things Browser IT Management Two-factor Authentication Data Management Automation Holiday Data loss BDR Conferencing Cybercrime Apple Blockchain Applications Apps Government Office 365 Managed Service Provider Mobile Device Management Quick Tips Cost Management Patch Management Vulnerability Update Miscellaneous Data Breach Operating System Disaster Recovery Websites Maintenance Vendor Antivirus Users Analytics Project Management App Healthcare Gadgets Vulnerabilities Bandwidth Big Data Saving Money Windows Spam Data Security Hard Drive Remote Monitoring Scam Encryption VPN Social Engineering iPhone Virtualization Bitcoin Cooperation Augmented Reality Gmail Computers Telephone Virtual Assistant Retail Save Money Data Protection Document Management Managed Services Provider Tech Terms Start Menu Managed IT Managed IT services Downloads Help Desk Hacking Monitoring Laptop Vendor Management Windows 7 Software as a Service Professional Services Google Maps Processor Mobility Digital Saving Time Business Continuity Computing History Voice over Internet Protocol Networking Multi-factor Authentication Printer Word Search Managing Costs Machine Learning Google Drive Bookmark Solutions Software License Administration Optimization Cleaning Error Google Play WiFi Cortana IBM Paperless Office Vendor Mangement Redundancy Business Cards Cyber security BYOD Audit Evernote Unified Communications Uninterrupted Power Supply Device security Health IT Google Calendar eWaste Managed IT Service Equifax Upload Time Management Knowledge Directions Employer/Employee Relationships News Spyware Mobile Office Virtual Desktop Corporate Profile Virtual Machine Devices Network Management DDoS Browsers Integration Virtual Machines Security Cameras Database Business Mangement Proxy Server Comparison Trend Micro Printing Medical IT Robot Startup Trends Fake News Free Resource IT Assessment Chromebook Hypervisor Compliance Telephony Transportation SharePoint CrashOverride Teamwork Humor Virtual Reality Nanotechnology Virus Social Network Social Website Tactics Specifications Worker eCommerce Emails Travel SaaS Computer Care Excel Storage Sports PowerPoint Google Docs Running Cable Managed Services Gamification Unified Threat Management Microchip Current Events Smart Devices Mobile Security Backup and Disaster Recovery Password Hard Drive Disposal Hacker Regulations Service Level Agreement VoIP Entertainment Customer Service Money Information Technology Employer/Employee Relationship Memes Company Culture Customer Resource management Router Display Addiction Television Downtime YouTube Customer Relationship Management Bluetooth Username Management Tech Legal Tip of the week Outlook Computing Infrastructure Cabling Tablet Meetings Touchscreen Microsoft Excel Solid State Drive Value Electronic Health Records Twitter email scam Licensing Accountants Going Green Disaster Data Analysis Private Cloud Distributed Denial of Service Mobile Technology SQL Server IT Identity Theft Screen Reader Telephone System Modem Wasting Time HTML Emergency Microsoft 365 Mouse Piracy Settings Holidays Wireless Headphones Term Law Enforcement User Tip Budget How to How To Legislation Content Navigation Cryptocurrency Memory Electronic Medical Records SSID Wi-Fi Training Download Fileless Malware Avoiding Downtime Freedom of Information Access Azure Communitications Desktop Printers Thank You Personal Information Regulation Congratulations Financial Multi-Factor Security Managing Stress Surveillance