Page 62 - LIN APRIL All Pages
P. 62

Malicious Email Rules Steal Your Inbox








                               mail rules are used to help manage an   Your best defense is to never click on a link or open an
                               inbox. But they can also be used to   attachment in an unsolicited, or unexpected email. If you should
                         Ehave your incoming mail copied and       receive an email with a link or attachment, contact the sender,
                         sent to a third party. All without you even   preferably by phone, and confirm that person sent the email. If you
                         knowing what’s happening.                 are unable to call the person, forward the email to him or her. Do
                            Email rules are found in the settings of   NOT reply to the email as you could be replying to the criminal.
                         your email provider. They work using the if-  When in doubt, do not click. Simply delete the email.
                         then principle. If this happens, then do this.   To see if you’ve already been infected, check for email rules
        by Carrie Kerskie  For example, if you could create an email rule   in the settings for your email provider. If you see any that you, or
        that says to move incoming emails from a specific contact into a   your IT department, didn’t set up, delete them. It’s a good idea to
        specific folder. However, criminals are inserting email rules that   periodically check the settings as this malicious phishing scam is
        instruct your email provider to send a copy of all of your incoming   impossible to detect otherwise.
        email to them, or a third-party.                              If you have questions or would like assistance, contact Kerskie
           How does this happen? Typically, it begins by you receiving   Group at 239-435-9111 or CarrieKerskie.com.
        a phishing email from someone you know. In the email is a link
        or an attachment. When you click on either one it triggers a   Carrie Kerskie is a professional speaker on cyber awareness culture
        fake email login screen to appear. When you enter your login   and identity fraud. She’s the president of Kerskie Group, providing
        credentials that enables the criminal to install the new email rule   white-glove identity fraud restoration and risk management for
        or rules. Often, there is a second rule that says to move all mail   high-net-worth families and individuals. Carrie is also a member of
        from the contact, the person that supposedly sent you the email,   the Collier Identity Fraud Awareness Community Task Force.
        to the archive folder. This is done to prevent you from seeing any
        email from this contact. This lessens the chance that contact can
        warn you about the scam.







     62                                                                                                       Life in Naples | April 2022
   57   58   59   60   61   62   63   64   65   66   67