Page 62 - LIN APRIL All Pages
P. 62
Malicious Email Rules Steal Your Inbox
mail rules are used to help manage an Your best defense is to never click on a link or open an
inbox. But they can also be used to attachment in an unsolicited, or unexpected email. If you should
Ehave your incoming mail copied and receive an email with a link or attachment, contact the sender,
sent to a third party. All without you even preferably by phone, and confirm that person sent the email. If you
knowing what’s happening. are unable to call the person, forward the email to him or her. Do
Email rules are found in the settings of NOT reply to the email as you could be replying to the criminal.
your email provider. They work using the if- When in doubt, do not click. Simply delete the email.
then principle. If this happens, then do this. To see if you’ve already been infected, check for email rules
by Carrie Kerskie For example, if you could create an email rule in the settings for your email provider. If you see any that you, or
that says to move incoming emails from a specific contact into a your IT department, didn’t set up, delete them. It’s a good idea to
specific folder. However, criminals are inserting email rules that periodically check the settings as this malicious phishing scam is
instruct your email provider to send a copy of all of your incoming impossible to detect otherwise.
email to them, or a third-party. If you have questions or would like assistance, contact Kerskie
How does this happen? Typically, it begins by you receiving Group at 239-435-9111 or CarrieKerskie.com.
a phishing email from someone you know. In the email is a link
or an attachment. When you click on either one it triggers a Carrie Kerskie is a professional speaker on cyber awareness culture
fake email login screen to appear. When you enter your login and identity fraud. She’s the president of Kerskie Group, providing
credentials that enables the criminal to install the new email rule white-glove identity fraud restoration and risk management for
or rules. Often, there is a second rule that says to move all mail high-net-worth families and individuals. Carrie is also a member of
from the contact, the person that supposedly sent you the email, the Collier Identity Fraud Awareness Community Task Force.
to the archive folder. This is done to prevent you from seeing any
email from this contact. This lessens the chance that contact can
warn you about the scam.
62 Life in Naples | April 2022