Skip to main content

How to Report Spam Email

Information Technology Blog - - How to Report Spam Email - Information Technology Blog

Spam has become part of our everyday lives and can be quite annoying. It wastes time and resources. There are steps you can take to limit spam, similar to the way you would treat an annoying or uninvited telemarketing sales call.

If there is anyone at risk, it is our elderly population.  Please check out this Ultimate Safety Guide for Seniors for more information.

How to Reduce Spam

stop spamUse an Email Filter

Your online webmail or email client typically will have a built-in email junk filter or rules that can be set up. If you have a company email, ask your email administrator to help filter unwanted mail through your email client or company’s email firewall.

Limit Exposure

You might want to keep multiple email addresses for various activities; personal, work, shopping, signing up for coupons, newsletters, etc. Try not to display your email address on public sites and forums, and if you do, use an email address that you do not mind getting spam on.  Here are some ways on how to keep your information private and secure.

Be Careful of Where you Submit your Email Address

Check privacy policies before you submit your email address to a website. If the website looks spammy, try to avoid any involvement.

Choose a Unique Email Address

Spammers send out millions of emails to probably email name combinations such as info@, sales@, marketing@, etc. Use a unique email address if possible.

Avoid Email Scams and Follow Best Practices

Avoid email scams, phishing scams, etc. Here is one article describing what to look out for in trying to avoid email scams.  Be cautious of opening any attachments or downloading files from emails you receive.  Download free software only from sites that you know of and trust.

Phishing Scams

How to avoid scammed: Always look at the domain to make sure it matches the real website.  Sometimes domains might be skewed to look like the real one, so make sure it is is the domain that is supposed to be there.  If you are unsure, call the company’s support directly.  Do not click links, download files, or open attachments.   Never email personal or financial information and beware of links that ask for it.  Beware of popups and guard against them and spam.  Protect your computer with antivirus, firewall, spam filter, and anti-spyware software.  Check your online accounts and statements regularly and change your passwords as a precaution.

Award Scams

How to avoid scammed: Take note that if you didn’t enter, you didn’t win.  It is illegal to participate in foreign lotteries via mail/phone in the United States.  Also, if you win a lottery, you are not responsible for paying the taxes or fees directly to the government.

Report Spam Email

Forward unwanted or deceptive messages to:

  • to the Federal Trade Commission at spam@uce.gov. Be sure to include the complete spam email.
  • to your email provider
    • Gmail: Select the message you’d like to report. Click the spam button in the toolbar above your message list. (If you have the message open, you can also report it as spam by using the same button.)
    • Microsoft: Download Microsoft Junk E-mail Reporting Add-in for Microsoft Outlook
    • Outlook.com: In Outlook, select the offending message and click the Junk button to report the message in one action, or you may click the arrow next to the Junk button and select:
      • Junk for routine junk email.
      • Phishing scam for email that is trying to trick you into giving out sensitive personal information like passwords, bank accounts, or your Social Security number.
      • My friend’s been hacked! if you suddenly start getting junk email or phishing from a sender you would normally trust.
    • Yahoo: Select the email you’re reporting. Click the down arrow next to “Spam.” Click Report a Phishing Scam.
  • If you try to unsubscribe from an email list and your request is not honored, file a complaint with the FTC.

Report Phishing Pages

Phishing scams are part of the spammer issue and are sent out by spammers.  They enable spammers to gain control of your email account and other accounts to send more spam, steal your identity and perform other destructive behavior.  Always look at the domain to make sure it matches the real website.

Report Phishing pages to:

Related:
How to Avoid Email Scams
How to Protect Yourself Against Phishing Scams

Originally posted 2016-06-15 19:02:10. Republished by Blog Post Promoter

The post How to Report Spam Email appeared first on Information Technology Blog.



Udimi - Buy Solo Ads from Information Technology Blog https://ift.tt/2w05jrh
via IFTTT

Comments

Popular posts from this blog

9 VCs in Madrid and Barcelona discuss the COVID-19 era and look to the future

Spain’s startup ecosystem has two main hubs: Madrid and Barcelona. Most observers place Barcelona first and Madrid second, but the gap appears to close every year. Barcelona has benefitted from attracting expats in search of sun, beach and lifestyle who tend to produce more internationally minded startups. Madrid’s startups have predominantly been Spain or Latin America-focused, but have become increasingly international in nature. Although not part of this survey, we expect Valencia to join next year, as city authorities have been going all-out to attract entrepreneurs and investors. The overall Spanish ecosystem is generally less mature than those in the U.K., France, Sweden and Germany, but it has been improving at a fast clip. More recently, entrepreneurs in Spain have moved away from emulating success in pursuit of innovative technologies. Following the financial crisis, the Spanish government supported the creation of startups with the launch of FOND-ICO GLOBAL, a €1.5 billi...

Emulating USB Dongle – Introducing HASP Dongle Emulator Software

Information Technology Blog - - Emulating USB Dongle – Introducing HASP Dongle Emulator Software - Information Technology Blog Over the years the methods used by software developers and producers to limit the amount of users to a specific number in a licensing agreement have become more complex.  The aim of copy protection is to protect the intellectual rights and financial investment of the individual developers and manufacturing companies.   A way of getting around this protection is to reproduce the media through which you can deliver the application to other users,  meaning that the software can be replicated far in excess of that specified in the license. One of the most common methods has been to use hardware keys or dongles which will enable the user to activate an application, unlocking its full functionality without using a device.  In addition, it offers good protection against attempts to pirate the software. In this article, we will look at th...

Advantages and Disadvantages of using Vouchers in eCommerce

Information Technology Blog - - Advantages and Disadvantages of using Vouchers in eCommerce - Information Technology Blog To decide whether vouchers and coupons are the right tool to add to your online marketing strategy, it is essential that you consider the benefit and the cost of using coupons. In this article, we will use Gtech coupon marketing strategy as an example a successful coupon strategy.  Also check out these great books on coupon codes for ecommerce . Advantages of Using Coupons Increase Sales This is the obvious benefit. Coupons serve to increase sales especially for high ticket items such as luxury gadgets. Gtech discount codes is a good example as Gtech quality is reflected on the price of both the Gtech eBike and Gtech AirRam. In order to boost sales, the company releases 10% off offers certain times of the year when online sales would normally be low. Enlarge Email List Acquiring a customer can be expensive in terms of advertising and marketing. If yo...