How to Handle Extortion Emails Safely

How to Handle Extortion Emails Safely

We recently received a report of an extortion email, which claims unauthorized access to your computer or private data and attempts to coerce payment. These types of emails are scams designed to instill fear and provoke a response. Please follow the steps below to ensure your safety:

 

Steps to Handle Extortion Emails:

  1. Do Not Respond or Pay:
    • Do not reply to the email, engage with the sender, or pay any amount they request. Paying encourages more scams.
  2. Avoid Clicking Links or Downloading Attachments:
    • These could contain malware or phishing attempts. Never click on any links or open attachments in suspicious emails.
  3. Verify Claims:
    • Extortion emails often make false claims, such as having access to your computer, passwords, or compromising videos.
    • If you're concerned, run a full system antivirus scan to check for threats.
  4. Change Your Passwords:
    • If the email includes a password you recognize, change it immediately. Use a strong, unique password for every account. Consider enabling two-factor authentication for added security.
  5. Report the Email:
    • Forward the suspicious email to our IT support team at PCSupport@VantageApparel.com. This helps us track and mitigate potential risks.
  6. Block the Sender:
    • Mark the email as spam and block the sender in your email client to prevent further messages.
  7. Stay Informed:
    • Familiarize yourself with phishing and extortion tactics. When in doubt, consult the IT team or cybersecurity resources.

 

What We’re Doing to Protect You:

Our IT department continuously monitors for potential threats and employs advanced tools to safeguard your data and devices. If you suspect unusual activity or need assistance, do not hesitate to contact us.

 


    • Related Articles

    • How to Check and Release Legitimate Emails from Outlook Online Junk Folder and MS Exchange Quarantine

      Purpose: This article provides instructions for Vantage Apparel employees on how to effectively manage and release legitimate emails that have been mistakenly placed in the Outlook Online Junk Folder and Microsoft Exchange Quarantine. Scope: This ...
    • ZohoMac Remote

      Remotely control Mac devices above 10.14 With the privacy restrictions in Mac devices of version 10.14 and above, accessibility and screen recording permissions to the computer is denied by default. Hence, Zoho Assist wouldn't have sufficient ...
    • User Instructions for Applying Sensitivity Labels at Vantage Apparel

      -------------- General instructions ---------------- Introduction to Sensitivity Labels At Vantage Apparel, we are committed to safeguarding our sensitive information. Sensitivity labels help us classify and protect our data based on its content and ...
    • Instructions on Email Archiving in MS365

      Instructions for End Users on Email Archiving in MS365. Overview We are introducing an email archiving policy to help manage mailbox sizes and ensure optimal performance. This policy will automatically move older emails to an archive folder based on ...
    • How to Share Large Files with External Users Using OneDrive or SharePoint

      Sharing large files with external users can be a smooth and secure process using OneDrive or SharePoint. At Vantage Apparel, we prioritize security and customer data privacy, utilizing sensitivity labels in MS365 to ensure data protection. Here’s a ...