How to Handle Extortion Emails Safely
We recently received a report of an extortion email, which
claims unauthorized access to your computer or private data and attempts to
coerce payment. These types of emails are scams designed to instill fear and
provoke a response. Please follow the steps below to ensure your safety:
Steps to Handle Extortion Emails:
- Do
Not Respond or Pay:
- Do
not reply to the email, engage with the sender, or pay any amount they
request. Paying encourages more scams.
- Avoid
Clicking Links or Downloading Attachments:
- These
could contain malware or phishing attempts. Never click on any links or
open attachments in suspicious emails.
- Verify
Claims:
- Extortion
emails often make false claims, such as having access to your computer,
passwords, or compromising videos.
- If
you're concerned, run a full system antivirus scan to check for threats.
- Change
Your Passwords:
- If
the email includes a password you recognize, change it immediately. Use a
strong, unique password for every account. Consider enabling two-factor
authentication for added security.
- Report
the Email:
- Forward
the suspicious email to our IT support team at PCSupport@VantageApparel.com. This helps us track and mitigate potential risks.
- Block
the Sender:
- Mark
the email as spam and block the sender in your email client to prevent
further messages.
- Stay
Informed:
- Familiarize
yourself with phishing and extortion tactics. When in doubt, consult the
IT team or cybersecurity resources.
What We’re Doing to Protect You:
Our IT department continuously monitors for potential
threats and employs advanced tools to safeguard your data and devices. If you
suspect unusual activity or need assistance, do not hesitate to contact us.
Related Articles
How to Check and Release Legitimate Emails from Outlook Online Junk Folder and MS Exchange Quarantine
Purpose: This article provides instructions for Vantage Apparel employees on how to effectively manage and release legitimate emails that have been mistakenly placed in the Outlook Online Junk Folder and Microsoft Exchange Quarantine. Scope: This ...
ZohoMac Remote
Remotely control Mac devices above 10.14 With the privacy restrictions in Mac devices of version 10.14 and above, accessibility and screen recording permissions to the computer is denied by default. Hence, Zoho Assist wouldn't have sufficient ...
User Instructions for Applying Sensitivity Labels at Vantage Apparel
-------------- General instructions ---------------- Introduction to Sensitivity Labels At Vantage Apparel, we are committed to safeguarding our sensitive information. Sensitivity labels help us classify and protect our data based on its content and ...
Instructions on Email Archiving in MS365
Instructions for End Users on Email Archiving in MS365. Overview We are introducing an email archiving policy to help manage mailbox sizes and ensure optimal performance. This policy will automatically move older emails to an archive folder based on ...
How to Share Large Files with External Users Using OneDrive or SharePoint
Sharing large files with external users can be a smooth and secure process using OneDrive or SharePoint. At Vantage Apparel, we prioritize security and customer data privacy, utilizing sensitivity labels in MS365 to ensure data protection. Here’s a ...