Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.
Mobile? Grab this Article!
Tip of the Week Security Technology Productivity Best Practices Data Business Computing Privacy Network Security IT Support Malware Internet Tech Term Efficiency Managed IT Services IT Services Data Backup Hosted Solutions Hackers Email User Tips Computer Software Business Cloud Phishing Microsoft Mobile Devices Cloud Computing Innovation Windows 10 Data Recovery Workplace Tips Cybersecurity Ransomware Hardware Managed Service Android Outsourced IT Backup Upgrade Collaboration Google Small Business Business Management Communication Smartphones Server Office 365 Data Management Quick Tips Encryption Scam Smartphone Browser Network Remote Monitoring Paperless Office Miscellaneous VoIp Communications Business Technology Laptops Artificial Intelligence IT Management Holiday Government Virtualization Wi-Fi Maintenance Processor BDR Microsoft Office Saving Money Managed Service Provider Blockchain Vulnerability Tip of the week Avoiding Downtime Disaster Recovery Passwords Healthcare Antivirus Windows Windows 7 Bandwidth Chrome Automation Employer-Employee Relationship Compliance Mobile Device Alert Information BYOD OneDrive Social Media Document Management Applications Save Money Website Machine Learning VPN Business Continuity Managed IT Infrastructure Help Desk Internet of Things Facebook Users Gadgets Network Management Social Network Data loss Employee-Employer Relationship Augmented Reality Virtual Private Network Dark Web Server Management Networking Tablet Router Payment Cards Financial Storage Bring Your Own Device Data Security HIPAA Management Managed Services Settings Cooperation Access Control File Sharing Company Culture Identity Theft Password RMM Word Managing Stress How To Recycling Electronic Health Records Information Technology GDPR Black Friday IT Technicians Enterprise Content Management Authentication WiFi The Internet of Things Consulting Analytics Outlook Outsourcing eWaste Office Samsung Batteries Cybercrime Training Motherboard Sensors Nanotechnology Search Theft think Legislation Twitter Vendor Management Malicious Cables Human Error User Error Electronic Medical Records Solid State Drives Two-factor Authentication Licensing Wireless Holidays Apps Cyber Monday Mirgation Unified Communications Authorization Touchscreen Security Services Travel Mobile Security Co-Managed IT IoT Managed Services Provider Shortcut Mouse Wearable Technology Meetings Bookmarks Transportation Value of Managed Services YouTube App Remote Workers 5G Hard Drive Files Mail Merge Wasting Time Projects Wires Websites Operating System Options Multi-Factor Security IT Patch Management Notes Viruses Employees Windows 10 Permission MSP Virtual Reality Optimization Star Wars E-Commerce Computing Video Conferencing Favorites VoIP Modem Utility Computing Screen Reader CrashOverride Social Wireless Internet Cache Read Only Address Database Return on Investment Microsoft Excel Regulations Telephone Systems Statistics Downtime knowb4 IT Assessment Better Business Firefox PowerPoint Display Distributed Denial of Service Remote Computing Memphis Chromebook Remote Monitoring and Management Test Virtual Machines Cost Management Features Comparison Instant Messaging Lenovo Teamwork Vendor Permissions File Management Big Data Smart Tech Monitoring Risk Management Security Cameras Employer/Employee Relationships Digitize Voice over Internet Protocol Personal Information Spam Firewall Regulation Bluetooth Mobile Device Management avengers Google Calendar Staff Professional Services Bitcoin Managed IT Service Chatbots Google Maps Vulnerabilities Zero-Day Threat Heating/Cooling Techology Manufacturing Point of Sale Computing Infrastructure Credit Cards Assessment Database Management Specifications Tech Support Customer Service Finance Time Management Superfish Shared resources Fraud Cyber security Politics Connectivity Private Cloud Shadow IT Net Neutrality Going Green Social Networking Smart Devices Unified Threat Management Monitors Cookies OneNote Spyware Tech Terms endgame Gmail Valentine Current Events Break Fix Identity Development Servers Unified Threat Management Hard Disk Drives Downloads Alerts Computers Internet Exlporer ROI IT service Flexibility Solid State Drive Hosted Solution Disaster Google Drive Data Storage Cyberattacks Proactive Work/Life Balance Remote Working Hard Disk Drive GPS Web Server Uninterrupted Power Supply Staffing Customer Relationship Management Education Remote Worker IBM How to Smart Technology G Suite Budget Printer Motion Sickness Hotspot Tracking Robot Cameras Apple Students Cleaning Peripheral Corporate Profile Data storage Covid-19 Language Thank You Physical Security Gamification Digital Cabling Printers Computer Care Data Breach WannaCry Taxes Health IT Support SharePoint Congratulations CCTV Mobile Office SaaS Emergency PCI DSS Digital Payment IT Consultant Content Filtering Remote Work Managed IT Services Recovery Money