Cybersecurity is top of mind for business. Protect yourself and your company by understanding email threats such as spam, spoofing, phishing, hoaxes and more.
Spam is unwanted, unsolicited commercial email that typically contains a link, advertisement or file attachment that can compromise security or infect computers with malicious software when opened.
The primary goal of a spammer is to make money, and sending spam is cheap. The more messages spammers can deliver, the greater chance the recipient will open the message and make a purchase.
You may receive spam for a variety of reasons. For example, if you've used your email address to sign up for an online service or posted your email address on a public webpage, it could be copied and used for unsolicited mail or distributed to other spammers.
Spectrum Business helps block spam by using anti-spam filters, which use optical character recognition (OCR) to filter out messages that contain key words, phrases, and images commonly found in spam. Spectrum Business blocks approximately 150 million spam messages per day from reaching our customers.
In addition to using anti-spam filters, Spectrum Business offers Security Suite, which is comprehensive security suite software with built-in spam control. Learn more.
An email hoax is an email message that attempts to trick or deceive the recipient into forwarding the message by creating a sense of urgency or with a promise of rewards. Email hoaxes often contain a request to "Send this message to everyone you know" or some version of that statement. Other examples of email hoaxes include: chain letters, bogus virus information, free gift certificates, etc.
It's recommended that you refrain from passing on chain letters, jokes and rumors. The best practice is to simply delete the message.
The following pages contain information on new email hoaxes and false alerts:
Spoofing is when someone forges the headers of email messages to falsify the origin of the emails. Spoofing is usually done when sending unsolicited emails, phishing attacks and viruses.
The best solution is to create a new email address. Also, if you're able to identify the party that has spoofed your email address, you can contact the responsible Internet Service Provider from which the unwanted messages are being sent. However, that process can be very lengthy and frustrating.
Phishing is a form of internet fraud that utilizes spoofed emails to lead the recipient to a fake website. The fake website is designed to trick the recipient into disclosing financial information such as credit card numbers, account usernames, passwords or social security numbers. Learn more.
If you received a spoofed email claiming to be from Charter Communications, don't alter the email and forward the email in its entirety, including email header information, to firstname.lastname@example.org.
If you received a spoofed email claiming to be from a company other than Charter Communications, don't alter the email and forward the email in its entirety to the company that is being phished. Most organizations have information on their website about where to report abuse.
For more information about phishing, visit:
Responding to a phishing email may or may not lead to identity theft. As a safety precaution, contact the following three credit reporting bureaus and place a fraud alert on your credit report.
Initial fraud alerts last for 90 days and each credit reporting agency has established nationwide toll–free number for reporting.
Placing a fraud alert with the credit reporting agencies entitles you to a free copy of your credit report. Review your credit report carefully and look for suspicious activity. Also, file a complaint with the Federal Trade Commission. The complaint form for the FTC can be found here.