Five Ways To Stay Protected From SPAM Emails

February 2, 2019 Jerry Vasquez

Email is huge! It’s become an indispensable part of our lives and our businesses. In fact, a report from Statista estimates some 281.1 billion emails are sent every day, worldwide. That’s 37 emails for every person on the planet. And of all that email, more than half is spam. It’s annoying, it impacts productivity, and it opens us up to phishing and malware attacks.

Luckily, paying attention to the following 5 tips to identify dangerous spam emails, before you open, click, download, or share data will go a long way toward protecting you and your data.

1. Install Anti-Spam & Anti-Virus Software – Liquid Web’s Protection And Remediation can help!

You can’t watch everything at once. So, one of the best ways to protect yourself from dangerous spam is to install anti-spam software that can do it for you. Liquid Web’s Protection and Remediation product handles this for you. It bundles several general server security functions, including SpamAssassin and ESET setup and configuration.

SpamAssassin inspects incoming transmissions and tags emails as spam, giving you the freedom to delete or recover as you see fit. Meanwhile, ESET monitors potentially dangerous applications.

Need help securing your entire infrastructure? Download The Security Infrastructure Checklist for SMBs.

2. Watch for Unknown, Odd or Spoofed Email Addresses

Now that you’ve got the easy-to-identify spam handled, it’s time to take the next step: educating you and your employees about how to spot dangerous emails. A great, general rule to follow: don't open email from email addresses you don't know.

do not open emails from unknown addresses
Don’t open an email from an address you don’t know.

Now, in business, this isn’t always possible, so pay attention to the sender’s email address, especially if the message seems suspicious. If you’re ever unsure, don’t reply or click any links. Attackers often use spoofed email addresses (email addresses that appear to come from a trustworthy source) to trick the recipient. These emails often include phishing attack attempts.

Spoofing is done in a number of ways, but a few of the more common ways include:

Changing the name of the sender so that it does not match the sender’s email address: It’s easy to change the header information of an email so that the sender’s name doesn’t match the sender’s email address.

Email Spoofing Example 1 - Sender Name and Email Do Not Match
In the image with Example #1, the spammer changed the name to read “Katrina”, in an attempt to make the email appear as if it was from a familiar source. The email address, however, is clearly unfamiliar and untrustworthy: “”

Using characters that are similar to actual letters in order to make the sender email address to appear to be from a recognizable source: For example, many Greek characters look similar to Latin letters, such as the Greek character “ε” and the letter “e”. Emails may use the Greek character instead of the letter “e” in the sender’s address, like this: “example@liquidwε” Unless the recipient is paying attention, they might not notice the email address is incorrect.

Email Spoofing Example 2 - Fake Sender Address
Creating a fake sender address that references a normally trustworthy institution: Emails like “,” as in Example #2, are a clear attempt to convince the reader the email is actually from AIG Direct. However, a quick google search reveals that legitimate emails from AIG Direct will probably end in “”

3. Don’t Give Out Personal Information

Phishing scams usually appear to come from legitimate businesses, like your bank or a government agency like the IRS or the Social Security Administration. These emails will often contain URLs that link to malicious web pages asking for your private information, and the spoofed pages look very convincing!

Again, we understand that, in business, it’s not often possible to avoid giving away your personal information. Just remember: legitimate businesses, like the government or Apple, will never ask for personal information such as passwords, social security numbers, or credit card numbers via email.

Giving out your information can lead to drained bank accounts or even identity theft.

4. Avoid Strange Attachments or Unfamiliar Links

The best policy is to refrain from downloading files or clicking through links in a strange email unless you trust the source. Malware, viruses, and other types of malicious material can be easily downloaded to your server or computer through attachments or malicious links, such as the Dropbox link in Example #3.

Spam Example 3 - Unfamiliar Link and Email Spoofing
Dangerous files can come in any form, even with familiar extensions like .docx, and are often zipped to conceal their true file type.

5. Seem Too Good To Be True? It Probably Is.

Another sign of a dangerous spam email is when the content seems too good to be true – often in the form of a promise for large sums of money or unprompted offers for advertisement opportunities. Such emails are almost always phishing schemes trying to collect bank account information from the recipient.

The goal of an email that seems too good to be true is to encourage the recipient to click a link and provide their bank account information – a classic phishing scam. These scams come in many forms, including the story about the government owing you money in Example #4.

Spam Example 4 - Too Good To Be True
You might also see promises of money from foreign royalty, the announcement of a fake lottery win, and even get-rich-quick schemes.

Spam can be dangerous and can leave your computer or server vulnerable to future attacks. Following the above tips can help you identify the most common types of spam.

Also, don’t forget that even replying to spam or attempting to “unsubscribe” can come with its own set of dangers! It is always best not to reply at all if you are unsure.

Get the complete Security Infrastructure Checklist for SMBs

eBook - SMB Security Checklist

About the Author

Jerry Vasquez

A self-professed pirate captain with two decades of leadership experience, Jerry has led teams from 60+ cooks and chefs to 16 networking engineers. He brings those years of experience to his current role as Product Manager at Liquid Web, focusing on networking and security products. When not working or sleeping, Jerry can usually be found eating and having a good conversation with good people.

More Content by Jerry Vasquez
Previous Article
Liquid Web Upgrades their Managed Dedicated Servers with the Latest Intel Xeon Scalable Technology
Liquid Web Upgrades their Managed Dedicated Servers with the Latest Intel Xeon Scalable Technology

Liquid Web upgrades their Dedicated Server solutions with the latest Intel Xeon Scalable technology to impr...

Next Article
Liquid Web Partners With VMware to Offer a Flexible, Secure, Scalable Managed Private Cloud
Liquid Web Partners With VMware to Offer a Flexible, Secure, Scalable Managed Private Cloud

Liquid Web is pleased to announce the launch of their new Managed Private Cloud powered by VMware and NetAp...