ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Know What Email Spoofing is So You Don’t Get Taken

b2ap3_thumbnail_email_spoofing_400.jpgHave you ever been the target of an email spoofer? This can be a difficult question to answer, especially if you don’t know what you’re looking for. Email spoofing can appear to be from legitimate sources, but the most important indicator is if the message looks like spam or fishy in general. If you ever receive a message like this, you might wonder why your spam filter didn’t catch such an obvious trap.

Email spoofing is when a hacker sends you a message that’s disguised as someone else, particularly someone you know or are associated with. This doesn’t necessarily mean that your contact has been hacked (though it could be possible), but it’s still a problem on your end. It’s up to you to identify and delete messages before you inevitably fall for one of these phishing scams. The only way to eliminate the threat of hackers is to take them seriously, and approach scams in an educated and informed manner.

How Email Spoofing Works
Email spoofing is a simple process that sounds like a lot of work, but the reality is that anyone with the proper tools can pull it off. All a spoofer needs is access to what’s called a Simple Mail Transfer Protocol (SMTP) server, and an email software. SMTP servers are fairly simple to find for free, which makes it easy to spoof names. The one on the receiving end will still see the true email address, but it will appear to be from the address or name that the spoofer enters.

Despite how easy it is to attempt an email spoofing campaign, there are still plenty of checks available that make it more challenging to pull off these days. The most notable check is called Sender Policy Framework (SPF), which takes the IP address of the sending server and then compares it to the SPF record of the appropriate domain. If the two don’t match, the receiving server denies the message. The Huffington Post describes how this works using the following example:

Let's say someone tried to spoof Bill Gates (billgates@microsoft.com): They would send an email on his behalf > the recipient server would then talk back to microsoft.com and say "Hey, I have an email that is coming from 123.123.123.123 stating that it was sent from billgates@microsoft.com."; > microsoft.com would then tell the recipient server, "No, sorry, it should be coming from 111.111.111.111." and the message would never get delivered.

What You Can Do Against Spoofing
Email spoofing, while easy to pull off, often can’t make its way through modern email solutions like Gmail and Outlook. Even if it does make it through a spam filter, spoofed messages can still be somewhat tricky to identify at times. In particular, a spoofer who has researched their target, and who they’re posing as (i.e., “phishing”), can represent a significant risk. What you want to do is look at the email address that sent the message. If it’s different from the email address you have on file, you know it’s a spoofer.

Another obvious way to spot a spoofer is if they make absolutely no attempt to disguise themselves, or if they pose as an institution that you regularly attend. If the message holds any suspicious links or attachments, make sure that you don’t click on them. Chances are that you could be walking right into a phishing scam. If the message asks you to confirm your credentials, don’t do as they ask. Organizations like banks or government agencies will never ask you to confirm information through email. Never log into a website using the links provided in an email unless you’re absolutely positive it’s not a spoofer. Instead, try to navigate to the website through your web browser using their normal URL.

One of the best ways to protect your business from email spoofing is to use an enterprise-level spam blocking solution, like the one ClearView IT offers. By utilizing such a powerful security tool, you can prevent most of your spam from even hitting your inbox, which means you don’t have to deal with potentially malicious or wasteful messages. To learn more about how you can fight against spoofing and other types of online threats, give ClearView IT a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup Smartphone communications Smartphones Microsoft Office Upgrade Small Business Network Mobile Devices Managed IT Services Data Recovery Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Covid-19 Passwords Holiday Disaster Recovery Apps Windows 10 Managed Service IT Support Browser Miscellaneous Cloud Computing Outsourced IT Internet of Things Data Management Remote Work Managed Service Provider Government Saving Money Operating System Gadgets Networking Artificial Intelligence Windows Managed IT services Workplace Strategy Bandwidth Information Encryption App Business Technology Remote Virtualization WiFi Blockchain Spam Server Mobile Device Management Apple History Information Technology Gmail Office Employee/Employer Relationship Two-factor Authentication Office 365 Budget Cybercrime BDR Health Big Data Analytics Wi-Fi Access Control Conferencing Data Security Patch Management Compliance Cost Management Employer-Employee Relationship Remote Monitoring Vendor Document Management Help Desk IT Management Hacking Remote Computing Save Money Training Hacker Voice over Internet Protocol Firewall Vendor Management Managed Services Hard Drive Search... Best Practice Augmented Reality Word Applications Project Management Retail IBM Website Legal Alert Vulnerabilities Hiring/Firing Data storage Outlook Password Data loss Money BYOD Mobile Office Customer Service Computing Unified Threat Management Free Resource Running Cable Paperless Office Antivirus Data Breach How To iPhone Maintenance Education Storage Cortana Twitter Content Filtering Law Enforcement End of Support Printer Websites Router Monitoring Mobility Meetings Healthcare User The Internet of Things YouTube Google Maps Travel Scam Virtual Reality Social Engineering Laptop Cryptocurrency Chrome Black Market VPN Cleaning Robot Windows 11 Update Mobile Computing Remote Workers Sports Social SaaS Windows 7 Marketing DDoS Virtual Private Network Customer Relationship Management Chromebook Co-Managed IT Drones Current Events Entertainment Disaster Automobile Physical Security Solutions Processor How To Lithium-ion battery Images 101 Integration Microchip Display Start Menu Flexibility Computer Care Downloads Processors Multi-factor Authentication Vulnerability Hack HIPAA Identity Theft Employees Software as a Service Avoiding Downtime Notifications Data Protection Unified Communications Holidays Saving Time Google Docs Bluetooth Bitcoin Distributed Denial of Service Cooperation Computers Office Tips Video Conferencing Wireless Technology Private Cloud Memory Telephone eWaste Virtual Machines Computer Repair Downtime Tech Terms Excel Professional Services PowerPoint Safety Managed IT Administration Politics Digital Machine Learning Settings Virtual Desktop Presentation Specifications Experience IT Consultant Solid State Drive Taxes Managed Services Provider Virtual Assistant Content Google Apps Desktop Workplace Staffing Books Spyware IP Address Language Electronic Medical Records Society Accountants Telework Audit Smartwatch Communitications Microsoft 365 File Sharing Database Computer Accessories Monitors Visible Light Communication Scams Procurement Redundancy Reading Cache Health IT Windows 8 Equifax FinTech CES Hard Drive Disposal IT Assessment Unified Threat Management Workers Tactics Competition Displays Username Advertising Cables Supply Chain Management Value Recovery Relocation Cyber security CCTV Work/Life Balance Tech Support Startup Organization Printing Freedom of Information Addiction email scam Smart Devices LiFi Touchscreen Navigation Entrepreneur Application Computer Malfunction Mobile Security Point of Sale Remote Working Emergency Documents News Trend Micro Vendor Mangement In Internet of Things User Tip Business Intelligence Legislation AI Network Management Digital Security Cameras Shortcuts Electronic Health Records Transportation Troubleshooting Samsung Hacks Evernote Network Congestion Webcam Writing Wasting Time Securty Uninterrupted Power Supply Reliable Computing Fake News eCommerce Business Mangement Modem Domains Proxy Server Emails Service Level Agreement Videos Computing Infrastructure Be Proactive Surveillance Tablets Scalability Management Device security Managing Costs Google Calendar Microsoft Excel Administrator SSID Supercomputer Text Messaging Proactive IT Wireless Headphones Going Green Media Business Cards Workplace Strategies Development Virus Employer/Employee Relationships Business Owner Bring Your Own Device Tech Public Speaking Motion Sickness Error Virtual Machine Comparison Optimization Streaming Media Google Drive Bookmark Music Reviews Download 2FA Piracy Teamwork Term Keyboard Corporate Profile Hard Drives HTML Data Storage Knowledge Hypervisor Television Telephony Botnet Medical IT Employer Employee Relationship Browsers intranet Nanotechnology Shopping Shortcut Micrsooft Upload Paperless Software License Smart Technology SQL Server Inbound Marketing Wireless Cabling Rental Service Google Play Tablet Heating/Cooling G Suite Flash Social Network Environment PCI DSS Licensing Mouse Humor Windows XP VoIP Tracking Telephone Systems Data Analysis Social Networking Business Growth Screen Reader Gig Economy Trends Business Communications Mobile Technology Internet Service Provider Azure Security Cameras Web Server Customer Resource management Devices Regulations Compliance Managed IT Service Electronic Payment SharePoint Tip of the week Memes Digital Payment Banking Fileless Malware Google Wallet Deep Learning Gamification Human Resources Company Culture Supply Chain Net Neutrality Worker Messenger Access Phone System Telephone System Regulations Financial Data Risk Management IT Time Management Public Cloud Business Metrics Directions Hosted Solution Backup and Disaster Recovery

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?