Financial Security Tips. Part 5. Email Hacking

Hello to All on this Auspicious Day!

They say all work and no play makes one a dull girl or boy. And whilst I’m VERY serious about having fun, I make it happen AFTER my work is done.
However, every year, for one magical day, work really feels a lot like play. .
It’s called International Nelson Mandela day!!!

I’m so proud to live in Madiba’s country of birth, and I’m even prouder to see the beautiful ripple effect his wonderful ways have on mother earth.
On this day, around the world, people unite to heal and build. To serve their community and stand together in proud Madiba-style unity.
Had he been alive today, to thank him I would have written an old school letter to drop in the mail. But, as you know, those get delivered at the pace of a snail!!!

I guess email would have been much better, hey? Easy and fast, leaving more time to play!!! BUT, as they say in those infomercials, "wait, there’s more," and unfortunately, it’s true for email too. Those online scamsters take no time out to play. One of the things they love to do, is to find your inbox. Once they’re in they set themselves up to win. You may be blissfully unaware; your private email is now being shared.
As we’ve been doing since the start of the series, we’ll guide you through this nasty scam too. email hacking is what we look at in Part 5. Helping you to spot it, so you know what to do.

On Tuesday, August 1 I’ll be back with Part 6. So, until then, stay in the mix, with work and play forming part of each day.
As always I thank you for your valuable time!
For now it’s goodbye until next time. .
Sending you love and light,
From Lenny and Lime

Lime’s Art to be Online-Smart Part 5:

Email Hacking
When it comes to sly foxes, online scamsters tick all the crooked boxes. Fraudsters gain unauthorised access to your email address. .. then they send emails to your friends, family, and business partners to defraud them in YOUR name. As is apparent this could leave you with your head hanging in shame.
The inside track they use to hack:
Through malware viruses, they access your emails and contact list. Malware is sophisticated, and even on seemingly safe systems they can exist. Emails are sent to your friends, family or business partners posing as you. They ask them for money — and of course the money is for them, not for you!!!

And here’s another way for them to mine. .. they email your business partners with a fake update for banking. They waste no time. Your suppliers now pay the crooks, whilst you are trying to balance the books!!!
This is what’s behind the veil if hackers gain access to your mail:
  • You start noticing emails are missing
  • You’re not receiving emails which people insist they’ve sent
  • You start to receive unexpected emails
  • Your password has changed — but not by you
  • Unknown emails in "sent items" is a telltale sign too

Well done!!! You’ve reached the end of Part 5. Lenny’s back on Thursday with Part 6 to tell us more about the scamsters' tricks.