Your Security is our primary focus

17 Canon Harnett Court

Milton Keynes, MK12 5NF

MON - FRI: 8:30 - 18:00

Helpdesk Opening Hours

+44 (0) 1908 410261

Customer Support

Malicious SPAM Email – Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.

 

Secure your email now! Most attacks originate through your email. That latest studies indicate that over 80% of malicious cyberattacks on small and medium businesses originate from SPAM Emails. Let’s find a service that really does reduce spam and any exposure to fraudulent cyber attacks on your staff via email. Here at Your Cloud Works we have carefully chosen : Proofpoint Email Protection

In our previous Cybersecurity 101 Blogs we have focused on the importance of security awareness and your initial business security assessment.

Today we are sharing 5 simple yet effective SPAM protection recommendations: 

1 Train your spam filter

When you get SPAM email from an unknown sender, don’t just delete it. Select it, and mark it as a spam message. Sometimes, your email client may mark an important email from a known sender as spam. In such scenarios, you need to mark that email as safe to train the email client about your false positives. The purpose of the SPAM filter is to recognise unwanted or dangerous emails, and prevent them from reaching your inbox, technology is brilliant but it still requires input from users. We need to participate in the setup of our SPAM filter, know what it does and how to adjust it. 

 
2 Never respond to SPAM

Let’s say you received a SPAM email and recognized it before you open it, don’t open it. If you realize that an email is SPAM only after opening it, mark it as spam and close it. Do not click the links or buttons, or download files from the spam messages. You should remember that marketing SPAM emails are emails sent out to thousands of potential customers that have visited a website, left their email or requested marketing data from the website. GDPR regulations have helped to reduce the amount of email marketing scams, but criminals are not GDPR compliant. A type of SPAM called Phishing emails are designed by Cybercriminals that are experts in making you and I believe that the BLUE “CLICK HERE” BUTTON in the email is legitimate. They visually convince you that the email is from your bank, your doctor, your mobile company or your favourite shop. They trick millions of people into clicking a malicious link, every single day, how are you going to be different and protect yourself and your business. Again: Don’t open it, but if you have, DO NOT CLICK on any buttons, links, pictures inside the email. If you do, you are giving permission to hackers who will access your personal and business credentials, or they may release a cyberattack on your company.

3 Use alternative email addresses

As we have just mentioned, a lot of unwanted emails can make their way into your inbox if you order a product or subscribe to a mailing list. Often by purchasing a product or subscribing to a mailing list at your favourite shop, we are our own worst SPAM enemy.  You are automatically signed up to receive unwanted marketing updates from that company, or it may share your contact information with a third-party advertiser. Did you really read their privacy policy? No, we all just check that box without thinking.
One simple solution to stop such spam emails is to create a secondary email address that you can use for such activities. By doing so, those unwanted marketing emails will not appear in your primary email inbox. Just make sure that you don’t use any of your legitimate personal information in that secondary account.

4 Hide your email address

Have you ever wondered why businesses often have emails like: reception@ , info@, employment@, or thiswillnevergetread@? Such emails are often used as a security measure when someone phones to ask who they should send their marketing email through to. The more people who expose your email address, the more SPAM emails you are going to get. So keep your email address hidden from public view. Avoid publishing your primary email address on the web unless it is required. Some people are still making the mistake of using their personal email on social media. For your safety, use alternative email addresses for such scenarios.

5 Use a third-party Anti-spam filter

Whatever email service you are using, they will be offering you a simple level of SPAM filtering, but as you can see, it is not enough security for your business. Most of the third-party anti-spam solutions that are available today can be customized to your needs, allowing only the approved emails to reach your inbox. Although there is free anti-spam software you cannot expect the levels of security that comes with a partner such as Your Cloud Works, where all of your Cybersecurity requirements will be covered.

>>Book a call now and talk to our Security Strategists

it sECURITY & sUPPORT pACKAGES

Standard Package

Entry level IT Support and Security Package

Premium Package

Premium comes packed with essential security and data backup

Elite Package

For the more securty concious business owner.

Ultimate Package

For a total security and centrally managed it environment.

Services

3CX Hosted Phone Systems

3CX hosted phone systems are cloud-based communication platforms that enhance business connectivity through unified voice, video, and messaging tools.

Application Hosting & Management

Application hosting and management involves deploying and maintaining software applications in the cloud to ensure their reliable and secure operation.

Centralised Professional Email Signature

Centrally managed email signatures. Set sleek unified signatures for the whole company.

Dark Web Monitoring

Monitor the Dark Web for compromised domain/emails from your company to limit a cyber attack.

Device Protection (Endpoint Detect & Respond – EDR)

Fully managed and monitored device protection 24/7, human led SOC, who detect and investigate, triage, and action remediation.

DNS Security and Configuration

Email security is paramount to protecting your business and brand. Configuration of a domain for email is the first step.

Domain Registration & DNS Management

Domain registration secures your web address, while DNS management ensures that people can find your website using that address.

Email Filtering, Protection & Security

Total email security that filters spam, viruses, phishing attacks and more.

Full Fibre 900mbps Business Internet

Full Fibre 900Mbps Business Internet delivers lightning-fast, symmetrical speeds to supercharge business productivity.

Google Workspace Subscription, Management & Security

Google Workspace smoothly integrates the business solutions that your team needs in one place.

Internet Filtering & Protection

Our DNS filtering solution has been ranked #1. Internet and Content Filtering at its best.

Managed Backup for Microsoft 365 & Google Workspace

Our backup solution is built in the cloud for the cloud, making it one of the fastest and most reliable cloud backups.

Microsoft 365 Security Monitoring

24/7/365 monitoring of your Microsoft 365 account to spot any configurations issues and fix them.

Microsoft 365 Subscription, Management & Security

Microsoft 365 subscriptions include familiar Office apps, intelligent cloud services, and world-class security in one place.

Network Discovery

Network Discovery provides complete security scans of your network in real time.

Password Manager

Protect your organisation against cyber threats with zero-trust enterprise password management.

Penetration & Vulnerability Testing

Automated full-scale penetration and vulnerability testing as a service.

Phishing Simulation & Security Awareness Training

Auotmate your Cyber Security Awareness & Phishing Training with YCW.

Server Support

24/7/365 Server monitoing in real time. We fully maintain, patch monitor your servers.

Support, Monitoring & Maintenance

Our IT Helpdesk is available from 8:30am to 6:00pm Monday to Friday to answer and resolve any question you may have.

Windows 365 Cloud PC

Windows 365 Cloud PC allows you to securely stream your Windows experience, including your personalised apps, content, and settings, directly from the Microsoft Cloud to any device.

WordPress Hosting

WordPress Hosting is a hosting service optimized for WordPress websites, providing easy setup, enhanced security, and performance tuning for a seamless WordPress experience.

Zoho CRM Subscriptions

Zoho CRM is a cloud-based customer relationship management platform designed to help businesses streamline their sales, marketing, and customer support processes

Learning Centre

Tech Guides

Technical Guides from Your Cloud Works

Blog

Your Cloud Works Tech Blog

Books

Published Books by Your Cloud Works

Newsletters

Tech Insider Newsletters

News

Latest News from Your Cloud Works

Frequently Asked Questions

Frequently Asked Questions by Clients

Tech Tip Videos

Technical Tip Videos from Your Cloud Works