How to Deal with Spam (of the non-edible variety)

JeremyGonyea

We’ve all seen them: a seemingly innocent email arrives purporting to be from your company’s Help Desk, your system administrator, or some wealthy prince of Nigeria. These emails ask for personal information such as usernames, passwords, bank account information, or even money. Responding to such emails often results in locked accounts, boatloads of more incoming spam, or worse. Below are some hints to help you recognize these emails:

What is Spam?

Spam is unsolicited email. Much like the “junk mail” from the normal post office, these messages can simply be erased or ignored. In order to limit the amount of spam arriving to your email inbox, many email services utilize a spam filtering service (i.e. Google’s Postini service) to automatically check and block potential spam messages.
There are different types of spam messages:

Some spam messages want you to purchase things. These are mostly harmless, and can be blocked and deleted.
A spam email may contain a file attachment, usually containing malicious software (malware) to infect your machine. The virus can steal information without your knowledge as well as use your machine in future attacks on other machines.
A phishing email is one that attempts to “fish out” information, including usernames and passwords, social security numbers, bank account information, etc. Once the phisher has this information, they use the compromised account to, in turn, send out thousands of similar messages to other unsuspecting recipients. Reputable institutions will NEVER ask for your username and password via email. Once other organizations see compromised email addresses sending thousands of spam messages, they block all further emails from that domain, including legitimate correspondences, in an effort to protect their own users. This causes a disruption in communication as recipients having addresses from other domains (i.e. Live, Gmail, Hotmail) no longer receive messages from you.

Some messages are still getting through my email’s spam service. What should I do?

DO NOT RESPOND TO THE EMAIL!! First, if your email provider supports it, submit the email to their spam service. If you are unsure whether or not a message is spam, please contact either your company’s Help Desk or possibly even your email service provider. Finally, be aware of what sites are asking for your email address. Check if their privacy policies will protect your information or if they send that personal information onto other third parties.

I may have given my information to a phisher. What should I do?

Everyone makes mistakes sometimes. If you feel that you may have compromised your account, contact your account provider immediately. If you still can log into the account, change the password as soon as possible to prevent any malicious usage on your account. Make an appointment with your company’s Help Desk as soon as possible. The worst thing you could do is ignore this! Take action immediately!

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers