How to report phishing emails.

by Jon Lober | NOC Technology

What should you do with that phishing email that's sitting in your inbox?

Although many of us have improved our ability to spot such emails, most of us still do not know what to do after we identify one.


Should you just delete it? Contact authorities? Contact the company that is being spoofed? The short answer is yes, but how you respond is probably contingent on whether or not you actually clicked anything in the email in question or provided any personal information to the folks behind the email.

How to report a phishing email if you were not compromised.

If you did not click any links in the phishing emails, download any attachments, or provide any personal information to anyone, take the following steps.


  1. Report the email to the FTC. Although the FTC cannot resolve your specific report, by reporting a phishing email, your valuable experience will be shared with more than 2,800 law enforcers that can use that information to investigate and take action against the cybercriminals behind these attacks.
  2. Report the email to the spoofed entity. Phishers are increasingly impersonating well-known and trusted brands like PayPal, Amazon, Geek Squad, and Dick’s Sporting Goods. The businesses being spoofed face a potential loss of reputation in the marketplace even though they have nothing to do with the attacks. As a result, many of them request that users contact them with information about the phishing attempt so that they can take legal action against the cybercriminals. Many spoofed companies maintain a special web page or email address for targets to send information about spoofing attempts, but others may require a call. For example, when users encounter a Geek Squad phishing email, Best Buy (the company behind Geek Squad) asks recipients to call them at 1-888-237-8289 to report it.
  3. Report the email as phishing to your email provider. The companies behind major email platforms (such as Microsoft and Google) provide easy options “Report Phishing.” Always report phishing to your email provider. Each click improves their ability to correctly identify and block future phishing emails.
  4. Delete the email. Fortunately, you did not take the bait. However, you want to make sure that you do not accidentally click a bad link in the future or leave it in the inbox for someone else to click (if it’s a shared account). Once you have reported the attempt to the authorities, spoofed, business, and your email provider, always delete that email!

 

How to report a phishing email if you were compromised.

Uh-oh. You took the bait. You clicked. You called. Now what?

  • If you paid a scammer through Western Union, MoneyGram, a debit, credit, or gift card, you should immediately contact the financial institution that facilitated the payment and let them know that it was a fraudulent charge and ask them to reverse the payment or refund your money.


  • If you sent cash through the USPS, you can attempt to intercept your package before the scammer receives it. If they receive the cash, or if you paid in cryptocurrency, you will probably not be able to recover your money.


  • If a scammer has access to your personal information such as your social security number or financial information.
  • Contact your local police department.
  • File a complaint with the FBI’s Internet Crime Complain Center (IC3).
  • Visit identitytheft.gov to report the theft and put together a plan to recover your identity.


  • If you gave a scammer your username and password, or suspect that they have remote access to your phone or computer, you should run antimalware software on your computer immediately and seek professional help from a cybersecurity expert. 


The FTC maintains a helpful page of advice and resources for anyone that has fallen prey to a phishing scam and provides specific instructions for what to do in your particular dilemma. In many cases, you will have a better outcome if you can respond as quickly as possible to the issue. Act quickly and seek professional assistance if you feel that the issue is beyond your ability to address.


If you think you might have been targeted by the PayPal and GeekSquad phishing attempts that are landing in millions of inboxes across the country, follow the above links learn more information specific to those scams.

Missouri Sheltered Workshops can empower human potential through AI
By Jon Lober April 24, 2025
Embracing the potential of both AI and humans
Tech upgrades that will boost employee safety in sheltered workshops
By Jon Lober April 15, 2025
At NOC Technology, we've worked with Missouri sheltered workshops for over seven years, and I've witnessed firsthand how the right technological implementations can transform sheltered workshop environments. Today, I'd like to share some insights on leveraging modern technology to create safer workspaces while maintaining the dignity and privacy of all participants. The Unique Safety Challenges of Sheltered Workshops Sheltered workshops provide valuable employment opportunities for individuals with disabilities, but they also present unique safety considerations. Workers may have varying levels of physical mobility, cognitive processing, and sensory perception—all of which can impact how they respond to traditional safety measures. Additionally, the production environments often involve machinery, tools, and materials that require careful monitoring and management. The Role of Smart Technology in Safety Advancements in smart technology provide real-time safety monitoring, immediate alerts for potential hazards, and improved emergency response times. Let’s explore some key technologies and their benefits in sheltered workshop environments. Personalized Alert Systems Traditional emergency alarms can be overwhelming for individuals with sensory sensitivities. Smart alert systems can deliver personalized notifications through: Vibrating wristbands that alert workers without auditory overload Visual notification systems with customizable colors and patterns Tablet-based communication for workers who benefit from visual cues Location-specific alerts that only notify those in affected areas We recently implemented a multi-modal alert system at a workshop in central Missouri that reduced anxiety-related incidents during emergency drills by 65% . Environmental Monitoring Maintaining optimal environmental conditions is crucial for both safety and productivity: Temperature and humidity sensors that automatically adjust HVAC systems Air quality monitors that detect potentially harmful particulates Noise level monitoring to prevent sensory overload Automated ventilation systems that activate when chemical levels exceed thresholds These systems not only protect workers but also provide documented compliance with OSHA regulations. Enhanced Supervision through Smart Cameras Security cameras have evolved beyond simple surveillance. Modern systems can: Detect unusual patterns that might indicate a worker in distress Monitor restricted areas without constant staff presence Identify when machinery is being used incorrectly Alert supervisors to potential safety hazards Important note: All camera systems should be implemented with strict privacy protocols and transparent policies. Workers and guardians should be fully informed about what is being monitored and why. In many cases, audio cannot be recorded, and the camera system must be configured to meet this requirement. Wearable Safety Technology Wearable devices offer personalized safety monitoring without stigmatization: Fall detection pendants that automatically alert staff Location tracking that helps locate workers in emergency situations Biometric monitoring for workers with health conditions Proximity sensors that prevent accidental entry into hazardous areas These wearables can be designed to look like standard ID badges or watches, preserving dignity while enhancing safety. Implementation Best Practices Successfully integrating smart technology into sheltered workshops requires careful planning: Involve all stakeholders: Workers, guardians, and staff should participate in selecting and implementing new technologies. Prioritize simplicity: Choose solutions that require minimal training and maintenance. Phase in gradually: Introduce new technologies in stages to allow everyone time to adapt. Balance automation with human oversight: Technology should supplement, not replace, trained staff. Respect privacy: Collect only essential data and maintain strong security protocols.
Could your sheltered workshop benefit from grant funding for new technology?
By Jon Lober April 7, 2025
As a sheltered workshop, you play a crucial role in providing meaningful employment opportunities for individuals with disabilities. However, like any organization, securing funding for technology upgrades can be a challenge. While investing in the right tools can improve efficiency, security, and overall productivity—that’s all only if you can afford the tools in the first place.
More Articles