Skip to main content

When cyber crooks send messages trying to trick people into disclosing passwords or account information, they often mimic a recognizable email address to make it look like it’s coming from a trusted source – for example, from your company. It’s a practice called spoofing and it packs a double wallop. Not only does it put consumers at risk for identity theft, but spoofing can unfairly damage the reputation for trust you’ve worked hard to earn.

What can you do to protect your company and your customers from business email imposters? That’s just one of the topics covered in the FTC’s new cybersecurity resources for small business.

How To Protect Your Business

When you set up your business’s email, make sure the provider offers email authentication technology. What’s email authentication? As a message passes from your company’s server to a receiving server, there are behind-the-scenes ways to verify that it’s really coming from you. If it’s not, the receiving server can foil a business email imposter by blocking the message or sending it to a quarantine file. Before selecting a web host, make sure they use multiple email authentication tools. (More about email authentication coming soon.)

Another key step is to keep your security current. Install the latest patches and updates and set them to update automatically on your network. Consider additional means of protection like intrusion prevention software, which checks your network for suspicious activity and alerts you if something looks amiss.

As important as it is to take a technological belt-and-suspenders approach, your company’s cybersecurity is only as strong as your least vigilant employee. Train your staff to spot cyber threats and reinforce your security message with periodic refreshers and updates. There’s no need to start from scratch. The FTC’s new cybersecurity campaign for small business has factsheets, quizzes, videos, and a discussion guide to help with your in-house training efforts.

What To Do If Someone Spoofs Your Email

If a business email imposter has stolen your good name, report it to local law enforcement, the FBI’s Internet Crime Complaint Center at, and the FTC at Forward phishing emails to the FTC’s spam emailbox,, and to, an address used by the Anti-Phishing Working Group, which includes ISPs, security professionals, financial institutions, and law enforcement agencies.

If you learn that scammers are impersonating your business, tell your customers as soon as possible by mail, email, or social media. (If you use email, send it without hyperlinks so it doesn’t look like a phishing scam.) Remind customers that you’ll never ask them in an email or text for their credit card or bank account number, Social Security number, or other confidential information – and they shouldn’t include it in any reply. If your customers’ data was stolen, direct them to to get a recovery plan.

Even if your company’s name hasn’t been misappropriated, use your client newsletter and social media presence to alert customers to the dangers of email imposters. The FTC has a factsheet on protecting your business from this cyber threat.

Next: Tech support scams

It is your choice whether to submit a comment. If you do, you must create a user name, or we will not post your comment. The Federal Trade Commission Act authorizes this information collection for purposes of managing online comments. Comments and user names are part of the Federal Trade Commission’s (FTC) public records system, and user names also are part of the FTC’s computer user records system. We may routinely use these records as described in the FTC’s Privacy Act system notices. For more information on how the FTC handles information that we collect, please read our privacy policy.

The purpose of this blog and its comments section is to inform readers about Federal Trade Commission activity, and share information to help them avoid, report, and recover from fraud, scams, and bad business practices. Your thoughts, ideas, and concerns are welcome, and we encourage comments. But keep in mind, this is a moderated blog. We review all comments before they are posted, and we won’t post comments that don’t comply with our commenting policy. We expect commenters to treat each other and the blog writers with respect.

  • We won’t post off-topic comments, repeated identical comments, or comments that include sales pitches or promotions.
  • We won’t post comments that include vulgar messages, personal attacks by name, or offensive terms that target specific people or groups.
  • We won’t post threats, defamatory statements, or suggestions or encouragement of illegal activity.
  • We won’t post comments that include personal information, like Social Security numbers, account numbers, home addresses, and email addresses. To file a detailed report about a scam, go to

We don't edit comments to remove objectionable content, so please ensure that your comment contains none of the above. The comments posted on this blog become part of the public domain. To protect your privacy and the privacy of other people, please do not include personal information. Opinions in comments that appear in this blog belong to the individuals who expressed them. They do not belong to or represent views of the Federal Trade Commission.

Get Business Blog updates