How do I manage my Whidbey Telecom email account? What is phishing? Find answers to your most Frequently Asked Questions below. You can also reach 24/7 Technical Support at 360-321-8324.
Below are step-by-step instructions for setting up your email. Select your operating system below to get started. For questions or assistance, please contact Tech Support at (360) 321-8324 or email us at email@example.com.
IMAP Remote Email Management
Similar to our Webmail, IMAP allows your mail program(s) to store and manage email remotely so you can access your messages wherever you go.
Your e-mail program normally uses a method called “POP3” to retrieve new mail. The messages are then stored only on your computer, where they’re vulnerable to a disk failure or virus, and can’t be accessed remotely. The alternative to “POP3” is called “IMAP”, which stores your email in one secure location here at Whidbey Telecom. This allows you to access your mailbox from any Internet-connected computer, smart phone, or tablet. Plus, email won’t be lost if your computer fails.
To use IMAP, simply create a new account in your email program, using the same username and password you have now. When asked what type of account to create, choose “IMAP”. Then input the settings you see below for both incoming and outgoing mail server.
Please be aware of the following before trying IMAP:
- A high speed internet connection is recommended when using IMAP.
- Remember to disable “Check for new messages” in your old “POP3” account once you’ve added IMAP.
- You can upload old POP3 messages by dragging them into your IMAP folder, or archiving them using other means. Once you’ve uploaded or archived your old POP3 email, you can remove the POP3 account in your email program.
|Incoming Mail Server (IMAP):
|Full email address
|143 or 993
|Yes, for port 993 (SSL)
|Outgoing Mail Server (SMTP):
|587 or 465
|Yes, for port 465 (SSL)
|Yes (full email address & password)
For safety and security, Whidbey Telecom recommends using SSL connections for incoming and outgoing email. Non-SSL connections are supported for devices without modern SSL support, or for troubleshooting purposes.
Note: IMAP syncs across all devices; an email deleted from one device will be removed from any other devices that have mail configured. This applies to sent email, as well; email sent from one device will appear in the sent folder of other devices.
Is there a size limit on emails I can send and receive?
You can send and receive files up to 28 MB per message. That’s typically more than enough to accommodate large attachments and photos.
How secure is my Whidbey Telecom email account?
Simply put… very! Your messages are kept safe, private, and secure using strong encryption algorithms. We do not release email addresses to third-party vendors. We respect the privacy of your email account.
Why have I been locked out of my email?
To keep your computer safe from spam and viruses, we employ a rigorous monitoring and filtering system. Our process is to lock down your account at the first sign of trouble, usually following a foreign log-in attempt.
This doesn’t necessarily mean you’re the victim of a phishing or virus attack. If you recently changed your password on one device but failed to update the password on another, the system will lock down because your device is trying to retrieve email using an invalid password. Remember to go into the settings on all devices and change your password.
I’ve received email from this sender before. Why is it suddenly going to my junk folder?
To protect your privacy, anti-spam filters have become much more rigorous, and several things can set them off. The header or subject line may be corrupted, or there may be no header at all.
To “rescue” an email from the spam folder, you’ll need to add them to your trusted senders list. Go into your “Anti-spam settings” and add the sender to your “Whitelist senders” list. All future emails from this sender will then be allowed through to your inbox.
You can also do this from the Spam Filter Summary email that you receive from us. These emails are generated daily whenever our system has flagged an email as spam.
I get a lot of unsolicited email from businesses. How can I make it stop?
Your best option is to “Unsubscribe” from that mailing list. Scroll down to the bottom of the unwanted email till you see an option or link to “unsubscribe,” then follow the prompts.
You can also increase the sensitivity of your Webmail spam filter. To adjust this, go to Settings, then Anti-Spam, then Spam Filter Sensitivity. A lower number filters more spam than a higher number. Be sure to hit “Save” following any changes.
I received an email from Whidbey Telecom saying my account could be compromised. Is this true or is it spam?
This is a phishing scheme; do not click on the link and do not enter your username and password. Unfortunately, we have seen an uptick in phishing emails that claim to be from Whidbey Telecom customer support, even going so far as to include our logo. But they are not from us. If we determine your account has been compromised, we lock it down immediately; we will never send you an email threatening action of any kind.
Call us at 360-321-1122 or 24/7 at 360-321-TECH (8324) if you have any doubts or think you may have been a target of a scam.
Phishing attacks attempt to steal sensitive information through emails, websites, text messages, or other forms of electronic communication that often look to be official communication from legitimate companies or individuals.
The information that phishers (as these cybercriminals are called) attempt to steal can be usernames and passwords, credit card details, bank account information, or other credentials. Attackers can then use stolen information for malicious purposes, such as hacking, identity theft, or stealing money directly from bank accounts and credit cards. Phishers can also sell the information in cybercriminal underground marketplaces.
How Phishing Works
Phishing attacks are scams that often use social engineering bait or lure content. For example, during tax season, bait content involves tax-filing announcements that attempt to lure you into providing your personal information such as your Social Security number or bank account information.
Legitimate-looking communication, usually email, that links to a phishing site is one of the most common methods used in phishing attacks. The phishing site typically mimics sign-in pages that require users to input login credentials and account information. The phishing site then captures the sensitive information as soon as the user provides it, giving attackers access to the information.
Another common phishing technique is the use of emails that direct you to open a malicious attachment, for example a PDF file. The attachment often contains a message asking you to provide login credentials to another site such as email or file sharing websites to open the document. When you access these phishing sites using your login credentials, the attacker now has access to your information and can gain additional personal information about you.
In this scam, the attacker attempts to lure you with an email stating that you have an outstanding invoice from a known vendor or company and provides a link for you to access and pay your invoice. When you access the site, the attacker is poised to steal your personal information and funds.
You are asked to provide a credit card or other personal information so that your payment information can be updated with a commonly known vendor or supplier. The update is requested so that you can take delivery of your ordered goods. Generally, you may be familiar with the company and have likely done business with them in the past, but you are not aware of any items you have recently purchased from them.
Tax-themed phishing scams
A common IRS phishing scams is one in which an urgent email letter is sent indicating that you owe money to the IRS. Often the email threatens legal action if you do not access the site in a timely manner and pay your taxes. When you access the site, the attackers can steal your personal credit card or bank information and drain your accounts.
Another frequently used phishing scam is one in which an attacker sends a fraudulent email requesting you to open or download a document, often one requiring you to sign in.
Phishing emails that deliver other threats
Phishing emails can be very effective, and so attackers can use them to distribute ransomware through links or attachments in emails. When run, the ransomware encrypts files and displays a ransom note, which asks you to pay a sum of money to access your files.
We have also seen phishing emails that have links to tech support scam websites, which use various scare tactics to trick you into calling hotlines and paying for unnecessary “technical support services” that supposedly fix contrived device, platform, or software problems.
For more information on how to recognize and respond to phishing attempts, read our blog article here. Call us at 360-321-1122 or 24/7 at 360-321-8324 if you have any doubts or think you may have been a target of a scam.