fbpx
877.877.1840 [email protected]

Email security:
best practices.

KEEP YOUR BUSINESS SAFE AND SECURE FROM SUSPICIOUS EMAILS WITH
A SET OF COMMON SENSE BEST PRACTICES.

Over the years it has become harder and harder to tell if a email from an
unknown source is a legitimate business communication or a potential virus or
scam. Apply these best practices every time you open a questionable email to
protect your IT systems and data.

Always.

Z

Check the e-mail ‘From’ field to validate the sender. This ‘From’ address may be spoofed.

Z

Report all suspicious emails to your Information Technology help desk.

Z

Check for so-called ‘double-extended’ scam attachments. A text file named ‘safe.txt’ is safe, but a file called ‘safe.txt.exe’ is not.

Z

Note that www.microsoft.com and www.support.microsoft.software.com are two different domains. (And only the first is real!)

Do Not!

Q

Open any e-mail attachments that end with: .exe, .scr, .bat, .com, or other executable files you do not recognize.

Q

Unsubscribe – it is easier to delete the e-mail than to deal with the security risks.

Q

Open any e-mail attachments that end with: .exe, .scr, .bat, .com, or other executable files you do not recognize.

subscribe for More helpful Tips

Recent Posts.

Have you Realized the Full Benefit of the Cloud?

Cloud computing is a revolutionary technology, but maximizing its impact takes work The term “cloud computing” has been a media buzzword for many years, but we find that many businesses still aren’t sure exactly what “the cloud” is, or what it can do for them. In the...

Cybersecurity in 2019 is More Urgent Than You Think

Don’t hide behind your low profile, cybercriminals have gotten wise to that strategy. We’re deeply concerned about cybersecurity at Complete Network. That concern is based on both our many years of experience helping businesses combat cyber threats, and the latest...