fbpx
Email security:
best practices.

KEEP YOUR BUSINESS SAFE AND SECURE FROM SUSPICIOUS EMAILS WITH A SET OF COMMON SENSE BEST PRACTICES.

Over the years it has become harder and harder to tell if a email from an
unknown source is a legitimate business communication or a potential virus or
scam. Apply these best practices every time you open a questionable email to
protect your IT systems and data.

Always.

Z
Check the e-mail ‘From’ field to validate the sender. This ‘From’ address may be spoofed.
Z
Report all suspicious emails to your Information Technology help desk.
Z
Check for so-called ‘double-extended’ scam attachments. A text file named ‘safe.txt’ is safe, but a file called ‘safe.txt.exe’ is not.
Z
Note that www.microsoft.com and www.support.microsoft.software.com are two different domains. (And only the first is real!)

Do Not!

Q
Open any e-mail attachments that end with: .exe, .scr, .bat, .com, or other executable files you do not recognize.
Q
Unsubscribe – it is easier to delete the e-mail than to deal with the security risks.
Q
Open any e-mail attachments that end with: .exe, .scr, .bat, .com, or other executable files you do not recognize.

subscribe for More helpful Tips

Recent Posts.

Is Your Technology Partner Big Enough to Meet Your Requirements?

Is Your Technology Partner Big Enough to Meet Your Requirements?

While working with a smaller provider can mean lower prices, you’re likely sacrificing service quality. Businesses need a managed IT service provider (MSP) who can safeguard their IT and ensure that their employees always have the tools they need to achieve optimal...

How to Identify a Technology Partner with Strong Internal Security

How to Identify a Technology Partner with Strong Internal Security

A series of high-profile attacks have prompted businesses to examine their technology partners with more scrutiny What happens when your IT service firm, the one who is supposed to be keeping you safe from hackers, is themselves the target of a cybercrime? Businesses...

A Quick Guide to Disaster Recovery Testing

A Quick Guide to Disaster Recovery Testing

Regular tests of your disaster recovery (DR) systems will help ensure your business is safe from IT catastrophe. Major network downtime can cripple a business. In some situations, it may even threaten to shutter a business completely. How would your business fare if...