fbpx
877.877.1840 [email protected]

Email security:
best practices.

KEEP YOUR BUSINESS SAFE AND SECURE FROM SUSPICIOUS EMAILS WITH
A SET OF COMMON SENSE BEST PRACTICES.

Over the years it has become harder and harder to tell if a email from an
unknown source is a legitimate business communication or a potential virus or
scam. Apply these best practices every time you open a questionable email to
protect your IT systems and data.

Always.

Z

Check the e-mail ‘From’ field to validate the sender. This ‘From’ address may be spoofed.

Z

Report all suspicious emails to your Information Technology help desk.

Z

Check for so-called ‘double-extended’ scam attachments. A text file named ‘safe.txt’ is safe, but a file called ‘safe.txt.exe’ is not.

Z

Note that www.microsoft.com and www.support.microsoft.software.com are two different domains. (And only the first is real!)

Do Not!

Q

Open any e-mail attachments that end with: .exe, .scr, .bat, .com, or other executable files you do not recognize.

Q

Unsubscribe – it is easier to delete the e-mail than to deal with the security risks.

Q

Open any e-mail attachments that end with: .exe, .scr, .bat, .com, or other executable files you do not recognize.

subscribe for More helpful Tips

Recent Posts.

Are You Truly Prepared for a Social Engineering Attack?

Hackers have a vast array of techniques to manipulate you into handing over valuable data, many of which are on the uptick in 2019 Social engineering is a time-tested hacking technique for gaining access to networks, systems, and physical locations. Unlike other...