fbpx
877.877.1840 [email protected]
Email security:
best practices.

KEEP YOUR BUSINESS SAFE AND SECURE FROM SUSPICIOUS EMAILS WITH A SET OF COMMON SENSE BEST PRACTICES.

Over the years it has become harder and harder to tell if a email from an
unknown source is a legitimate business communication or a potential virus or
scam. Apply these best practices every time you open a questionable email to
protect your IT systems and data.

Always.

Z
Check the e-mail ‘From’ field to validate the sender. This ‘From’ address may be spoofed.
Z
Report all suspicious emails to your Information Technology help desk.
Z
Check for so-called ‘double-extended’ scam attachments. A text file named ‘safe.txt’ is safe, but a file called ‘safe.txt.exe’ is not.
Z
Note that www.microsoft.com and www.support.microsoft.software.com are two different domains. (And only the first is real!)

Do Not!

Q
Open any e-mail attachments that end with: .exe, .scr, .bat, .com, or other executable files you do not recognize.
Q
Unsubscribe – it is easier to delete the e-mail than to deal with the security risks.
Q
Open any e-mail attachments that end with: .exe, .scr, .bat, .com, or other executable files you do not recognize.

subscribe for More helpful Tips

Recent Posts.

A Quick Guide to Disaster Recovery Testing

A Quick Guide to Disaster Recovery Testing

Regular tests of your disaster recovery (DR) systems will help ensure your business is safe from IT catastrophe. Major network downtime can cripple a business. In some situations, it may even threaten to shutter a business completely. How would your business fare if...

Are You Truly Prepared for a Social Engineering Attack?

Are You Truly Prepared for a Social Engineering Attack?

Hackers have a vast array of techniques to manipulate you into handing over valuable data, many of which are on the uptick in 2019 Social engineering is a time-tested hacking technique for gaining access to networks, systems, and physical locations. Unlike other...