fbpx
Email security:
best practices.

KEEP YOUR BUSINESS SAFE AND SECURE FROM SUSPICIOUS EMAILS WITH A SET OF COMMON SENSE BEST PRACTICES.

Over the years it has become harder and harder to tell if a email from an
unknown source is a legitimate business communication or a potential virus or
scam. Apply these best practices every time you open a questionable email to
protect your IT systems and data.

Always.

Z
Check the e-mail ‘From’ field to validate the sender. This ‘From’ address may be spoofed.
Z
Report all suspicious emails to your Information Technology help desk.
Z
Check for so-called ‘double-extended’ scam attachments. A text file named ‘safe.txt’ is safe, but a file called ‘safe.txt.exe’ is not.
Z
Note that www.microsoft.com and www.support.microsoft.software.com are two different domains. (And only the first is real!)

Do Not!

Q
Open any e-mail attachments that end with: .exe, .scr, .bat, .com, or other executable files you do not recognize.
Q
Unsubscribe – it is easier to delete the e-mail than to deal with the security risks.
Q
Open any e-mail attachments that end with: .exe, .scr, .bat, .com, or other executable files you do not recognize.

subscribe for More helpful Tips

Recent Posts.

How to Create an IT Policy

How to Create an IT Policy

The right IT policies help minimize uncertainty and risk while maximizing accountability and efficiency. Policies help your employees make good decisions when using company technology. They also better define your culture, eliminate inconsistency, reduce human error,...

What Is a Virtual Chief Information Officer (vCIO)?

What Is a Virtual Chief Information Officer (vCIO)?

A vCIO helps businesses tackle complex technology problems, address big picture IT goals, and much more. The IT landscape evolves quickly. With new products and technologies emerging on a weekly basis, it’s almost impossible for the average small or midsized business...