Over the years it has become harder and harder to tell if a email from an
unknown source is a legitimate business communication or a potential virus or
scam. Apply these best practices every time you open a questionable email to
protect your IT systems and data.
Check the e-mail ‘From’ field to validate the sender. This ‘From’ address may be spoofed.
Report all suspicious emails to your Information Technology help desk.
Check for so-called ‘double-extended’ scam attachments. A text file named ‘safe.txt’ is safe, but a file called ‘safe.txt.exe’ is not.
Note that www.microsoft.com and www.support.microsoft.software.com are two different domains. (And only the first is real!)
Open any e-mail attachments that end with: .exe, .scr, .bat, .com, or other executable files you do not recognize.
Unsubscribe – it is easier to delete the e-mail than to deal with the security risks.
Open any e-mail attachments that end with: .exe, .scr, .bat, .com, or other executable files you do not recognize.
We know that the first step toward better IT support is to research your options. We’ve put this guide together to aid you in that process.
It’s designed to give you an overview of our organization, so that you have the key information you need to evaluate our service fit.
This guide covers:
Download it for free by filling out the form here.