fbpx Keep Your Business Safe And Secure From Suspicious Emails | IT Support That Transforms Your Business | Complete Network

KEEP YOUR BUSINESS SAFE AND SECURE FROM SUSPICIOUS EMAILS WITH A SET OF COMMON SENSE BEST PRACTICES.

Over the years it has become harder and harder to tell if a email from an
unknown source is a legitimate business communication or a potential virus or
scam. Apply these best practices every time you open a questionable email to
protect your IT systems and data.

Always.

Check the e-mail ‘From’ field to validate the sender. This ‘From’ address may be spoofed.
Report all suspicious emails to your Information Technology help desk.
Check for so-called ‘double-extended’ scam attachments. A text file named ‘safe.txt’ is safe, but a file called ‘safe.txt.exe’ is not.
Note that www.microsoft.com and www.support.microsoft.software.com are two different domains. (And only the first is real!)

Do Not!

Open any e-mail attachments that end with: .exe, .scr, .bat, .com, or other executable files you do not recognize.
Unsubscribe – it is easier to delete the e-mail than to deal with the security risks.
Open any e-mail attachments that end with: .exe, .scr, .bat, .com, or other executable files you do not recognize.

 

Is Complete Network the Right Fit for Your Business? Download Our Partner Evaluation Guide to Find Out.

We know that the first step toward better IT support is to research your options. We’ve put this guide together to aid you in that process.

It’s designed to give you an overview of our organization, so that you have the key information you need to evaluate our service fit.

This guide covers:

  • • Who we serve
  • • Who we are as an IT company
  • • Why you’ll benefit from working with us
  • • What your engagement will be like

Download it for free by filling out the form here.