There are other steps that all members must take to defend the organization. Make sure everyone understands the following concepts:

  • Spam or junk mail. There are many reasons why you may receive spam, and furthermore, not all spam is the same. What it can do is reduce what’s coming in and therefore the risk of attacks by filtering out spam.
  • Phishing. A phishing email is a message that appears legitimate but is an attempt to obtain personal information or steal money.
  • Identity theft. Scammers can also use a technique called spoofing to make it look like you’ve received an email of their own.
  • Malware is malicious software that can be installed on your computer, typically installed after you click a link or open a document from an emailThere are several types of malicious software (for example, ransomware, when they take control of your computer), and none of them are beneficial.

Choices to take a holiday and travelling out in this pandemic situation are limited. Why not take a stay action on quality.

Rosalina D. William

Recommended procedures

Use the following best practices to help users prevent cyberattacks via email.

report it

Please report any phishing or other scam emails you receive. Select the message and choose Notify Message on the ribbon.

Avoid impersonation

  • Never reply to an email that asks you to submit personal or account information.
  • If you receive a message that seems suspicious or asks for this type of information, never click on links that are supposed to take you to a company website.
  • Never open any suspicious-looking email attachments.
  • If the message appears to be from a company, contact the company’s customer service by phone or through a web browser to see if the email is legitimate.
  • Search the web for the subject line of the email followed by the term “false information” to see if anyone else has reported this scam.

Make sure your emails look legitimate.

Help customers trust your communications by adding a digital signature to prove provenance.