SlideShare a Scribd company logo
1 of 6
Best e-Mail Security Practices
Using Email Safely
E-mail is everywhere. The system which allows messages
(along with attachments, such as photos or
documents) to be sent to a person or multiple person changed
the way people and businesses
communicate. For instance, a document that once had to be
faxed, mailed through the postal service,
or even scanned in and loaded on to a disk to be hand delivered
could now be sent almost
instantaneously.
The email system that most people know today grew out of the
late 1980s, when Internet service
providers such as Prodigy and AOL provided all-in-one
products for the masses, with e-mail, instant
messaging, games, news headlines, and eventually Internet
access. More tech-savvy computer users
had more advanced Internet service providers, which may have
only provided access to e-mail that
could be used with a dedicated program, such as Microsoft
Outlook.
But with the beginning of email came the beginning of
cybercrime looking to exploit the system to
spread malware and scam an unsuspecting public. Whereas
cybercriminals once had to rely on
spreading viruses by hand via floppy discs or to only users who
patched into dial-up local bulletin board
systems, the dawn of email then gave them a chance to spread
malware to the masses.
Although e-mails can be used to spread malware, there are
security practices a computer user can
employ to make themselves and their computers safe.
Be wary of all attachments and links
When strictly speaking of e-mail, the most dangerous ways
malware can be passed on is through
attachments and harmful links. Computer viruses specifically
need to be attached to a form of
executable code in order for its trap to be sprung.
Cybercriminals therefore will implant viruses on
seemingly desirable files (such as a PowerPoint presentation
with beautiful photography) and send it on
to a few people, knowing it will continue to be passed on. Once
the PowerPoint file is executed by a
target, the virus will be executed as well, and begin to do its
damage.
This brings up two points. First, any attachment – especially
ones that have been forwarded on and on
– can harbor dangerous malware. And even if the file itself isn’t
dangerous, and malware implanted on a
computer can act as a beacon to other cybercriminals for them
to know this computer can easily be
attacked again. Secondly, and more importantly, many computer
experts will warn users to be wary of
attachments from unfamiliar people. However, the fact that e-
mails that come from friends – whether
forwarded on purpose or because of a virus – can in fact contain
malware.
Only open attachments that can be verified that was delivered
directly from a reliable source. And
never open or forward any chain emails. Delete them
immediately.
Don’t be fooled
Oftentimes, cybercriminals don’t have to worry about whether a
target computer is protected or not.
They use social engineering techniques to trick people into
giving up their private information without
any malicious software.
Most commonly in e-mail form, this comes in phishing.
Phishing is when a cybercriminal uses a
reasonable facsimile of an e-mail that looks like it may have
come from an honest business. These may
be an online banking service, an online retailer (like eBay), or
the target’s Internet service provider.
However, these emails usually ask for information that a
reputable business would never ask of their
customers, such as login and password information or a Social
Security number.
Other types of social engineering such as 419 Scams operate in
much the same way, except they
aren’t as polished as phishing. These scams send out farcical e-
mails, such as a Nigerian prince needing
to escape his war-torn nation, that implores the target to wire
the sender some money, and they will
be rewarded with riches beyond their dreams. Most people
understand that this is a sham, but they
only need one or two people to fall for it in the thousands of e-
mails sent out in order to make
thousands of dollars.
If an offer sounds too good to be true, it probably is. Learning
about these kinds of scams can help
protect users and make their e-mail more secure.
Keep personal information private
The College of New Jersey made an interesting point when
explaining e-mail safety. Many people think
of emails as secure and private. This is just not so, especially
with cybercriminals who are far more
technically advanced than the average computer user. The
college made this analogy: Think of writing
an e-mail as writing a message on a postcard with a pencil. Any
e-mail can be viewed and changed.
Never put any personal information in any e-mail, even if the
recipient is a reliable source.
Norton AntiVirus
Home | Norton Comparison | Norton Q&A | Security Resource
Center | Customer Testimonials | Tools | Norton Coupons | A
bout NA V Center
International
co nve rte d by W e b2P DFC o nve rt.co m
javascript:void(0);
../norton-australia/
../norton-canada/
../norton-danmark/
../norton-deutschland/
../norton-espana/
../norton-france/
../norton-ireland/
../norton-italia/
../norton-nederland/
../norton-new-zealand/
../norton-norge/
../norton-suomi/
../norton-sverige/
../norton-uk/
http://www.nortonantiviruscenter.com/
http://www.nortonantiviruscenter.com/
http://www.nortonantiviruscenter.com/
../norton-comparison.html
../nav-questions-answers.html
../security-resource-center/
../norton-testimonials/index.html
../tools/
../norton-coupons-rebates.html
../about.html
cybercrime.html
malware.html
computer-viruses.html
phishing.html
../store/norton-html.php?m=usnavc
http://www.web2pdfconvert.com?ref=PDF
http://www.web2pdfconvert.com?ref=PDF
Safety precautions
It also helps to keep a computer’s operating system software up
to date. This will keep computers
fixed with the latest patches that correct known vulnerabilities
in the software. Also, use subscription-
based antivirus software, such as Norton AntiVirus. This
antivirus software features e-mail scans that
can warn users if an attack is coming through messages.
Keep these suggestions in mind when sending e-mails to make
sure to have a secure experience.
<< Back to article index
© 2007-2014, No rto n AntiVirus C e nte r, All rights re se rve
d
Abo ut Us - C o nta ct - P riva cy P o licy - Discla im e r - Site
Ma p
co nve rte d by W e b2P DFC o nve rt.co m
os-antivirus-software-up-to-date.html
./
http://www.nortonantiviruscenter.com/
../about.html
../contact.html
../privacypolicy.html
../disclaimer.html
../site-map.html
http://www.web2pdfconvert.com?ref=PDF
http://www.web2pdfconvert.com?ref=PDF

More Related Content

Similar to Best e-Mail Security PracticesUsing Email Safely E-mai.docx

2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manualRoel Palmaers
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 

Similar to Best e-Mail Security PracticesUsing Email Safely E-mai.docx (17)

Hamza
HamzaHamza
Hamza
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
M
MM
M
 
Data security
 Data security  Data security
Data security
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 

More from AASTHA76

(APA 6th Edition Formatting and St.docx
(APA 6th Edition Formatting and St.docx(APA 6th Edition Formatting and St.docx
(APA 6th Edition Formatting and St.docxAASTHA76
 
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docxAASTHA76
 
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docxAASTHA76
 
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docx
(Assmt 1; Week 3 paper)  Using ecree        Doing the paper and s.docx(Assmt 1; Week 3 paper)  Using ecree        Doing the paper and s.docx
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docxAASTHA76
 
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docx
(Image retrieved at  httpswww.google.comsearchhl=en&biw=122.docx(Image retrieved at  httpswww.google.comsearchhl=en&biw=122.docx
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docxAASTHA76
 
(Dis) Placing Culture and Cultural Space Chapter 4.docx
(Dis) Placing Culture and Cultural Space Chapter 4.docx(Dis) Placing Culture and Cultural Space Chapter 4.docx
(Dis) Placing Culture and Cultural Space Chapter 4.docxAASTHA76
 
(1) Define the time value of money.  Do you believe that the ave.docx
(1) Define the time value of money.  Do you believe that the ave.docx(1) Define the time value of money.  Do you believe that the ave.docx
(1) Define the time value of money.  Do you believe that the ave.docxAASTHA76
 
(chapter taken from Learning Power)From Social Class and t.docx
(chapter taken from Learning Power)From Social Class and t.docx(chapter taken from Learning Power)From Social Class and t.docx
(chapter taken from Learning Power)From Social Class and t.docxAASTHA76
 
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docxAASTHA76
 
(a) The current ratio of a company is 61 and its acid-test ratio .docx
(a) The current ratio of a company is 61 and its acid-test ratio .docx(a) The current ratio of a company is 61 and its acid-test ratio .docx
(a) The current ratio of a company is 61 and its acid-test ratio .docxAASTHA76
 
(1) How does quantum cryptography eliminate the problem of eaves.docx
(1) How does quantum cryptography eliminate the problem of eaves.docx(1) How does quantum cryptography eliminate the problem of eaves.docx
(1) How does quantum cryptography eliminate the problem of eaves.docxAASTHA76
 
#transformation10EventTrendsfor 201910 Event.docx
#transformation10EventTrendsfor 201910 Event.docx#transformation10EventTrendsfor 201910 Event.docx
#transformation10EventTrendsfor 201910 Event.docxAASTHA76
 
$10 now and $10 when complete Use resources from the required .docx
$10 now and $10 when complete Use resources from the required .docx$10 now and $10 when complete Use resources from the required .docx
$10 now and $10 when complete Use resources from the required .docxAASTHA76
 
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
#MicroXplorer Configuration settings - do not modifyFile.Versio.docxAASTHA76
 
#include string.h#include stdlib.h#include systypes.h.docx
#include string.h#include stdlib.h#include systypes.h.docx#include string.h#include stdlib.h#include systypes.h.docx
#include string.h#include stdlib.h#include systypes.h.docxAASTHA76
 
$ stated in thousands)Net Assets, Controlling Interest.docx
$ stated in thousands)Net Assets, Controlling Interest.docx$ stated in thousands)Net Assets, Controlling Interest.docx
$ stated in thousands)Net Assets, Controlling Interest.docxAASTHA76
 
#include stdio.h#include stdlib.h#include pthread.h#in.docx
#include stdio.h#include stdlib.h#include pthread.h#in.docx#include stdio.h#include stdlib.h#include pthread.h#in.docx
#include stdio.h#include stdlib.h#include pthread.h#in.docxAASTHA76
 
#include customer.h#include heap.h#include iostream.docx
#include customer.h#include heap.h#include iostream.docx#include customer.h#include heap.h#include iostream.docx
#include customer.h#include heap.h#include iostream.docxAASTHA76
 
#Assessment BriefDiploma of Business Eco.docx
#Assessment BriefDiploma of Business Eco.docx#Assessment BriefDiploma of Business Eco.docx
#Assessment BriefDiploma of Business Eco.docxAASTHA76
 
#include stdio.h#include stdint.h#include stdbool.h.docx
#include stdio.h#include stdint.h#include stdbool.h.docx#include stdio.h#include stdint.h#include stdbool.h.docx
#include stdio.h#include stdint.h#include stdbool.h.docxAASTHA76
 

More from AASTHA76 (20)

(APA 6th Edition Formatting and St.docx
(APA 6th Edition Formatting and St.docx(APA 6th Edition Formatting and St.docx
(APA 6th Edition Formatting and St.docx
 
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
 
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
 
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docx
(Assmt 1; Week 3 paper)  Using ecree        Doing the paper and s.docx(Assmt 1; Week 3 paper)  Using ecree        Doing the paper and s.docx
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docx
 
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docx
(Image retrieved at  httpswww.google.comsearchhl=en&biw=122.docx(Image retrieved at  httpswww.google.comsearchhl=en&biw=122.docx
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docx
 
(Dis) Placing Culture and Cultural Space Chapter 4.docx
(Dis) Placing Culture and Cultural Space Chapter 4.docx(Dis) Placing Culture and Cultural Space Chapter 4.docx
(Dis) Placing Culture and Cultural Space Chapter 4.docx
 
(1) Define the time value of money.  Do you believe that the ave.docx
(1) Define the time value of money.  Do you believe that the ave.docx(1) Define the time value of money.  Do you believe that the ave.docx
(1) Define the time value of money.  Do you believe that the ave.docx
 
(chapter taken from Learning Power)From Social Class and t.docx
(chapter taken from Learning Power)From Social Class and t.docx(chapter taken from Learning Power)From Social Class and t.docx
(chapter taken from Learning Power)From Social Class and t.docx
 
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
 
(a) The current ratio of a company is 61 and its acid-test ratio .docx
(a) The current ratio of a company is 61 and its acid-test ratio .docx(a) The current ratio of a company is 61 and its acid-test ratio .docx
(a) The current ratio of a company is 61 and its acid-test ratio .docx
 
(1) How does quantum cryptography eliminate the problem of eaves.docx
(1) How does quantum cryptography eliminate the problem of eaves.docx(1) How does quantum cryptography eliminate the problem of eaves.docx
(1) How does quantum cryptography eliminate the problem of eaves.docx
 
#transformation10EventTrendsfor 201910 Event.docx
#transformation10EventTrendsfor 201910 Event.docx#transformation10EventTrendsfor 201910 Event.docx
#transformation10EventTrendsfor 201910 Event.docx
 
$10 now and $10 when complete Use resources from the required .docx
$10 now and $10 when complete Use resources from the required .docx$10 now and $10 when complete Use resources from the required .docx
$10 now and $10 when complete Use resources from the required .docx
 
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
 
#include string.h#include stdlib.h#include systypes.h.docx
#include string.h#include stdlib.h#include systypes.h.docx#include string.h#include stdlib.h#include systypes.h.docx
#include string.h#include stdlib.h#include systypes.h.docx
 
$ stated in thousands)Net Assets, Controlling Interest.docx
$ stated in thousands)Net Assets, Controlling Interest.docx$ stated in thousands)Net Assets, Controlling Interest.docx
$ stated in thousands)Net Assets, Controlling Interest.docx
 
#include stdio.h#include stdlib.h#include pthread.h#in.docx
#include stdio.h#include stdlib.h#include pthread.h#in.docx#include stdio.h#include stdlib.h#include pthread.h#in.docx
#include stdio.h#include stdlib.h#include pthread.h#in.docx
 
#include customer.h#include heap.h#include iostream.docx
#include customer.h#include heap.h#include iostream.docx#include customer.h#include heap.h#include iostream.docx
#include customer.h#include heap.h#include iostream.docx
 
#Assessment BriefDiploma of Business Eco.docx
#Assessment BriefDiploma of Business Eco.docx#Assessment BriefDiploma of Business Eco.docx
#Assessment BriefDiploma of Business Eco.docx
 
#include stdio.h#include stdint.h#include stdbool.h.docx
#include stdio.h#include stdint.h#include stdbool.h.docx#include stdio.h#include stdint.h#include stdbool.h.docx
#include stdio.h#include stdint.h#include stdbool.h.docx
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Best e-Mail Security PracticesUsing Email Safely E-mai.docx

  • 1. Best e-Mail Security Practices Using Email Safely E-mail is everywhere. The system which allows messages (along with attachments, such as photos or documents) to be sent to a person or multiple person changed the way people and businesses communicate. For instance, a document that once had to be faxed, mailed through the postal service, or even scanned in and loaded on to a disk to be hand delivered could now be sent almost instantaneously. The email system that most people know today grew out of the late 1980s, when Internet service providers such as Prodigy and AOL provided all-in-one products for the masses, with e-mail, instant messaging, games, news headlines, and eventually Internet access. More tech-savvy computer users had more advanced Internet service providers, which may have only provided access to e-mail that could be used with a dedicated program, such as Microsoft Outlook. But with the beginning of email came the beginning of cybercrime looking to exploit the system to spread malware and scam an unsuspecting public. Whereas cybercriminals once had to rely on spreading viruses by hand via floppy discs or to only users who patched into dial-up local bulletin board systems, the dawn of email then gave them a chance to spread
  • 2. malware to the masses. Although e-mails can be used to spread malware, there are security practices a computer user can employ to make themselves and their computers safe. Be wary of all attachments and links When strictly speaking of e-mail, the most dangerous ways malware can be passed on is through attachments and harmful links. Computer viruses specifically need to be attached to a form of executable code in order for its trap to be sprung. Cybercriminals therefore will implant viruses on seemingly desirable files (such as a PowerPoint presentation with beautiful photography) and send it on to a few people, knowing it will continue to be passed on. Once the PowerPoint file is executed by a target, the virus will be executed as well, and begin to do its damage. This brings up two points. First, any attachment – especially ones that have been forwarded on and on – can harbor dangerous malware. And even if the file itself isn’t dangerous, and malware implanted on a computer can act as a beacon to other cybercriminals for them to know this computer can easily be attacked again. Secondly, and more importantly, many computer experts will warn users to be wary of attachments from unfamiliar people. However, the fact that e- mails that come from friends – whether forwarded on purpose or because of a virus – can in fact contain malware. Only open attachments that can be verified that was delivered directly from a reliable source. And never open or forward any chain emails. Delete them
  • 3. immediately. Don’t be fooled Oftentimes, cybercriminals don’t have to worry about whether a target computer is protected or not. They use social engineering techniques to trick people into giving up their private information without any malicious software. Most commonly in e-mail form, this comes in phishing. Phishing is when a cybercriminal uses a reasonable facsimile of an e-mail that looks like it may have come from an honest business. These may be an online banking service, an online retailer (like eBay), or the target’s Internet service provider. However, these emails usually ask for information that a reputable business would never ask of their customers, such as login and password information or a Social Security number. Other types of social engineering such as 419 Scams operate in much the same way, except they aren’t as polished as phishing. These scams send out farcical e- mails, such as a Nigerian prince needing to escape his war-torn nation, that implores the target to wire the sender some money, and they will be rewarded with riches beyond their dreams. Most people understand that this is a sham, but they only need one or two people to fall for it in the thousands of e- mails sent out in order to make thousands of dollars. If an offer sounds too good to be true, it probably is. Learning about these kinds of scams can help protect users and make their e-mail more secure.
  • 4. Keep personal information private The College of New Jersey made an interesting point when explaining e-mail safety. Many people think of emails as secure and private. This is just not so, especially with cybercriminals who are far more technically advanced than the average computer user. The college made this analogy: Think of writing an e-mail as writing a message on a postcard with a pencil. Any e-mail can be viewed and changed. Never put any personal information in any e-mail, even if the recipient is a reliable source. Norton AntiVirus Home | Norton Comparison | Norton Q&A | Security Resource Center | Customer Testimonials | Tools | Norton Coupons | A bout NA V Center International co nve rte d by W e b2P DFC o nve rt.co m javascript:void(0); ../norton-australia/ ../norton-canada/ ../norton-danmark/ ../norton-deutschland/ ../norton-espana/ ../norton-france/ ../norton-ireland/ ../norton-italia/ ../norton-nederland/ ../norton-new-zealand/
  • 5. ../norton-norge/ ../norton-suomi/ ../norton-sverige/ ../norton-uk/ http://www.nortonantiviruscenter.com/ http://www.nortonantiviruscenter.com/ http://www.nortonantiviruscenter.com/ ../norton-comparison.html ../nav-questions-answers.html ../security-resource-center/ ../norton-testimonials/index.html ../tools/ ../norton-coupons-rebates.html ../about.html cybercrime.html malware.html computer-viruses.html phishing.html ../store/norton-html.php?m=usnavc http://www.web2pdfconvert.com?ref=PDF http://www.web2pdfconvert.com?ref=PDF Safety precautions It also helps to keep a computer’s operating system software up to date. This will keep computers fixed with the latest patches that correct known vulnerabilities in the software. Also, use subscription- based antivirus software, such as Norton AntiVirus. This antivirus software features e-mail scans that can warn users if an attack is coming through messages. Keep these suggestions in mind when sending e-mails to make sure to have a secure experience.
  • 6. << Back to article index © 2007-2014, No rto n AntiVirus C e nte r, All rights re se rve d Abo ut Us - C o nta ct - P riva cy P o licy - Discla im e r - Site Ma p co nve rte d by W e b2P DFC o nve rt.co m os-antivirus-software-up-to-date.html ./ http://www.nortonantiviruscenter.com/ ../about.html ../contact.html ../privacypolicy.html ../disclaimer.html ../site-map.html http://www.web2pdfconvert.com?ref=PDF http://www.web2pdfconvert.com?ref=PDF