SlideShare a Scribd company logo
1 of 6
Best e-Mail Security Practices
Using Email Safely
E-mail is everywhere. The system which allows messages
(along with attachments, such as photos or
documents) to be sent to a person or multiple person changed
the way people and businesses
communicate. For instance, a document that once had to be
faxed, mailed through the postal service,
or even scanned in and loaded on to a disk to be hand delivered
could now be sent almost
instantaneously.
The email system that most people know today grew out of the
late 1980s, when Internet service
providers such as Prodigy and AOL provided all-in-one
products for the masses, with e-mail, instant
messaging, games, news headlines, and eventually Internet
access. More tech-savvy computer users
had more advanced Internet service providers, which may have
only provided access to e-mail that
could be used with a dedicated program, such as Microsoft
Outlook.
But with the beginning of email came the beginning of
cybercrime looking to exploit the system to
spread malware and scam an unsuspecting public. Whereas
cybercriminals once had to rely on
spreading viruses by hand via floppy discs or to only users who
patched into dial-up local bulletin board
systems, the dawn of email then gave them a chance to spread
malware to the masses.
Although e-mails can be used to spread malware, there are
security practices a computer user can
employ to make themselves and their computers safe.
Be wary of all attachments and links
When strictly speaking of e-mail, the most dangerous ways
malware can be passed on is through
attachments and harmful links. Computer viruses specifically
need to be attached to a form of
executable code in order for its trap to be sprung.
Cybercriminals therefore will implant viruses on
seemingly desirable files (such as a PowerPoint presentation
with beautiful photography) and send it on
to a few people, knowing it will continue to be passed on. Once
the PowerPoint file is executed by a
target, the virus will be executed as well, and begin to do its
damage.
This brings up two points. First, any attachment – especially
ones that have been forwarded on and on
– can harbor dangerous malware. And even if the file itself isn’t
dangerous, and malware implanted on a
computer can act as a beacon to other cybercriminals for them
to know this computer can easily be
attacked again. Secondly, and more importantly, many computer
experts will warn users to be wary of
attachments from unfamiliar people. However, the fact that e-
mails that come from friends – whether
forwarded on purpose or because of a virus – can in fact contain
malware.
Only open attachments that can be verified that was delivered
directly from a reliable source. And
never open or forward any chain emails. Delete them
immediately.
Don’t be fooled
Oftentimes, cybercriminals don’t have to worry about whether a
target computer is protected or not.
They use social engineering techniques to trick people into
giving up their private information without
any malicious software.
Most commonly in e-mail form, this comes in phishing.
Phishing is when a cybercriminal uses a
reasonable facsimile of an e-mail that looks like it may have
come from an honest business. These may
be an online banking service, an online retailer (like eBay), or
the target’s Internet service provider.
However, these emails usually ask for information that a
reputable business would never ask of their
customers, such as login and password information or a Social
Security number.
Other types of social engineering such as 419 Scams operate in
much the same way, except they
aren’t as polished as phishing. These scams send out farcical e-
mails, such as a Nigerian prince needing
to escape his war-torn nation, that implores the target to wire
the sender some money, and they will
be rewarded with riches beyond their dreams. Most people
understand that this is a sham, but they
only need one or two people to fall for it in the thousands of e-
mails sent out in order to make
thousands of dollars.
If an offer sounds too good to be true, it probably is. Learning
about these kinds of scams can help
protect users and make their e-mail more secure.
Keep personal information private
The College of New Jersey made an interesting point when
explaining e-mail safety. Many people think
of emails as secure and private. This is just not so, especially
with cybercriminals who are far more
technically advanced than the average computer user. The
college made this analogy: Think of writing
an e-mail as writing a message on a postcard with a pencil. Any
e-mail can be viewed and changed.
Never put any personal information in any e-mail, even if the
recipient is a reliable source.
Norton AntiVirus
Home | Norton Comparison | Norton Q&A | Security Resource
Center | Customer Testimonials | Tools | Norton Coupons | A
bout NA V Center
International
co nve rte d by W e b2P DFC o nve rt.co m
javascript:void(0);
../norton-australia/
../norton-canada/
../norton-danmark/
../norton-deutschland/
../norton-espana/
../norton-france/
../norton-ireland/
../norton-italia/
../norton-nederland/
../norton-new-zealand/
../norton-norge/
../norton-suomi/
../norton-sverige/
../norton-uk/
http://www.nortonantiviruscenter.com/
http://www.nortonantiviruscenter.com/
http://www.nortonantiviruscenter.com/
../norton-comparison.html
../nav-questions-answers.html
../security-resource-center/
../norton-testimonials/index.html
../tools/
../norton-coupons-rebates.html
../about.html
cybercrime.html
malware.html
computer-viruses.html
phishing.html
../store/norton-html.php?m=usnavc
http://www.web2pdfconvert.com?ref=PDF
http://www.web2pdfconvert.com?ref=PDF
Safety precautions
It also helps to keep a computer’s operating system software up
to date. This will keep computers
fixed with the latest patches that correct known vulnerabilities
in the software. Also, use subscription-
based antivirus software, such as Norton AntiVirus. This
antivirus software features e-mail scans that
can warn users if an attack is coming through messages.
Keep these suggestions in mind when sending e-mails to make
sure to have a secure experience.
<< Back to article index
© 2007-2014, No rto n AntiVirus C e nte r, All rights re se rve
d
Abo ut Us - C o nta ct - P riva cy P o licy - Discla im e r - Site
Ma p
co nve rte d by W e b2P DFC o nve rt.co m
os-antivirus-software-up-to-date.html
./
http://www.nortonantiviruscenter.com/
../about.html
../contact.html
../privacypolicy.html
../disclaimer.html
../site-map.html
http://www.web2pdfconvert.com?ref=PDF
http://www.web2pdfconvert.com?ref=PDF

More Related Content

Similar to Best e-Mail Security PracticesUsing Email Safely E-mai.docx

2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manualRoel Palmaers
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 

Similar to Best e-Mail Security PracticesUsing Email Safely E-mai.docx (17)

Hamza
HamzaHamza
Hamza
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
M
MM
M
 
Data security
 Data security  Data security
Data security
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 

More from ikirkton

Analyze MVPIThe motives, values, and preferences inventory (MV.docx
Analyze MVPIThe motives, values, and preferences inventory (MV.docxAnalyze MVPIThe motives, values, and preferences inventory (MV.docx
Analyze MVPIThe motives, values, and preferences inventory (MV.docxikirkton
 
Analyze and interpret the following quotation The confrontation of.docx
Analyze and interpret the following quotation The confrontation of.docxAnalyze and interpret the following quotation The confrontation of.docx
Analyze and interpret the following quotation The confrontation of.docxikirkton
 
Analyze and prepare a critique of the following situationMary h.docx
Analyze and prepare a critique of the following situationMary h.docxAnalyze and prepare a critique of the following situationMary h.docx
Analyze and prepare a critique of the following situationMary h.docxikirkton
 
Analyze the anthropological film Jero A Balinese Trance Seance made.docx
Analyze the anthropological film Jero A Balinese Trance Seance made.docxAnalyze the anthropological film Jero A Balinese Trance Seance made.docx
Analyze the anthropological film Jero A Balinese Trance Seance made.docxikirkton
 
analyze and synthesize the financial reports of an organization of t.docx
analyze and synthesize the financial reports of an organization of t.docxanalyze and synthesize the financial reports of an organization of t.docx
analyze and synthesize the financial reports of an organization of t.docxikirkton
 
Analyze financial statements using financial ratios.• .docx
Analyze financial statements using financial ratios.• .docxAnalyze financial statements using financial ratios.• .docx
Analyze financial statements using financial ratios.• .docxikirkton
 
Analyze and prepare a critique of the following situationMary has.docx
Analyze and prepare a critique of the following situationMary has.docxAnalyze and prepare a critique of the following situationMary has.docx
Analyze and prepare a critique of the following situationMary has.docxikirkton
 
Analyze Alternative Exchange Rate RegimesThere are several argum.docx
Analyze Alternative Exchange Rate RegimesThere are several argum.docxAnalyze Alternative Exchange Rate RegimesThere are several argum.docx
Analyze Alternative Exchange Rate RegimesThere are several argum.docxikirkton
 
Analyze and evaluate the different leadership theories and behavior .docx
Analyze and evaluate the different leadership theories and behavior .docxAnalyze and evaluate the different leadership theories and behavior .docx
Analyze and evaluate the different leadership theories and behavior .docxikirkton
 
Analytical essay report about polio 1ِ- An introductory paragraph .docx
Analytical essay report about polio 1ِ- An introductory paragraph .docxAnalytical essay report about polio 1ِ- An introductory paragraph .docx
Analytical essay report about polio 1ِ- An introductory paragraph .docxikirkton
 
Analysis Essay 1DUE Feb 23, 2014 1155 PMGrade DetailsGrade.docx
Analysis Essay 1DUE Feb 23, 2014 1155 PMGrade DetailsGrade.docxAnalysis Essay 1DUE Feb 23, 2014 1155 PMGrade DetailsGrade.docx
Analysis Essay 1DUE Feb 23, 2014 1155 PMGrade DetailsGrade.docxikirkton
 
AnalogíasComplete the analogies. Follow the model.Modelomuer.docx
AnalogíasComplete the analogies. Follow the model.Modelomuer.docxAnalogíasComplete the analogies. Follow the model.Modelomuer.docx
AnalogíasComplete the analogies. Follow the model.Modelomuer.docxikirkton
 
ANA Buenos días, señor González. ¿Cómo (1) (2) SR. GONZÁLEZ .docx
ANA Buenos días, señor González. ¿Cómo (1)  (2) SR. GONZÁLEZ .docxANA Buenos días, señor González. ¿Cómo (1)  (2) SR. GONZÁLEZ .docx
ANA Buenos días, señor González. ¿Cómo (1) (2) SR. GONZÁLEZ .docxikirkton
 
Analyze symbolism in Jane Eyre from a Feminist point of view.  Exa.docx
Analyze symbolism in Jane Eyre from a Feminist point of view.  Exa.docxAnalyze symbolism in Jane Eyre from a Feminist point of view.  Exa.docx
Analyze symbolism in Jane Eyre from a Feminist point of view.  Exa.docxikirkton
 
An important part of research is finding sources that can be trusted.docx
An important part of research is finding sources that can be trusted.docxAn important part of research is finding sources that can be trusted.docx
An important part of research is finding sources that can be trusted.docxikirkton
 
An investment has an installed cost of $673,658. The cash flows ov.docx
An investment has an installed cost of $673,658. The cash flows ov.docxAn investment has an installed cost of $673,658. The cash flows ov.docx
An investment has an installed cost of $673,658. The cash flows ov.docxikirkton
 
An incomplete Punnett square There are three possible phenotypes fo.docx
An incomplete Punnett square There are three possible phenotypes fo.docxAn incomplete Punnett square There are three possible phenotypes fo.docx
An incomplete Punnett square There are three possible phenotypes fo.docxikirkton
 
An expanded version of the accounting equation could be A + .docx
An expanded version of the accounting equation could be  A + .docxAn expanded version of the accounting equation could be  A + .docx
An expanded version of the accounting equation could be A + .docxikirkton
 
An Evolving IndustryHow are the Internet and other technologies cu.docx
An Evolving IndustryHow are the Internet and other technologies cu.docxAn Evolving IndustryHow are the Internet and other technologies cu.docx
An Evolving IndustryHow are the Internet and other technologies cu.docxikirkton
 
An essay addressing the definition or resemblance concerning categor.docx
An essay addressing the definition or resemblance concerning categor.docxAn essay addressing the definition or resemblance concerning categor.docx
An essay addressing the definition or resemblance concerning categor.docxikirkton
 

More from ikirkton (20)

Analyze MVPIThe motives, values, and preferences inventory (MV.docx
Analyze MVPIThe motives, values, and preferences inventory (MV.docxAnalyze MVPIThe motives, values, and preferences inventory (MV.docx
Analyze MVPIThe motives, values, and preferences inventory (MV.docx
 
Analyze and interpret the following quotation The confrontation of.docx
Analyze and interpret the following quotation The confrontation of.docxAnalyze and interpret the following quotation The confrontation of.docx
Analyze and interpret the following quotation The confrontation of.docx
 
Analyze and prepare a critique of the following situationMary h.docx
Analyze and prepare a critique of the following situationMary h.docxAnalyze and prepare a critique of the following situationMary h.docx
Analyze and prepare a critique of the following situationMary h.docx
 
Analyze the anthropological film Jero A Balinese Trance Seance made.docx
Analyze the anthropological film Jero A Balinese Trance Seance made.docxAnalyze the anthropological film Jero A Balinese Trance Seance made.docx
Analyze the anthropological film Jero A Balinese Trance Seance made.docx
 
analyze and synthesize the financial reports of an organization of t.docx
analyze and synthesize the financial reports of an organization of t.docxanalyze and synthesize the financial reports of an organization of t.docx
analyze and synthesize the financial reports of an organization of t.docx
 
Analyze financial statements using financial ratios.• .docx
Analyze financial statements using financial ratios.• .docxAnalyze financial statements using financial ratios.• .docx
Analyze financial statements using financial ratios.• .docx
 
Analyze and prepare a critique of the following situationMary has.docx
Analyze and prepare a critique of the following situationMary has.docxAnalyze and prepare a critique of the following situationMary has.docx
Analyze and prepare a critique of the following situationMary has.docx
 
Analyze Alternative Exchange Rate RegimesThere are several argum.docx
Analyze Alternative Exchange Rate RegimesThere are several argum.docxAnalyze Alternative Exchange Rate RegimesThere are several argum.docx
Analyze Alternative Exchange Rate RegimesThere are several argum.docx
 
Analyze and evaluate the different leadership theories and behavior .docx
Analyze and evaluate the different leadership theories and behavior .docxAnalyze and evaluate the different leadership theories and behavior .docx
Analyze and evaluate the different leadership theories and behavior .docx
 
Analytical essay report about polio 1ِ- An introductory paragraph .docx
Analytical essay report about polio 1ِ- An introductory paragraph .docxAnalytical essay report about polio 1ِ- An introductory paragraph .docx
Analytical essay report about polio 1ِ- An introductory paragraph .docx
 
Analysis Essay 1DUE Feb 23, 2014 1155 PMGrade DetailsGrade.docx
Analysis Essay 1DUE Feb 23, 2014 1155 PMGrade DetailsGrade.docxAnalysis Essay 1DUE Feb 23, 2014 1155 PMGrade DetailsGrade.docx
Analysis Essay 1DUE Feb 23, 2014 1155 PMGrade DetailsGrade.docx
 
AnalogíasComplete the analogies. Follow the model.Modelomuer.docx
AnalogíasComplete the analogies. Follow the model.Modelomuer.docxAnalogíasComplete the analogies. Follow the model.Modelomuer.docx
AnalogíasComplete the analogies. Follow the model.Modelomuer.docx
 
ANA Buenos días, señor González. ¿Cómo (1) (2) SR. GONZÁLEZ .docx
ANA Buenos días, señor González. ¿Cómo (1)  (2) SR. GONZÁLEZ .docxANA Buenos días, señor González. ¿Cómo (1)  (2) SR. GONZÁLEZ .docx
ANA Buenos días, señor González. ¿Cómo (1) (2) SR. GONZÁLEZ .docx
 
Analyze symbolism in Jane Eyre from a Feminist point of view.  Exa.docx
Analyze symbolism in Jane Eyre from a Feminist point of view.  Exa.docxAnalyze symbolism in Jane Eyre from a Feminist point of view.  Exa.docx
Analyze symbolism in Jane Eyre from a Feminist point of view.  Exa.docx
 
An important part of research is finding sources that can be trusted.docx
An important part of research is finding sources that can be trusted.docxAn important part of research is finding sources that can be trusted.docx
An important part of research is finding sources that can be trusted.docx
 
An investment has an installed cost of $673,658. The cash flows ov.docx
An investment has an installed cost of $673,658. The cash flows ov.docxAn investment has an installed cost of $673,658. The cash flows ov.docx
An investment has an installed cost of $673,658. The cash flows ov.docx
 
An incomplete Punnett square There are three possible phenotypes fo.docx
An incomplete Punnett square There are three possible phenotypes fo.docxAn incomplete Punnett square There are three possible phenotypes fo.docx
An incomplete Punnett square There are three possible phenotypes fo.docx
 
An expanded version of the accounting equation could be A + .docx
An expanded version of the accounting equation could be  A + .docxAn expanded version of the accounting equation could be  A + .docx
An expanded version of the accounting equation could be A + .docx
 
An Evolving IndustryHow are the Internet and other technologies cu.docx
An Evolving IndustryHow are the Internet and other technologies cu.docxAn Evolving IndustryHow are the Internet and other technologies cu.docx
An Evolving IndustryHow are the Internet and other technologies cu.docx
 
An essay addressing the definition or resemblance concerning categor.docx
An essay addressing the definition or resemblance concerning categor.docxAn essay addressing the definition or resemblance concerning categor.docx
An essay addressing the definition or resemblance concerning categor.docx
 

Recently uploaded

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 

Recently uploaded (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 

Best e-Mail Security PracticesUsing Email Safely E-mai.docx

  • 1. Best e-Mail Security Practices Using Email Safely E-mail is everywhere. The system which allows messages (along with attachments, such as photos or documents) to be sent to a person or multiple person changed the way people and businesses communicate. For instance, a document that once had to be faxed, mailed through the postal service, or even scanned in and loaded on to a disk to be hand delivered could now be sent almost instantaneously. The email system that most people know today grew out of the late 1980s, when Internet service providers such as Prodigy and AOL provided all-in-one products for the masses, with e-mail, instant messaging, games, news headlines, and eventually Internet access. More tech-savvy computer users had more advanced Internet service providers, which may have only provided access to e-mail that could be used with a dedicated program, such as Microsoft Outlook. But with the beginning of email came the beginning of cybercrime looking to exploit the system to spread malware and scam an unsuspecting public. Whereas cybercriminals once had to rely on spreading viruses by hand via floppy discs or to only users who patched into dial-up local bulletin board systems, the dawn of email then gave them a chance to spread
  • 2. malware to the masses. Although e-mails can be used to spread malware, there are security practices a computer user can employ to make themselves and their computers safe. Be wary of all attachments and links When strictly speaking of e-mail, the most dangerous ways malware can be passed on is through attachments and harmful links. Computer viruses specifically need to be attached to a form of executable code in order for its trap to be sprung. Cybercriminals therefore will implant viruses on seemingly desirable files (such as a PowerPoint presentation with beautiful photography) and send it on to a few people, knowing it will continue to be passed on. Once the PowerPoint file is executed by a target, the virus will be executed as well, and begin to do its damage. This brings up two points. First, any attachment – especially ones that have been forwarded on and on – can harbor dangerous malware. And even if the file itself isn’t dangerous, and malware implanted on a computer can act as a beacon to other cybercriminals for them to know this computer can easily be attacked again. Secondly, and more importantly, many computer experts will warn users to be wary of attachments from unfamiliar people. However, the fact that e- mails that come from friends – whether forwarded on purpose or because of a virus – can in fact contain malware. Only open attachments that can be verified that was delivered directly from a reliable source. And never open or forward any chain emails. Delete them
  • 3. immediately. Don’t be fooled Oftentimes, cybercriminals don’t have to worry about whether a target computer is protected or not. They use social engineering techniques to trick people into giving up their private information without any malicious software. Most commonly in e-mail form, this comes in phishing. Phishing is when a cybercriminal uses a reasonable facsimile of an e-mail that looks like it may have come from an honest business. These may be an online banking service, an online retailer (like eBay), or the target’s Internet service provider. However, these emails usually ask for information that a reputable business would never ask of their customers, such as login and password information or a Social Security number. Other types of social engineering such as 419 Scams operate in much the same way, except they aren’t as polished as phishing. These scams send out farcical e- mails, such as a Nigerian prince needing to escape his war-torn nation, that implores the target to wire the sender some money, and they will be rewarded with riches beyond their dreams. Most people understand that this is a sham, but they only need one or two people to fall for it in the thousands of e- mails sent out in order to make thousands of dollars. If an offer sounds too good to be true, it probably is. Learning about these kinds of scams can help protect users and make their e-mail more secure.
  • 4. Keep personal information private The College of New Jersey made an interesting point when explaining e-mail safety. Many people think of emails as secure and private. This is just not so, especially with cybercriminals who are far more technically advanced than the average computer user. The college made this analogy: Think of writing an e-mail as writing a message on a postcard with a pencil. Any e-mail can be viewed and changed. Never put any personal information in any e-mail, even if the recipient is a reliable source. Norton AntiVirus Home | Norton Comparison | Norton Q&A | Security Resource Center | Customer Testimonials | Tools | Norton Coupons | A bout NA V Center International co nve rte d by W e b2P DFC o nve rt.co m javascript:void(0); ../norton-australia/ ../norton-canada/ ../norton-danmark/ ../norton-deutschland/ ../norton-espana/ ../norton-france/ ../norton-ireland/ ../norton-italia/ ../norton-nederland/ ../norton-new-zealand/
  • 5. ../norton-norge/ ../norton-suomi/ ../norton-sverige/ ../norton-uk/ http://www.nortonantiviruscenter.com/ http://www.nortonantiviruscenter.com/ http://www.nortonantiviruscenter.com/ ../norton-comparison.html ../nav-questions-answers.html ../security-resource-center/ ../norton-testimonials/index.html ../tools/ ../norton-coupons-rebates.html ../about.html cybercrime.html malware.html computer-viruses.html phishing.html ../store/norton-html.php?m=usnavc http://www.web2pdfconvert.com?ref=PDF http://www.web2pdfconvert.com?ref=PDF Safety precautions It also helps to keep a computer’s operating system software up to date. This will keep computers fixed with the latest patches that correct known vulnerabilities in the software. Also, use subscription- based antivirus software, such as Norton AntiVirus. This antivirus software features e-mail scans that can warn users if an attack is coming through messages. Keep these suggestions in mind when sending e-mails to make sure to have a secure experience.
  • 6. << Back to article index © 2007-2014, No rto n AntiVirus C e nte r, All rights re se rve d Abo ut Us - C o nta ct - P riva cy P o licy - Discla im e r - Site Ma p co nve rte d by W e b2P DFC o nve rt.co m os-antivirus-software-up-to-date.html ./ http://www.nortonantiviruscenter.com/ ../about.html ../contact.html ../privacypolicy.html ../disclaimer.html ../site-map.html http://www.web2pdfconvert.com?ref=PDF http://www.web2pdfconvert.com?ref=PDF