Technology

SECURE EMAIL: IS THAT EMAIL SAFE TO OPEN?

Have you ever gotten an email that was suspicious, or received an email that seemed like it was from a legitimate source but weren’t 100% sure? Of course, we all have. So how do you decipher the secure emails from the fakes? There are certain ways that I determine if an email was sent to me from a trusted person or if it goes in the trash.

Attackers use these emails to steal your personal information, or other malicious tactics like infecting your computer and possibly your network with a virus.

3 Ways to Determine if I Have Received a Secure Email

First, I look at who it’s from, believe it or not your contacts could have received a malicious link or attachment and are now using their email account to send out the same malicious emails.

The questions you should be asking yourself now is, had we spoke recently and was I expecting something from them? Are they just reaching out to touch base? If your contact is just reaching out it shouldn’t contain any links or attachments besides their signature image.

Once I’ve cleared the first section and the email is not from anyone that is currently in my email list, I’ll scan the email to check if it’s something I need to read or is informative in any way to me. If it has webpage links, those are the next pieces of the email I check. Usually you can hover your mouse over the link to determine if the site is the same in the bubble as what is typed in the email.

See here: CNN.com

Attackers use any method to get you to click a link. it’s a simple way for them to get information from your personal or company email account

Say the link looks legitimate but you are still uncertain, or there are no links but attachments? Now what do you do. You’ve read the email but it just doesn’t seem like you should be receiving this email.

I simply delete it.

If it’s important the sender will send the email again, and the email should be a little more personalized. As attachments go, you should never and I repeat never open a .ZIP file. This is the most common way that companies and personal computers are infected. If you see a .ZIP file, just delete the file.

The number one rule to email security is not to respond.

This goes for your personal or work email. If you respond you are telling the person on the other end that they found an email address that it is attached to a person. Not only are you giving them notice that you received the email but you will respond.

In the end, when in doubt, delete the email. You’d rather be safe and keep your accounts secure.

Related Posts