SlideShare a Scribd company logo
Best e-Mail Security Practices
Using Email Safely
E-mail is everywhere. The system which allows messages
(along with attachments, such as photos or
documents) to be sent to a person or multiple person changed
the way people and businesses
communicate. For instance, a document that once had to be
faxed, mailed through the postal service,
or even scanned in and loaded on to a disk to be hand delivered
could now be sent almost
instantaneously.
The email system that most people know today grew out of the
late 1980s, when Internet service
providers such as Prodigy and AOL provided all-in-one
products for the masses, with e-mail, instant
messaging, games, news headlines, and eventually Internet
access. More tech-savvy computer users
had more advanced Internet service providers, which may have
only provided access to e-mail that
could be used with a dedicated program, such as Microsoft
Outlook.
But with the beginning of email came the beginning of
cybercrime looking to exploit the system to
spread malware and scam an unsuspecting public. Whereas
cybercriminals once had to rely on
spreading viruses by hand via floppy discs or to only users who
patched into dial-up local bulletin board
systems, the dawn of email then gave them a chance to spread
malware to the masses.
Although e-mails can be used to spread malware, there are
security practices a computer user can
employ to make themselves and their computers safe.
Be wary of all attachments and links
When strictly speaking of e-mail, the most dangerous ways
malware can be passed on is through
attachments and harmful links. Computer viruses specifically
need to be attached to a form of
executable code in order for its trap to be sprung.
Cybercriminals therefore will implant viruses on
seemingly desirable files (such as a PowerPoint presentation
with beautiful photography) and send it on
to a few people, knowing it will continue to be passed on. Once
the PowerPoint file is executed by a
target, the virus will be executed as well, and begin to do its
damage.
This brings up two points. First, any attachment – especially
ones that have been forwarded on and on
– can harbor dangerous malware. And even if the file itself isn’t
dangerous, and malware implanted on a
computer can act as a beacon to other cybercriminals for them
to know this computer can easily be
attacked again. Secondly, and more importantly, many computer
experts will warn users to be wary of
attachments from unfamiliar people. However, the fact that e-
mails that come from friends – whether
forwarded on purpose or because of a virus – can in fact contain
malware.
Only open attachments that can be verified that was delivered
directly from a reliable source. And
never open or forward any chain emails. Delete them
immediately.
Don’t be fooled
Oftentimes, cybercriminals don’t have to worry about whether a
target computer is protected or not.
They use social engineering techniques to trick people into
giving up their private information without
any malicious software.
Most commonly in e-mail form, this comes in phishing.
Phishing is when a cybercriminal uses a
reasonable facsimile of an e-mail that looks like it may have
come from an honest business. These may
be an online banking service, an online retailer (like eBay), or
the target’s Internet service provider.
However, these emails usually ask for information that a
reputable business would never ask of their
customers, such as login and password information or a Social
Security number.
Other types of social engineering such as 419 Scams operate in
much the same way, except they
aren’t as polished as phishing. These scams send out farcical e-
mails, such as a Nigerian prince needing
to escape his war-torn nation, that implores the target to wire
the sender some money, and they will
be rewarded with riches beyond their dreams. Most people
understand that this is a sham, but they
only need one or two people to fall for it in the thousands of e-
mails sent out in order to make
thousands of dollars.
If an offer sounds too good to be true, it probably is. Learning
about these kinds of scams can help
protect users and make their e-mail more secure.
Keep personal information private
The College of New Jersey made an interesting point when
explaining e-mail safety. Many people think
of emails as secure and private. This is just not so, especially
with cybercriminals who are far more
technically advanced than the average computer user. The
college made this analogy: Think of writing
an e-mail as writing a message on a postcard with a pencil. Any
e-mail can be viewed and changed.
Never put any personal information in any e-mail, even if the
recipient is a reliable source.
Norton AntiVirus
Home | Norton Comparison | Norton Q&A | Security Resource
Center | Customer Testimonials | Tools | Norton Coupons | A
bout NA V Center
International
co nve rte d by W e b2P DFC o nve rt.co m
javascript:void(0);
../norton-australia/
../norton-canada/
../norton-danmark/
../norton-deutschland/
../norton-espana/
../norton-france/
../norton-ireland/
../norton-italia/
../norton-nederland/
../norton-new-zealand/
../norton-norge/
../norton-suomi/
../norton-sverige/
../norton-uk/
http://www.nortonantiviruscenter.com/
http://www.nortonantiviruscenter.com/
http://www.nortonantiviruscenter.com/
../norton-comparison.html
../nav-questions-answers.html
../security-resource-center/
../norton-testimonials/index.html
../tools/
../norton-coupons-rebates.html
../about.html
cybercrime.html
malware.html
computer-viruses.html
phishing.html
../store/norton-html.php?m=usnavc
http://www.web2pdfconvert.com?ref=PDF
http://www.web2pdfconvert.com?ref=PDF
Safety precautions
It also helps to keep a computer’s operating system software up
to date. This will keep computers
fixed with the latest patches that correct known vulnerabilities
in the software. Also, use subscription-
based antivirus software, such as Norton AntiVirus. This
antivirus software features e-mail scans that
can warn users if an attack is coming through messages.
Keep these suggestions in mind when sending e-mails to make
sure to have a secure experience.
<< Back to article index
© 2007-2014, No rto n AntiVirus C e nte r, All rights re se rve
d
Abo ut Us - C o nta ct - P riva cy P o licy - Discla im e r - Site
Ma p
co nve rte d by W e b2P DFC o nve rt.co m
os-antivirus-software-up-to-date.html
./
http://www.nortonantiviruscenter.com/
../about.html
../contact.html
../privacypolicy.html
../disclaimer.html
../site-map.html
http://www.web2pdfconvert.com?ref=PDF
http://www.web2pdfconvert.com?ref=PDF

More Related Content

PPT
I.T Security Threats
PDF
Computer Security for Lawyers
PDF
ccs12-18022310494mghmgmyy3 (1).pdf
PPTX
Cyber Crime and Security
PPTX
Online-Safety-Security-and-etiquette.pptx
PDF
E4IT_08_TiengAnhChuyenNganhCongNgheThongTinTLU
PPTX
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
PDF
How to Protect Your PC from Malware, Ransomware, Virus
I.T Security Threats
Computer Security for Lawyers
ccs12-18022310494mghmgmyy3 (1).pdf
Cyber Crime and Security
Online-Safety-Security-and-etiquette.pptx
E4IT_08_TiengAnhChuyenNganhCongNgheThongTinTLU
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
How to Protect Your PC from Malware, Ransomware, Virus

Similar to Best e-Mail Security PracticesUsing Email Safely E-mai.docx (17)

PPTX
E commerce-securityy
PDF
Computer Security Guide to Pc Security
DOCX
Hamza
PPTX
2nd Class PPT.pptx
PPSX
Security Awareness Training
PDF
Guide to pc_security
PPTX
Presentation on cyber security
PDF
Ransomware hostage rescue manual
DOCX
DOC
Data security
PPTX
Empowerment Technologies - Lesson 2: ONLINE SAFETY-SECURITY-ETHICS-AND-ETIQUETTE
PPT
Computer Malware
DOCX
negative implications of IT
PPTX
Copy of policing the internet_040555.pptx
PDF
Computer 10: Lesson 10 - Online Crimes and Hazards
PPTX
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
PPTX
Cyber security-1.pptx
E commerce-securityy
Computer Security Guide to Pc Security
Hamza
2nd Class PPT.pptx
Security Awareness Training
Guide to pc_security
Presentation on cyber security
Ransomware hostage rescue manual
Data security
Empowerment Technologies - Lesson 2: ONLINE SAFETY-SECURITY-ETHICS-AND-ETIQUETTE
Computer Malware
negative implications of IT
Copy of policing the internet_040555.pptx
Computer 10: Lesson 10 - Online Crimes and Hazards
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
Cyber security-1.pptx

More from AASTHA76 (20)

DOCX
(APA 6th Edition Formatting and St.docx
DOCX
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
DOCX
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
DOCX
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docx
DOCX
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docx
DOCX
(Dis) Placing Culture and Cultural Space Chapter 4.docx
DOCX
(1) Define the time value of money.  Do you believe that the ave.docx
DOCX
(chapter taken from Learning Power)From Social Class and t.docx
DOCX
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
DOCX
(a) The current ratio of a company is 61 and its acid-test ratio .docx
DOCX
(1) How does quantum cryptography eliminate the problem of eaves.docx
DOCX
#transformation10EventTrendsfor 201910 Event.docx
DOCX
$10 now and $10 when complete Use resources from the required .docx
DOCX
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
DOCX
#include string.h#include stdlib.h#include systypes.h.docx
DOCX
$ stated in thousands)Net Assets, Controlling Interest.docx
DOCX
#include stdio.h#include stdlib.h#include pthread.h#in.docx
DOCX
#include customer.h#include heap.h#include iostream.docx
DOCX
#Assessment BriefDiploma of Business Eco.docx
DOCX
#include stdio.h#include stdint.h#include stdbool.h.docx
(APA 6th Edition Formatting and St.docx
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docx
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docx
(Dis) Placing Culture and Cultural Space Chapter 4.docx
(1) Define the time value of money.  Do you believe that the ave.docx
(chapter taken from Learning Power)From Social Class and t.docx
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
(a) The current ratio of a company is 61 and its acid-test ratio .docx
(1) How does quantum cryptography eliminate the problem of eaves.docx
#transformation10EventTrendsfor 201910 Event.docx
$10 now and $10 when complete Use resources from the required .docx
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
#include string.h#include stdlib.h#include systypes.h.docx
$ stated in thousands)Net Assets, Controlling Interest.docx
#include stdio.h#include stdlib.h#include pthread.h#in.docx
#include customer.h#include heap.h#include iostream.docx
#Assessment BriefDiploma of Business Eco.docx
#include stdio.h#include stdint.h#include stdbool.h.docx

Recently uploaded (20)

PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Basic Mud Logging Guide for educational purpose
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Lesson notes of climatology university.
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Computing-Curriculum for Schools in Ghana
2.FourierTransform-ShortQuestionswithAnswers.pdf
Insiders guide to clinical Medicine.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
GDM (1) (1).pptx small presentation for students
Basic Mud Logging Guide for educational purpose
Sports Quiz easy sports quiz sports quiz
Lesson notes of climatology university.
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPH.pptx obstetrics and gynecology in nursing
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
RMMM.pdf make it easy to upload and study
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Final Presentation General Medicine 03-08-2024.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Computing-Curriculum for Schools in Ghana

Best e-Mail Security PracticesUsing Email Safely E-mai.docx

  • 1. Best e-Mail Security Practices Using Email Safely E-mail is everywhere. The system which allows messages (along with attachments, such as photos or documents) to be sent to a person or multiple person changed the way people and businesses communicate. For instance, a document that once had to be faxed, mailed through the postal service, or even scanned in and loaded on to a disk to be hand delivered could now be sent almost instantaneously. The email system that most people know today grew out of the late 1980s, when Internet service providers such as Prodigy and AOL provided all-in-one products for the masses, with e-mail, instant messaging, games, news headlines, and eventually Internet access. More tech-savvy computer users had more advanced Internet service providers, which may have only provided access to e-mail that could be used with a dedicated program, such as Microsoft Outlook. But with the beginning of email came the beginning of cybercrime looking to exploit the system to spread malware and scam an unsuspecting public. Whereas cybercriminals once had to rely on spreading viruses by hand via floppy discs or to only users who patched into dial-up local bulletin board systems, the dawn of email then gave them a chance to spread
  • 2. malware to the masses. Although e-mails can be used to spread malware, there are security practices a computer user can employ to make themselves and their computers safe. Be wary of all attachments and links When strictly speaking of e-mail, the most dangerous ways malware can be passed on is through attachments and harmful links. Computer viruses specifically need to be attached to a form of executable code in order for its trap to be sprung. Cybercriminals therefore will implant viruses on seemingly desirable files (such as a PowerPoint presentation with beautiful photography) and send it on to a few people, knowing it will continue to be passed on. Once the PowerPoint file is executed by a target, the virus will be executed as well, and begin to do its damage. This brings up two points. First, any attachment – especially ones that have been forwarded on and on – can harbor dangerous malware. And even if the file itself isn’t dangerous, and malware implanted on a computer can act as a beacon to other cybercriminals for them to know this computer can easily be attacked again. Secondly, and more importantly, many computer experts will warn users to be wary of attachments from unfamiliar people. However, the fact that e- mails that come from friends – whether forwarded on purpose or because of a virus – can in fact contain malware. Only open attachments that can be verified that was delivered directly from a reliable source. And never open or forward any chain emails. Delete them
  • 3. immediately. Don’t be fooled Oftentimes, cybercriminals don’t have to worry about whether a target computer is protected or not. They use social engineering techniques to trick people into giving up their private information without any malicious software. Most commonly in e-mail form, this comes in phishing. Phishing is when a cybercriminal uses a reasonable facsimile of an e-mail that looks like it may have come from an honest business. These may be an online banking service, an online retailer (like eBay), or the target’s Internet service provider. However, these emails usually ask for information that a reputable business would never ask of their customers, such as login and password information or a Social Security number. Other types of social engineering such as 419 Scams operate in much the same way, except they aren’t as polished as phishing. These scams send out farcical e- mails, such as a Nigerian prince needing to escape his war-torn nation, that implores the target to wire the sender some money, and they will be rewarded with riches beyond their dreams. Most people understand that this is a sham, but they only need one or two people to fall for it in the thousands of e- mails sent out in order to make thousands of dollars. If an offer sounds too good to be true, it probably is. Learning about these kinds of scams can help protect users and make their e-mail more secure.
  • 4. Keep personal information private The College of New Jersey made an interesting point when explaining e-mail safety. Many people think of emails as secure and private. This is just not so, especially with cybercriminals who are far more technically advanced than the average computer user. The college made this analogy: Think of writing an e-mail as writing a message on a postcard with a pencil. Any e-mail can be viewed and changed. Never put any personal information in any e-mail, even if the recipient is a reliable source. Norton AntiVirus Home | Norton Comparison | Norton Q&A | Security Resource Center | Customer Testimonials | Tools | Norton Coupons | A bout NA V Center International co nve rte d by W e b2P DFC o nve rt.co m javascript:void(0); ../norton-australia/ ../norton-canada/ ../norton-danmark/ ../norton-deutschland/ ../norton-espana/ ../norton-france/ ../norton-ireland/ ../norton-italia/ ../norton-nederland/ ../norton-new-zealand/
  • 5. ../norton-norge/ ../norton-suomi/ ../norton-sverige/ ../norton-uk/ http://www.nortonantiviruscenter.com/ http://www.nortonantiviruscenter.com/ http://www.nortonantiviruscenter.com/ ../norton-comparison.html ../nav-questions-answers.html ../security-resource-center/ ../norton-testimonials/index.html ../tools/ ../norton-coupons-rebates.html ../about.html cybercrime.html malware.html computer-viruses.html phishing.html ../store/norton-html.php?m=usnavc http://www.web2pdfconvert.com?ref=PDF http://www.web2pdfconvert.com?ref=PDF Safety precautions It also helps to keep a computer’s operating system software up to date. This will keep computers fixed with the latest patches that correct known vulnerabilities in the software. Also, use subscription- based antivirus software, such as Norton AntiVirus. This antivirus software features e-mail scans that can warn users if an attack is coming through messages. Keep these suggestions in mind when sending e-mails to make sure to have a secure experience.
  • 6. << Back to article index © 2007-2014, No rto n AntiVirus C e nte r, All rights re se rve d Abo ut Us - C o nta ct - P riva cy P o licy - Discla im e r - Site Ma p co nve rte d by W e b2P DFC o nve rt.co m os-antivirus-software-up-to-date.html ./ http://www.nortonantiviruscenter.com/ ../about.html ../contact.html ../privacypolicy.html ../disclaimer.html ../site-map.html http://www.web2pdfconvert.com?ref=PDF http://www.web2pdfconvert.com?ref=PDF