Archives - Email Tips


Perform routine activities from a non-administrator account

If you’re sending an email or quickly checking a website on a PC or Mac, do so from a non-administrator account. That way, if something goes wrong, the permissions available to the attacker or malware will be much less extensive, stemming the potential damage.

Create a dedicated or burner email for website signups

Providing your email address to a website is often a necessary step for setting up an account. To reduce the amount of mail you receive and avoid phishing more generally, consider using a dedicated email address separate from your personal account. For forums or other quick and non-vital signups, a burner email address might be […]

What is spam?

Spam is the electronic version of “junk mail.” The term spam refers to unsolicited, often unwanted, email messages. Spam email is a common and frustrating side effect to having an email account. Spam does not necessarily contain viruses—valid messages from legitimate sources may also fall into this category.

What is a phishing attack?

Phishing is a form of social engineering. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. For example, an attacker may send email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem. When users respond […]

Be careful about releasing your email address to reduce spam

Think twice before you respond to any request for your email address, on the web, verbally, or on paper. Spammers can harvest any email address posted on a website. If you give your email address to a company, that information is often entered into a database so that customer information and preferences can be tracked. […]

Avoid getting too personal in emails

Just as it’s impossible to unring a bell, it’s difficult to control sensitive information divulged in emails, as it might be intercepted or surfaced in searches even long after the fact. Don’t share personally identifiable information over email if at all possible. In particular, do not hand it over in response to unsolicited requests from […]