Archives - Email Tips


Always report suspicious account activity

For most online accounts, you’ll receive a login notification or verification email whenever you input your credentials. These are a great way for service providers to confirm it’s really you trying to access your account, but if it’s something you do frequently you might get a little complacent about receiving those emails or messages. Don’t […]

Keep your out of office auto-reply vague

Setting up an out of office auto-reply for your email is pretty common practice, especially for work. But be mindful of how much you divulge when you write it. Saying that you’re leaving the country and for how long advertises that your home will be empty. Keep it simple and vague, saying that you’re currently […]

Don’t ever open unsolicited email attachments

Email attachments are risky. They might contain malware, or be so large that they eat up too much space in your inbox. The best approach is to not open them and delete them, unless they come from a trusted sender. Encourage your contacts to share via cloud links instead.

Use a few personal email accounts

It’s a good idea to have a distinct email account just for mailing lists. That way, you lower the risk of getting offers in your inbox that are actually attempts at phishing. Keep one account just for emailing trusted friends, family members and contacts, and another for everything else.

Be careful with links and when entering website addresses

Use caution when clicking directly on links in emails, even if the sender appears to be someone you know. Attempt to independently verify website addresses (e.g., contact your organization’s helpdesk, search the internet for the sender organization’s website or the topic mentioned in the email). Pay attention to the website addresses you click on, as […]

Be careful what you download

It can be easy to simply allow a download to go ahead on your device, especially if you think the source appears reputable. Be wary of any files that you download and question their authenticity before confirming the download. This is particularly pertinent for email attachments — where the sender may look legit, but could […]