There’s a common technique of sending direct mail disguised as courts summons or other official documentation, to make a response more likely. Many phishing emails take basically the exact same approach, only in digital form. That is, they might use all-caps subject lines (e.g., “URGENT:”) to make it seem like action is required. It isn’t. […]
Email attachments are risky. They might contain malware, or be so large that they eat up too much space in your inbox. The best approach is to not open them and delete them, unless they come from a trusted sender. Encourage your contacts to share via cloud links instead.
It’s a good idea to have a separate email account just for mailing lists. That way, you lower the risk of getting offers in your inbox that are actually attempts at phishing. Keep one account just for emailing trusted friends, family members and contacts, and another for everything else.
Not to be confused with the closing salutation at the end of an email, an electronic (or digital) signature proves that a message hasn’t been tampered with. It’s the digital equivalent of a wax seal on an envelope. Some email providers like Outlook have built-in signature capabilities, and there are also third-party tools like Chrome […]
It might seem like more trouble than it’s worth, but having multiple email accounts can be beneficial to your cybersecurity. This setup lets you avoid giving out your personal email to email newsletters and marketing campaigns, decreasing the risk of phishing and spam.
Phishing emails are usually carefully crafted to look like legitimate communications. They still give themselves away in subtle ways, though. For example, check the subject line: If it includes your email address or an all-caps call to action, do not engage.
Privacy /
Legal
Cookie Policy
Do Not Sell My Information
Copyright ©2024 Total Defense LLC. All Rights Reserved.
At Total Defense we take your privacy seriously. We recently made updates to our privacy policy to comply with the European Union’s General Data Privacy Regulation. This policy explains:
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.opentext.com/about/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.