Message > All Headers.
In Outlook, open the email you want to check, and then click File > Properties.
Check to see:
if the "from" email address matches the name of the person displayed as the sender;
that the "reply-to" address is the same as the sender or the site that the email purports to be from;
that the "return-path" is the same as the reply-to - you don't want to think you are replying to "John Doe" when your response will go to "Scammy McScammer".
The email header is a good starting point, but you'll also want to ask yourself about the content of the message. If you weren't expecting a message from that individual or organization, think twice. Also, look out for spelling or grammatical errors. A difficult-to-read message could indicate an unsolicited email from someone with a limited grasp of English.
If the email is pressuring you to act quickly or making an emotional plea for you to do something, be wary. Scammers often rely on urgency or our desire to help. That's how they trick people into clicking on links or open attachments.
Better Safe Than Sorry
If you aren't sure about an email's legitimacy, slow down. Before you act, go to your contact list and send a direct message to that sender's address to confirm the request. Or call the sender or company the sender apparently represents to verify that the email is a real one.
A managed service provider (MSP) can help you better manage email safety. Ask our IT experts to help set up email filtering and monitoring to avoid malware infection. Click below to get started!
The number of emails we get daily can be overwhelming. We could be excused for not looking at them all closely â€“ well, almost. Except that not taking care to review emails for signs of spoofing could be a real risk to your business. Learn about email spoofing and how to avoid it in this article. [Read more…]
We send an estimated 306 billion emails every day globally, personal and professional. Still, it’s not secure. Any private data, proprietary information or sensitive documents sent are at risk.
Sending an email is convenient and quick, but when it comes to confidential data, you’re better off choosing another method of delivery, one that doesn’t have as many potential points of access for an ill-intentioned actor.
Think about the path an email travels:
First, you write it on your PC, laptop, tablet, or phone. This stores the information in your email program. A hacker who has accessed your device using malware could read it.
The email then goes out to your email server. If that server is hacked, your data is at risk.
Your message then travels through online networks to reach your recipient, but there’s no guarantee those networks are secure, especially not if you are crafting and sending that email from a public network in an airport or at a coffee shop.
The email then hits the recipient’s email server, then their email program, and then their device. But the same risks that arose at your end are replicated on their side of the exchange, too.
Basically, when you send an email you lose control of the security of that communication, and potential problems abound:
Hackers could be intercepting and reading your email.
You can’t be certain that your recipient’s server or storage is encrypted at all times.
A bad actor could impersonate a server to intercept messages, and you wouldn’t know any better.
Your recipients may save that email in their mailbox for months or even years. Down the road, if they are compromised, your email is vulnerable.
Recipients can inadvertently forward that email on to unexpected parties.
You can’t assign permissions or password protect that email.
The Solution to Email Insecurity
Stop sending sensitive information via email. Instead, select a method that allows you to check and control who has access to that data. This could mean uploading the information to a private portal or sending using an encrypted file-sharing service such as Google Drive or Dropbox. There are also encrypted messengers such as Signal, Wire, and Wickr Me, which offer end-to-end encryption and autodelete data to cut the risk of email exposure.
If the recipient needs a username and password, send the two credentials separately. You might text them the password, mail it, or call and give it to the individual directly. When using a system that sends a password email to the user, contact that individual direclty. Ensure that they receive the email, log in, and change the password to something else.
A virtual private network (VPN) is another good tool for securing email. A VPN is like an online tunnel that keeps your email traffic safe. The message sent or received is encrypted from the rest of the internet. In fact, the VPN masks your internet protocol (IP) address, too, meaning you are also protecting your original location.
Sending information online is a tricky business. Don’t put your sensitive information at risk by relying on email communications. Instead, use the solutions above to protect your private and proprietary data.
A managed service provider can set up the solutions you need. Book an appointment today to protect your conversations online.
The Monty Python “Spam” sketch makes us laugh, but business emails filtered as spam do not. Your business wants to reach its prospects and customers. This article shares tips to help you ensure customers get your messages. [Read more…]
When you sign up for an internet service, the provider will often hook you up with an email address, too. Your internet service provider (ISP) wants to keep you connected to them. But this convenient email address isn’t always the best long-term solution for you.
That “email@example.com” email address (@shaw.ca, telus.net, telusplanet.net, etc) may work fine. You use it to keep in touch with your family and friends, you get bills to that address, and you’ve used it to log in to your social media and online news and shopping sites. [Read more…]
Why You Should Never Use A Free Email Address For Your Business
The message is clear: email is king. Many clients and customers choose to communicate primarily by email and as you know, it gives a fantastic ROI in your marketing strategy…unless you’re using a free email like Hotmail, Gmail, or even your internet provider. If that’s the case, you’re losing business each and every day. [Read more…]
Tony is knowledgeable, friendly and efficient.Read More
Tony was great to do business with. He knew exactly what needed to be done even with the little amount of information I had about the project!!! Competitive pricing I will definitely call him again!!Read More
Very friendly, personable and present when explaining what is going on with the computer, appreciated a good dialogue and helpfulness you provided!Read More
Tony is the best IT computer guy I have ever used, he has fixed problems the big guys said I had to buy a new computer for and then I got him to set up internet stuff for the house...again awesome and someone I trust. (from google.com)Read More
Y-Not Tech Services is a excellent tech company that answers all your questions regarding computer problems. Tony is completely honest in explaining options to deal with the problem, and then recommends the best option to use. His advice is based on not just his own consensus, but as well checks with other techs in his...Read More
Tony walked in to drop off a business card and when he walked out. 3 issues I had on my computer were gone and I had a new anti virus. Phenomenal service I would recommend him to anyone ! (from facebook.com/ynottechservices)Read More