Idealogical Systems Inc.
Search

How To Practice Good Email Hygiene For Cybersecurity

September 30, 2020 | example of a spam email, example of a hacker email, how to check is an email is spam, how to check a hacker email, how to know if an email is a cyberattack

How To Practice Good Email Hygiene For Cybersecurity

A global pandemic state of emergency or not, cyberattacks are increasing at a rapid speed. Did you know that a company can go out of business within six months of a cyberattack?

With the newer forms of attacks like spoofing, Man-in-the-middle (MiTM) or social engineering, the hackers consistently trying to trick the human brain.

However, 80% of cyberattacks are preventable.

Here is how you can review emails to spot malicious motives that may compromise you for cyberattack

Check Sender’s Name and Email Address            

If the sender’s name is too vague, then look them up on their company profile or     social media channels like LinkedIn will be a good idea.

The company name and the internet country code in the email address is another piece you should look carefully at. Malicious emails usually have spelling errors, unfamiliar internet codes or the name of a legitimate company is used with tricky spellings. For example: google spelled with an additional o ‘gooogle’ or apple with an additional p ‘Appple’.

Look At The Salutation And Name Of The Addressee

If the salutation is too common or not addressed to you or your name is spelled wrong. 

Look For Grammatical Errors In The Body Of The Email

The most common sign of a malicious email is the poor grammar in the form of spelling errors, punctuation errors, or if the message is hard to understand throughout the correspondence, it is possibly a malicious attempt.

Check If The Email Shows Unusual Urgency

Often, malicious emails are drafted to show unusual urgency by using adjectives such as urgent, must reply, required, now, immediately and more. If an email is received as the act of social engineering where the urgent email appears to be coming from someone you know, it is always a good idea to call and confirm before sending critical information.

Look For Bad Links Or Attachments

The rule of thumb when it comes to protecting yourself from cyberattacks is never to click on a link or download any attachments from a suspicious email. Opening attachments or clicking links may install malware like viruses, spyware or ransomware.

Always hover over hyperlinks before clicking on it to check its path for legitimacy.

As a conclusion, remember that if you receive an unexpected email from inside or outside your organization, always spend extra time reviewing the email and checking for legitimacy. 

 

Back to all blogs