How To Practice Good Email Hygiene For Cybersecurity
September 30, 2020 | Cyber Security, Cyberattack
A global pandemic state of emergency or not, cyberattacks are increasing at a rapid speed. Did you know that a company can go out of business within six months of a cyberattack?
With the newer forms of attacks like spoofing, Man-in-the-middle (MiTM) or social engineering, the hackers consistently trying to trick the human brain.
However, 80% of cyberattacks are preventable.
Here is how you can review emails to spot malicious motives that may compromise you for cyberattack
Check Sender’s Name and Email Address
If the sender’s name is too vague, then look them up on their company profile or social media channels like LinkedIn will be a good idea.
The company name and the internet country code in the email address is another piece you should look carefully at. Malicious emails usually have spelling errors, unfamiliar internet codes or the name of a legitimate company is used with tricky spellings. For example: google spelled with an additional o ‘gooogle’ or apple with an additional p ‘Appple’.
Look At The Salutation And Name Of The Addressee
If the salutation is too common or not addressed to you or your name is spelled wrong.
Look For Grammatical Errors In The Body Of The Email
The most common sign of a malicious email is the poor grammar in the form of spelling errors, punctuation errors, or if the message is hard to understand throughout the correspondence, it is possibly a malicious attempt.
Check If The Email Shows Unusual Urgency
Often, malicious emails are drafted to show unusual urgency by using adjectives such as urgent, must reply, required, now, immediately and more. If an email is received as the act of social engineering where the urgent email appears to be coming from someone you know, it is always a good idea to call and confirm before sending critical information.
Look For Bad Links Or Attachments
The rule of thumb when it comes to protecting yourself from cyberattacks is never to click on a link or download any attachments from a suspicious email. Opening attachments or clicking links may install malware like viruses, spyware or ransomware.
Always hover over hyperlinks before clicking on it to check its path for legitimacy.
As a conclusion, remember that if you receive an unexpected email from inside or outside your organization, always spend extra time reviewing the email and checking for legitimacy.
Back to all blogs