email security Georgetown TXEmail communication is part of doing business. We do it every day. It is also one of the most common ways to get infected or get your information stolen. How do we protect ourselves while still relying on email?

4 Steps to Handling Suspicious Emails & Attachments

  1. Before clicking on anything, look at the email. Were you expecting it? Is it really from the sender or were they spoofed? If the answer to either of these questions is no, delete it and walk away
  2. If you do click on a link or an attachment, does it prompt you for credentials of any kind? You should never put any credentials into a google doc, for example, as that is one of the most common phishing scams out there.
  3. If it is suspicious, it doesn’t hurt to reach out to the sender and ask if they sent you something. It only takes a second to send back a yes or no, and protecting yourself from a scam or virus is worth the extra time.
  4. If it’s malicious, delete it and remove it from the trash.

Of course, having up-to-date Antivirus protection and email protection is a good start, but these four steps are a reminder to use common sense too.

If you would like more information on the latest technology tools to keep you and your business safe, contact CTTS at (512) 388-5559
2841270107

 

By Josh Wilmoth
CEO, Central Texas Technology Solutions