Emails

?

... are used for phishing, which is a way to steal data.

... can be gateways for malware.

... can be used to deceive with fake sender addresses.

?

Check the sender, subject, content, and attachments for credibility.

If you have any doubts, contact the IT department or ask the sender again before opening any suspicious attachments.

Use email signatures as an additional protective measure to verify the sender's address and the contents of the message.

Phish­ing | BSI

Spam not only clogs email inboxes and instigates fraud attempts, but it also often infects recipients' systems with malicious programs that spy on personal data. This type of cybercrime is called phishing, an artificial word made up of "password" and "fishing".

Source: BSI

Three Check­points for More Email Se­cur­ity | BSI

Scrutinize every email. If checking the three key points – sender, subject, and attachment – does not provide a clear picture, the BSI advises deleting emails before opening them. If you are unsure, ask the sender personally if they sent the email before opening it.

Source: BSI

En­crypt Emails | BSI

Every day, millions of emails are sent worldwide using various email programs. These messages pass through different nodes on the internet before reaching their recipients. Since the internet is not fully encrypted, there is a possibility that emails can be intercepted en route.

Source: BSI

No-Phish­ing Train­ing

The SECUSO (Security, Usability, Society) research group has developed a training program to help people recognize fraudulent messages. The program uses quizzes and games.

Phish­ing At­tack: What to Do?

The "BSI-ProPK-Checklist-Phishing" page from the German Federal Office for Information Security (BSI) provides a thorough checklist for safeguarding against phishing attacks.

More info:

Check out our new F.A.Q. to learn more about IT security!