Emails

?
... are used for phishing, which is a way to steal data.
... can be gateways for malware.
... can be used to deceive with fake sender addresses.

?
Check the sender, subject, content, and attachments for credibility.
If you have any doubts, contact the IT department or ask the sender again before opening any suspicious attachments.
Use email signatures as an additional protective measure to verify the sender's address and the contents of the message.
Phishing | BSI
Spam not only clogs email inboxes and instigates fraud attempts, but it also often infects recipients' systems with malicious programs that spy on personal data. This type of cybercrime is called phishing, an artificial word made up of "password" and "fishing".
Source: BSI
Three Checkpoints for More Email Security | BSI
Scrutinize every email. If checking the three key points – sender, subject, and attachment – does not provide a clear picture, the BSI advises deleting emails before opening them. If you are unsure, ask the sender personally if they sent the email before opening it.
Source: BSI
Encrypt Emails | BSI
Every day, millions of emails are sent worldwide using various email programs. These messages pass through different nodes on the internet before reaching their recipients. Since the internet is not fully encrypted, there is a possibility that emails can be intercepted en route.
Source: BSI