Changes

Jump to navigation Jump to search
no edit summary
Line 59: Line 59:  
:* Make sure you know the sender of an email and that its tone is consistent with the sender.   
 
:* Make sure you know the sender of an email and that its tone is consistent with the sender.   
 
:* Make sure that the Web address or attachment is relevant to the content of the email.   
 
:* Make sure that the Web address or attachment is relevant to the content of the email.   
:* Make sure that the sender’s email address has a valid username and domain name. A suspicious email address could be similar to the one below: “John Doe <ohndoe.%nklo17er@gkmail.com>”. 
+
:* Make sure that the sender’s email address has a valid username and domain name. A suspicious email address could be similar to the one below:
 +
::* '''“John Doe <ohndoe.%nklo17er@gkmail.com>”'''
    
'''How do you handle malicious emails?''' Always maintain a high level of cyber awareness and scrutinize all emails before opening them. If you receive a suspicious email or suspect malicious activity, report the incident to your IT Service Desk and/or your Organization’s Security Team and follow their instructions.   
 
'''How do you handle malicious emails?''' Always maintain a high level of cyber awareness and scrutinize all emails before opening them. If you receive a suspicious email or suspect malicious activity, report the incident to your IT Service Desk and/or your Organization’s Security Team and follow their instructions.   
2,964

edits

Navigation menu

GCwiki