Changes

Jump to navigation Jump to search
no edit summary
Line 60: Line 60:  
:* Make sure that the Web address or attachment is relevant to the content of the email.   
 
:* Make sure that the Web address or attachment is relevant to the content of the email.   
 
:* Make sure that the sender’s email address has a valid username and domain name. A suspicious email address could be similar to the one below: 
 
:* Make sure that the sender’s email address has a valid username and domain name. A suspicious email address could be similar to the one below: 
::* '''“John Doe <ohndoe.%nklo17er@gkmail.com>”'''
+
::: '''“John Doe <ohndoe.%nklo17er@gkmail.com>”'''
    
'''How do you handle malicious emails?''' Always maintain a high level of cyber awareness and scrutinize all emails before opening them. If you receive a suspicious email or suspect malicious activity, report the incident to your IT Service Desk and/or your Organization’s Security Team and follow their instructions.   
 
'''How do you handle malicious emails?''' Always maintain a high level of cyber awareness and scrutinize all emails before opening them. If you receive a suspicious email or suspect malicious activity, report the incident to your IT Service Desk and/or your Organization’s Security Team and follow their instructions.   
2,964

edits

Navigation menu

GCwiki