Most attachments are simply a means of
document delivery. However, it has also become commonplace for
hackers to use attachments to launch cyber-attacks, typically with
executable code, which produce many varied effects, some highly
destructive and malicious. When a recipient receives a suspicious
attachment, it should be scanned and, unless it is from a trusted
source, not opened. Some corporations, hosting companies, and ISPs
will block, quarantine, or remove files with specifically
identified file extensions. It is beneficial to consider at least some
of these security measures to prevent inadvertent file removal. Care
should be taken as well not to forward such messages without a security
scan.
1. Do not send attachments that are not
needed.
2. Do not return attachments when
replying. The original sender knows what he or she attached.
Finally, when attachments are sent,
some may have similar names as other files on the sender’s system.
With an inadvertent slip, the wrong attachment may go out, perhaps
a compromising or confidential document. Therefore, opening
attachments to validate they are appropriate and correct is
critical to a proper email process.
++++++++++++++++++++++++++++++++++
Great news and an announcement! My book, NetiquetteIQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email has gone on sale at the CreateSpace estore:http://createspace.com/4083121
As a NetiquetteIQ blog reader, you can use the discount code KBQALZA7. This discount is only through the estore. Thank you for your support on the blog and with the book. The book and Kindle version will soon be available on Amazon.
More good news!
The Kindle version of my book is now available! Go to the following site to purchase it:
http://www.amazon.com/dp/B00FFAMN0U
#PaulBabicki
#netiquette
Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com
Please visit our website http://netiquetteiq.com
1 Comments:
Conducting business using email comes with responsibilities. Obviously we are not perfect but if email is the means by which we are to conduct our business, this book addresses a good set of appropriate actions and what amounts to at set of mutual responsibilities.
Post a Comment
Subscribe to Post Comments [Atom]
<< Home