النسخة العربية

Oman National CERT Towards a safe cyber environment

Regional Cybersecurity Week 2019

Regional Cybersecurity Week 2019

The 2nd Regional Cybersecurity Week will be held from 27th to 31st October 2019 in Kempinski Hotel, Muscat, Sultanate of Oman...

View
OIC-CERT Drill 2019

OIC-CERT Drill 2019

The OIC-CERT1 Drill is an annual event for the OIC-CERT member teams ...

View
National Cyber Security Drill ( Malware and dark web: The Persistent Threat )

National Cyber Security Drill ( Malware and dark web: The Persistent Threat )

The objective of this Cyber Drill is to enhance communication, teamwork, and participating teams’ incident response capabilities to ensure continued collective efforts against cyber threats through the CIRT of the region.

View
Oman Threat Hunters 2019

Oman Threat Hunters 2019

The ITU- Arab Regional Cybersecurity Centre (ITU-ARCC), hosted by Information Technology Authority and Oman National CERT, and in partnership with Silensec , is organizing “Threat Hunters 2019” , a national cybersecurity competition.Registration is open now through : https://cyberstars.pro/profile/register/

View
ISO/ IEC 27001: 2013 Lead Auditor training course – IRCA Certified

ISO/ IEC 27001: 2013 Lead Auditor training course – IRCA Certified

The ISO/IEC 27001 Lead Auditor training is an intensive five-day course where you’ll discover internationally- recognized best practice auditing techniques so you can confidently lead auditing activities...

View

Share it

Online Incidents Report
Request OCERT Services
Information Security Glossary

Article Details

 

Securing your Email

Securing your Email

Category: Email Security | Published Date: 10/08/2011 | Author: OCERT | Rating: Securing your Email(11118 Votes)


E-mail security threats

  • Attachments. E-mail attachments are the most frequently used hacking method, so don’t open attached files if you don't know their sources and not scanned for viruses. Especially if the file is of the executable, command or application type.
  • Spams messages. Also known as junk e-mail. These are emails sent by marketing companies and sites that get and exchange or sell email addresses.
  • Chain letters. These emails contain false news and fabricated stories, and may also contain malicious programs. The email may ask you to forward it again to those who know. These are hoax emails. If you participate in the forwarding you are simply acting on behalf of a hacker.
  • Phishing. Phishing refers to the process of attempting to steal sensitive information such as passwords or bank account information through e-mail. Phishing is typically carried out by e-mail and it often directs users to a fake website that looks identical to a trusted site, such as a credit card company or a bank.

Tips on receiving an email message

  • Always treat attachments on emails with caution, especially those ending with extensions such as .exe, .bat or .com.
  • Scan e-mail attachments before opening. 
  • Do not keep or forward junk mail and never reply to it.
  • Use encryption or at least Password to protect e-mails with sensitive information.
  • Type the URL and do not click on links embedded within an e-mail.

Tips on sending an email message

  • Do make messages clear and easy to understand.
  • Email should be regarded as published information.
  • Do be respectful in the way messages are written whatever they are about. 
  • Do not forward chain letters to others.
  • Do not use e-mail to avoid face to face communication with someone.
  • Do not use e-mail as a method of managing people.
  • Do not send an e-mail out of anger.
  • Do not send e-mail which is aggressive, anti-social or discriminatory.
  • Do not use work e-mail for personal messages or advertising.
  • Consider whether a phone call may be a better way of discussing a complex or confidential matter. 
  • Work e-mails should have disclaimers attached.

Remember

  • E-mail system is a formal means of communication between organisations.
  • Someone else other than the recipient may read your e-mail.
  • The content of an e-mail could constitute harassment.
  • E-mails can be used as criminal evidence.
  • E-mail misuse could lead to disciplinary action.

For your reputation

Do not use your official e-mail ID to register for social sites.


Tips to make you more secure and productive

  • Don't send private messages with the company account. 
  • Use the email automatic reply feature when you are out of work for a long time.
  • Don’t send email attachments to people using mobile phones to browse their emails. A plain text is enough.
  • Reduce junk emails by adding senders to the blocked list.
  • If the file you want to send is on the web, there is no need to attach it. Just refer to its safe location.
  • Some spam emails include a link saying "click here to cancel your subscription" Don’t click on it unless you are sure that you have subscribed, as the consequence can be more junk mail.
  • If you feel that you received an email containing a virus delete it immediately and carry out a full pc scan with an updated antivirus program.