SlideShare una empresa de Scribd logo
1 de 43
Email Basics
Email
   Guidelines / etiquette
   Privacy
   Spam
   Hoaxes/chain letters
Guidelines / Etiquette
Basic Guidelines
   Length
       Be concise, to the point
   Use the subject line
       Senior Services rule – no complete client
        names
   Read it carefully before sending it
   Be professional
Tone
   We all interact with the printed word as
    though it has a personality and that
    personality makes positive and negative
    impressions on us
   Without immediate feedback your message
    can easily be misinterpreted by your reader,
    so it can be important to follow the basic
    rules of etiquette to construct an appropriate
    tone
Tone
   AVOID ALL CAPITAL LETTERS
   Humor, sarcasm – can be difficult to
    convey and/or interpret
   Emoticons – use - sparingly :-)
Emoticons
:-) = Happy

:-( = Sad

;-) = Wink (sarcasm)

:-0 = yell
Identify Yourself
   Signature
       Full name
       Title
       Company
       Address
       Phone number
       Fax number
Replies and Forwarding
   Use the “reply to” or “reply to all” option
       Maintains a link to the original message
       Maintains “thread” of correspondence
   Forwarding message
       Not the same as replying
       Mail original message to someone other than the
        sender
       Use caution when forarding private or sensitive
        messages without the permission of the sender
       May be inappropriate to forward a portion of a
        message
Using the “CC:” Field
   Carbon Copy
   Everyone in the “To” and “CC” fields are
    visible
   “This email is not addressed to you,
    you’re just getting a copy” (FYI)
   Can be overused
   “Reply to All” will be sent to everyone in
    the “CC” and “To” fields
Using the “Bcc” field
   Blind Carbon Copy
   Conceals addresses from other
    recipients
   Use for mass mailings
       No need for others to see list of recipients
   Will not receive a “Reply To” or “Reply
    to All” message
Email Attachments
   Never open an unexpected attachment
       Even from someone you know
   Used to spread viruses
   Scan questionable attachments
       On demand scan / scan upon open
   When sending attachments, tell the recipient
       The name of the file
       The program it is saved in
       The version of the program
Etiquette - Flaming
   Verbal attack
   Not an appropriate use
   Ignore
   Steps to avoid
       Carefully read messages before sending
       Don’t send messages in all upper case
       Don’t send insulting email
       Don’t send mass-mailing advertisements
Privacy of Email
Privacy of Email
   Not a secure form of communication
   Don’t send secret or confidential information
       Credit card information
       Social security number
       Passwords
   More like a postcard than a sealed letter
   Think before you forward
       Do you have the sender’s permission?
Privacy of Email
   Subject to review with sufficient
    justification
       Court order
       Evidence as part of an investigation
   Message may be mistakenly addressed
       Return message to sender and delete
When NOT to Communicate
Via Email
   Don’t send email of a sensitive or confidential
    nature
   Don’t use email to communicate complaints
    or dissatisfaction with someone
       Have a phone or face-to-face conversation with
        the person
       Promotes 2-way communication
   If you find yourself responding more than 3
    times on the same topic ~
       Have a phone or face-to-face conversation with
        the person
Privacy of Email
   If you wouldn’t want it broadcast on the
    6:00 news – don’t put it in an email!!
Hoaxes and Chain Letters
Purpose and Cost
   Send to everyone
   Messages true??
   Appeal to sense of good will
   Cost
       Time to read
       Stress placed on servers
   Spammers harvest email addresses
    from hoaxes and chain letters
Cost of Hoaxes and Chain
Letters
   Send to 10 people
       They send to 10 people (100)
            They send to 10 people (1,000)
                 They send to 10 people (10,000)
                     They send to 10 people (100,000)


   …. They send to 10 people
            “six degrees of separation”

   1,000,000 - 1 million people !
Examples
Hoax/Chain Letter Prevention
 Do NOT forward the message
 Sites used to check validity:

Snopes: http://www.snopes.com
Hoaxbusters:
  http://hoaxbusters.ciac.org/HBHoaxInfo.html
F-Secure:
  http://www.f-secure.com/virus-info/hoax
McAfee: http://vil.nai.com/vil/hoaxes.aspx
Phishing
   Process by which someone obtains
    private information through deceptive
    or illicit means
       Used to falsely assume another
        person’s identity
   Most commonly an email stating your
    account information needs updating
Phishing Example
Phishing Example
Phishing Example
Phishing Example
Phishing Example
How Secure Do You Need to
Be?
   Be prudent not paranoid
   Did you initiate the action?
   Is the source trustworthy?
   Best thing to do is to type in the URL and check your
    account directly without following any links in the
    email
   Watch for URL’s that are numeric or different from
    the link you clicked on
   Many legitimate emails no longer contain a link
    (Paypal)
   When in doubt Google it
Spam
Spam
   Junk mail
   Unsolicited bulk mailings
   Overloads mailboxes
       20 - 90% of incoming traffic
       Adult content, health promotions, software offers,
        investment ads, get-rich quick schemes
       Chain letters, hoaxes, jokes
   NEVER respond to spam!
Spam
   How they obtain email addresses:
       Posted on the web (chat, newsgroups, etc.)
       Web-based discussion boards
       Inappropriate sharing or sale of email addresses
       Companies not respecting user opt-out
        preferences
       Signing up for “offers”
       Guessing (random generation)
       Stealing via malware
Spam
   Spammers hide true source of mail
       Misconfigured mail servers allow this
       Sign up for free accounts
   Spam scanning system
       Determines if each message is spam
            Point system
            Lists / libraries / keywords
            Blacklist / Whitelist
            {BULK} = may be spam
Senior Services Response to Spam
   Defining spam
       Difficult
            Did you sign up for weight-loss tips?
            Are you really interested in advancing your
             degree on-line?
   Can’t block all sites
       Also include legitimate mail
   Barracuda spam firewall
Senior Services Response to Spam
         Barracuda Spam Firewall
   Rate control
   Recipient verification
   Virus protection
   Fingerprint analysis
   Intent analysis
   Image analysis
   Spam rules scoring engine
   Policy (user-specified rules)
Senior Services Response to Spam
         Barracuda Spam Firewall
   Allowed 25,059 since April 18
   Blocked 786,312
       152 viruses
       1,788 “tagged”
   96.5 % BLOCKED at senior services
       Normally 20 - 90% of incoming traffic
Senior Services Response to Spam
   Set up filters to sort spam messages
       Place in junk mail folder and then review
Senior Services Response to Spam
   Reporting spam
       jpugh@seniorservices1.Org
Other Methods to Reduce
Spam
   Contact your congressperson
   Be cautious when giving out your email
    address
   Complain to the internet service provider
    where the message originated
       Forward the message
       Abuse@domain_name (
        abuse@seniorservices1.org, abuse@yahoo.com,
        abuse@school.edu)
Summary
   Email is a valuable communication tool
   Sometimes – it is NOT the best or most
    appropriate method of communication
   Follow the basic guidelines presented to
    improve the quality of your
    communications
Questions?
   Email: jpugh@seniorservices1.org
   Phone: 382-0515 ext. 122

Más contenido relacionado

La actualidad más candente

Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer JungleJason S
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackersseema Vishwakarma
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview PptAntonio Ieranò
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internetapemberton1
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attackClaranet UK
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...Liberteks
 
E mail etiquettes
E mail etiquettesE mail etiquettes
E mail etiquettesJpRawat
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats mohamad Hamizi
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
American Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy PolicyAmerican Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy Policyfarrahesham
 

La actualidad más candente (16)

Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview Ppt
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Common Email Security Mistakes
Common Email Security MistakesCommon Email Security Mistakes
Common Email Security Mistakes
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internet
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...
 
E mail etiquettes
E mail etiquettesE mail etiquettes
E mail etiquettes
 
Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
How to Detect Email Fraud
How to Detect Email FraudHow to Detect Email Fraud
How to Detect Email Fraud
 
Irm 13-phishing
Irm 13-phishingIrm 13-phishing
Irm 13-phishing
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
American Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy PolicyAmerican Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy Policy
 

Destacado

Sending Email Basics PHP
Sending Email Basics PHPSending Email Basics PHP
Sending Email Basics PHPProdigyView
 
Marathi Journalism in the 19th century
Marathi Journalism in the 19th century Marathi Journalism in the 19th century
Marathi Journalism in the 19th century Saurabh Deshpande
 
यशाची गुरुकिल्ली भाग 2
यशाची गुरुकिल्ली  भाग 2यशाची गुरुकिल्ली  भाग 2
यशाची गुरुकिल्ली भाग 2dattatray godase
 
Marathi Manus Kute Aahe
Marathi Manus Kute AaheMarathi Manus Kute Aahe
Marathi Manus Kute Aaheprasad_sakat
 
Basic Internet Introduction in English and Marathi
Basic Internet Introduction in English and MarathiBasic Internet Introduction in English and Marathi
Basic Internet Introduction in English and MarathiMayur Patil
 
Cultural Heritage of India
Cultural Heritage of IndiaCultural Heritage of India
Cultural Heritage of IndiaSargun Kohli
 
Rain water harvesting ppt
Rain water harvesting pptRain water harvesting ppt
Rain water harvesting pptPalash Jain
 
Pollution.Ppt
Pollution.PptPollution.Ppt
Pollution.PptSVS
 
The Science of Email Marketing
The Science of Email MarketingThe Science of Email Marketing
The Science of Email MarketingHubSpot
 

Destacado (13)

Sending Email Basics PHP
Sending Email Basics PHPSending Email Basics PHP
Sending Email Basics PHP
 
Elementary
ElementaryElementary
Elementary
 
Marathi Journalism in the 19th century
Marathi Journalism in the 19th century Marathi Journalism in the 19th century
Marathi Journalism in the 19th century
 
यशाची गुरुकिल्ली भाग 2
यशाची गुरुकिल्ली  भाग 2यशाची गुरुकिल्ली  भाग 2
यशाची गुरुकिल्ली भाग 2
 
Marathi Manus Kute Aahe
Marathi Manus Kute AaheMarathi Manus Kute Aahe
Marathi Manus Kute Aahe
 
Basic Internet Introduction in English and Marathi
Basic Internet Introduction in English and MarathiBasic Internet Introduction in English and Marathi
Basic Internet Introduction in English and Marathi
 
Maharashtra
 Maharashtra Maharashtra
Maharashtra
 
Circulatory system
Circulatory systemCirculatory system
Circulatory system
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
Cultural Heritage of India
Cultural Heritage of IndiaCultural Heritage of India
Cultural Heritage of India
 
Rain water harvesting ppt
Rain water harvesting pptRain water harvesting ppt
Rain water harvesting ppt
 
Pollution.Ppt
Pollution.PptPollution.Ppt
Pollution.Ppt
 
The Science of Email Marketing
The Science of Email MarketingThe Science of Email Marketing
The Science of Email Marketing
 

Similar a Email basics

A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 
Email strategies
Email strategiesEmail strategies
Email strategiesAlan Haller
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfHost It Smart
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxDr Ganesh Saini
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfChinmayee Behera
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxvdgtkhdh
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxamby3
 
Email Best Practices for Nonprofits
Email Best Practices for NonprofitsEmail Best Practices for Nonprofits
Email Best Practices for NonprofitsMolly Maple Bryant
 
Final paper
Final paperFinal paper
Final paperJDonpfd3
 
Security awareness
Security awarenessSecurity awareness
Security awarenessSanoop Nair
 
Bad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptxBad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptxGEETHA LATHA
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 

Similar a Email basics (20)

A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Email strategies
Email strategiesEmail strategies
Email strategies
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Spam
SpamSpam
Spam
 
Email
EmailEmail
Email
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptx
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Email Best Practices for Nonprofits
Email Best Practices for NonprofitsEmail Best Practices for Nonprofits
Email Best Practices for Nonprofits
 
Final paper
Final paperFinal paper
Final paper
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Good e mail practices
Good e mail practicesGood e mail practices
Good e mail practices
 
Bad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptxBad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptx
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 

Último

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Último (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Email basics

  • 2. Email  Guidelines / etiquette  Privacy  Spam  Hoaxes/chain letters
  • 4. Basic Guidelines  Length  Be concise, to the point  Use the subject line  Senior Services rule – no complete client names  Read it carefully before sending it  Be professional
  • 5. Tone  We all interact with the printed word as though it has a personality and that personality makes positive and negative impressions on us  Without immediate feedback your message can easily be misinterpreted by your reader, so it can be important to follow the basic rules of etiquette to construct an appropriate tone
  • 6. Tone  AVOID ALL CAPITAL LETTERS  Humor, sarcasm – can be difficult to convey and/or interpret  Emoticons – use - sparingly :-)
  • 7. Emoticons :-) = Happy :-( = Sad ;-) = Wink (sarcasm) :-0 = yell
  • 8. Identify Yourself  Signature  Full name  Title  Company  Address  Phone number  Fax number
  • 9. Replies and Forwarding  Use the “reply to” or “reply to all” option  Maintains a link to the original message  Maintains “thread” of correspondence  Forwarding message  Not the same as replying  Mail original message to someone other than the sender  Use caution when forarding private or sensitive messages without the permission of the sender  May be inappropriate to forward a portion of a message
  • 10. Using the “CC:” Field  Carbon Copy  Everyone in the “To” and “CC” fields are visible  “This email is not addressed to you, you’re just getting a copy” (FYI)  Can be overused  “Reply to All” will be sent to everyone in the “CC” and “To” fields
  • 11. Using the “Bcc” field  Blind Carbon Copy  Conceals addresses from other recipients  Use for mass mailings  No need for others to see list of recipients  Will not receive a “Reply To” or “Reply to All” message
  • 12. Email Attachments  Never open an unexpected attachment  Even from someone you know  Used to spread viruses  Scan questionable attachments  On demand scan / scan upon open  When sending attachments, tell the recipient  The name of the file  The program it is saved in  The version of the program
  • 13. Etiquette - Flaming  Verbal attack  Not an appropriate use  Ignore  Steps to avoid  Carefully read messages before sending  Don’t send messages in all upper case  Don’t send insulting email  Don’t send mass-mailing advertisements
  • 15. Privacy of Email  Not a secure form of communication  Don’t send secret or confidential information  Credit card information  Social security number  Passwords  More like a postcard than a sealed letter  Think before you forward  Do you have the sender’s permission?
  • 16. Privacy of Email  Subject to review with sufficient justification  Court order  Evidence as part of an investigation  Message may be mistakenly addressed  Return message to sender and delete
  • 17. When NOT to Communicate Via Email  Don’t send email of a sensitive or confidential nature  Don’t use email to communicate complaints or dissatisfaction with someone  Have a phone or face-to-face conversation with the person  Promotes 2-way communication  If you find yourself responding more than 3 times on the same topic ~  Have a phone or face-to-face conversation with the person
  • 18. Privacy of Email  If you wouldn’t want it broadcast on the 6:00 news – don’t put it in an email!!
  • 19. Hoaxes and Chain Letters
  • 20. Purpose and Cost  Send to everyone  Messages true??  Appeal to sense of good will  Cost  Time to read  Stress placed on servers  Spammers harvest email addresses from hoaxes and chain letters
  • 21. Cost of Hoaxes and Chain Letters  Send to 10 people  They send to 10 people (100)  They send to 10 people (1,000)  They send to 10 people (10,000)  They send to 10 people (100,000)  …. They send to 10 people “six degrees of separation”  1,000,000 - 1 million people !
  • 23.
  • 24. Hoax/Chain Letter Prevention  Do NOT forward the message  Sites used to check validity: Snopes: http://www.snopes.com Hoaxbusters: http://hoaxbusters.ciac.org/HBHoaxInfo.html F-Secure: http://www.f-secure.com/virus-info/hoax McAfee: http://vil.nai.com/vil/hoaxes.aspx
  • 25. Phishing  Process by which someone obtains private information through deceptive or illicit means  Used to falsely assume another person’s identity  Most commonly an email stating your account information needs updating
  • 31. How Secure Do You Need to Be?  Be prudent not paranoid  Did you initiate the action?  Is the source trustworthy?  Best thing to do is to type in the URL and check your account directly without following any links in the email  Watch for URL’s that are numeric or different from the link you clicked on  Many legitimate emails no longer contain a link (Paypal)  When in doubt Google it
  • 32. Spam
  • 33. Spam  Junk mail  Unsolicited bulk mailings  Overloads mailboxes  20 - 90% of incoming traffic  Adult content, health promotions, software offers, investment ads, get-rich quick schemes  Chain letters, hoaxes, jokes  NEVER respond to spam!
  • 34. Spam  How they obtain email addresses:  Posted on the web (chat, newsgroups, etc.)  Web-based discussion boards  Inappropriate sharing or sale of email addresses  Companies not respecting user opt-out preferences  Signing up for “offers”  Guessing (random generation)  Stealing via malware
  • 35. Spam  Spammers hide true source of mail  Misconfigured mail servers allow this  Sign up for free accounts  Spam scanning system  Determines if each message is spam  Point system  Lists / libraries / keywords  Blacklist / Whitelist  {BULK} = may be spam
  • 36. Senior Services Response to Spam  Defining spam  Difficult  Did you sign up for weight-loss tips?  Are you really interested in advancing your degree on-line?  Can’t block all sites  Also include legitimate mail  Barracuda spam firewall
  • 37. Senior Services Response to Spam Barracuda Spam Firewall  Rate control  Recipient verification  Virus protection  Fingerprint analysis  Intent analysis  Image analysis  Spam rules scoring engine  Policy (user-specified rules)
  • 38. Senior Services Response to Spam Barracuda Spam Firewall  Allowed 25,059 since April 18  Blocked 786,312  152 viruses  1,788 “tagged”  96.5 % BLOCKED at senior services  Normally 20 - 90% of incoming traffic
  • 39. Senior Services Response to Spam  Set up filters to sort spam messages  Place in junk mail folder and then review
  • 40. Senior Services Response to Spam  Reporting spam  jpugh@seniorservices1.Org
  • 41. Other Methods to Reduce Spam  Contact your congressperson  Be cautious when giving out your email address  Complain to the internet service provider where the message originated  Forward the message  Abuse@domain_name ( abuse@seniorservices1.org, abuse@yahoo.com, abuse@school.edu)
  • 42. Summary  Email is a valuable communication tool  Sometimes – it is NOT the best or most appropriate method of communication  Follow the basic guidelines presented to improve the quality of your communications
  • 43. Questions?  Email: jpugh@seniorservices1.org  Phone: 382-0515 ext. 122