SlideShare una empresa de Scribd logo
1 de 43
Email Basics
Email
   Guidelines / etiquette
   Privacy
   Spam
   Hoaxes/chain letters
Guidelines / Etiquette
Basic Guidelines
   Length
       Be concise, to the point
   Use the subject line
       Senior Services rule – no complete client
        names
   Read it carefully before sending it
   Be professional
Tone
   We all interact with the printed word as
    though it has a personality and that
    personality makes positive and negative
    impressions on us
   Without immediate feedback your message
    can easily be misinterpreted by your reader,
    so it can be important to follow the basic
    rules of etiquette to construct an appropriate
    tone
Tone
   AVOID ALL CAPITAL LETTERS
   Humor, sarcasm – can be difficult to
    convey and/or interpret
   Emoticons – use - sparingly :-)
Emoticons
:-) = Happy

:-( = Sad

;-) = Wink (sarcasm)

:-0 = yell
Identify Yourself
   Signature
       Full name
       Title
       Company
       Address
       Phone number
       Fax number
Replies and Forwarding
   Use the “reply to” or “reply to all” option
       Maintains a link to the original message
       Maintains “thread” of correspondence
   Forwarding message
       Not the same as replying
       Mail original message to someone other than the
        sender
       Use caution when forarding private or sensitive
        messages without the permission of the sender
       May be inappropriate to forward a portion of a
        message
Using the “CC:” Field
   Carbon Copy
   Everyone in the “To” and “CC” fields are
    visible
   “This email is not addressed to you,
    you’re just getting a copy” (FYI)
   Can be overused
   “Reply to All” will be sent to everyone in
    the “CC” and “To” fields
Using the “Bcc” field
   Blind Carbon Copy
   Conceals addresses from other
    recipients
   Use for mass mailings
       No need for others to see list of recipients
   Will not receive a “Reply To” or “Reply
    to All” message
Email Attachments
   Never open an unexpected attachment
       Even from someone you know
   Used to spread viruses
   Scan questionable attachments
       On demand scan / scan upon open
   When sending attachments, tell the recipient
       The name of the file
       The program it is saved in
       The version of the program
Etiquette - Flaming
   Verbal attack
   Not an appropriate use
   Ignore
   Steps to avoid
       Carefully read messages before sending
       Don’t send messages in all upper case
       Don’t send insulting email
       Don’t send mass-mailing advertisements
Privacy of Email
Privacy of Email
   Not a secure form of communication
   Don’t send secret or confidential information
       Credit card information
       Social security number
       Passwords
   More like a postcard than a sealed letter
   Think before you forward
       Do you have the sender’s permission?
Privacy of Email
   Subject to review with sufficient
    justification
       Court order
       Evidence as part of an investigation
   Message may be mistakenly addressed
       Return message to sender and delete
When NOT to Communicate
Via Email
   Don’t send email of a sensitive or confidential
    nature
   Don’t use email to communicate complaints
    or dissatisfaction with someone
       Have a phone or face-to-face conversation with
        the person
       Promotes 2-way communication
   If you find yourself responding more than 3
    times on the same topic ~
       Have a phone or face-to-face conversation with
        the person
Privacy of Email
   If you wouldn’t want it broadcast on the
    6:00 news – don’t put it in an email!!
Hoaxes and Chain Letters
Purpose and Cost
   Send to everyone
   Messages true??
   Appeal to sense of good will
   Cost
       Time to read
       Stress placed on servers
   Spammers harvest email addresses
    from hoaxes and chain letters
Cost of Hoaxes and Chain
Letters
   Send to 10 people
       They send to 10 people (100)
            They send to 10 people (1,000)
                 They send to 10 people (10,000)
                     They send to 10 people (100,000)


   …. They send to 10 people
            “six degrees of separation”

   1,000,000 - 1 million people !
Examples
Hoax/Chain Letter Prevention
 Do NOT forward the message
 Sites used to check validity:

Snopes: http://www.snopes.com
Hoaxbusters:
  http://hoaxbusters.ciac.org/HBHoaxInfo.html
F-Secure:
  http://www.f-secure.com/virus-info/hoax
McAfee: http://vil.nai.com/vil/hoaxes.aspx
Phishing
   Process by which someone obtains
    private information through deceptive
    or illicit means
       Used to falsely assume another
        person’s identity
   Most commonly an email stating your
    account information needs updating
Phishing Example
Phishing Example
Phishing Example
Phishing Example
Phishing Example
How Secure Do You Need to
Be?
   Be prudent not paranoid
   Did you initiate the action?
   Is the source trustworthy?
   Best thing to do is to type in the URL and check your
    account directly without following any links in the
    email
   Watch for URL’s that are numeric or different from
    the link you clicked on
   Many legitimate emails no longer contain a link
    (Paypal)
   When in doubt Google it
Spam
Spam
   Junk mail
   Unsolicited bulk mailings
   Overloads mailboxes
       20 - 90% of incoming traffic
       Adult content, health promotions, software offers,
        investment ads, get-rich quick schemes
       Chain letters, hoaxes, jokes
   NEVER respond to spam!
Spam
   How they obtain email addresses:
       Posted on the web (chat, newsgroups, etc.)
       Web-based discussion boards
       Inappropriate sharing or sale of email addresses
       Companies not respecting user opt-out
        preferences
       Signing up for “offers”
       Guessing (random generation)
       Stealing via malware
Spam
   Spammers hide true source of mail
       Misconfigured mail servers allow this
       Sign up for free accounts
   Spam scanning system
       Determines if each message is spam
            Point system
            Lists / libraries / keywords
            Blacklist / Whitelist
            {BULK} = may be spam
Senior Services Response to Spam
   Defining spam
       Difficult
            Did you sign up for weight-loss tips?
            Are you really interested in advancing your
             degree on-line?
   Can’t block all sites
       Also include legitimate mail
   Barracuda spam firewall
Senior Services Response to Spam
         Barracuda Spam Firewall
   Rate control
   Recipient verification
   Virus protection
   Fingerprint analysis
   Intent analysis
   Image analysis
   Spam rules scoring engine
   Policy (user-specified rules)
Senior Services Response to Spam
         Barracuda Spam Firewall
   Allowed 25,059 since April 18
   Blocked 786,312
       152 viruses
       1,788 “tagged”
   96.5 % BLOCKED at senior services
       Normally 20 - 90% of incoming traffic
Senior Services Response to Spam
   Set up filters to sort spam messages
       Place in junk mail folder and then review
Senior Services Response to Spam
   Reporting spam
       jpugh@seniorservices1.Org
Other Methods to Reduce
Spam
   Contact your congressperson
   Be cautious when giving out your email
    address
   Complain to the internet service provider
    where the message originated
       Forward the message
       Abuse@domain_name (
        abuse@seniorservices1.org, abuse@yahoo.com,
        abuse@school.edu)
Summary
   Email is a valuable communication tool
   Sometimes – it is NOT the best or most
    appropriate method of communication
   Follow the basic guidelines presented to
    improve the quality of your
    communications
Questions?
   Email: jpugh@seniorservices1.org
   Phone: 382-0515 ext. 122

Más contenido relacionado

La actualidad más candente

Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
guest2e06031d
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
guest2e06031d
 
E mail etiquettes
E mail etiquettesE mail etiquettes
E mail etiquettes
JpRawat
 

La actualidad más candente (16)

Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview Ppt
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Common Email Security Mistakes
Common Email Security MistakesCommon Email Security Mistakes
Common Email Security Mistakes
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internet
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...
 
E mail etiquettes
E mail etiquettesE mail etiquettes
E mail etiquettes
 
Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
How to Detect Email Fraud
How to Detect Email FraudHow to Detect Email Fraud
How to Detect Email Fraud
 
Irm 13-phishing
Irm 13-phishingIrm 13-phishing
Irm 13-phishing
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
American Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy PolicyAmerican Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy Policy
 

Destacado

Marathi Journalism in the 19th century
Marathi Journalism in the 19th century Marathi Journalism in the 19th century
Marathi Journalism in the 19th century
Saurabh Deshpande
 
यशाची गुरुकिल्ली भाग 2
यशाची गुरुकिल्ली  भाग 2यशाची गुरुकिल्ली  भाग 2
यशाची गुरुकिल्ली भाग 2
dattatray godase
 
Marathi Manus Kute Aahe
Marathi Manus Kute AaheMarathi Manus Kute Aahe
Marathi Manus Kute Aahe
prasad_sakat
 
Pollution.Ppt
Pollution.PptPollution.Ppt
Pollution.Ppt
SVS
 

Destacado (13)

Sending Email Basics PHP
Sending Email Basics PHPSending Email Basics PHP
Sending Email Basics PHP
 
Elementary
ElementaryElementary
Elementary
 
Marathi Journalism in the 19th century
Marathi Journalism in the 19th century Marathi Journalism in the 19th century
Marathi Journalism in the 19th century
 
यशाची गुरुकिल्ली भाग 2
यशाची गुरुकिल्ली  भाग 2यशाची गुरुकिल्ली  भाग 2
यशाची गुरुकिल्ली भाग 2
 
Marathi Manus Kute Aahe
Marathi Manus Kute AaheMarathi Manus Kute Aahe
Marathi Manus Kute Aahe
 
Basic Internet Introduction in English and Marathi
Basic Internet Introduction in English and MarathiBasic Internet Introduction in English and Marathi
Basic Internet Introduction in English and Marathi
 
Maharashtra
 Maharashtra Maharashtra
Maharashtra
 
Circulatory system
Circulatory systemCirculatory system
Circulatory system
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
Cultural Heritage of India
Cultural Heritage of IndiaCultural Heritage of India
Cultural Heritage of India
 
Rain water harvesting ppt
Rain water harvesting pptRain water harvesting ppt
Rain water harvesting ppt
 
Pollution.Ppt
Pollution.PptPollution.Ppt
Pollution.Ppt
 
The Science of Email Marketing
The Science of Email MarketingThe Science of Email Marketing
The Science of Email Marketing
 

Similar a Email basics

Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
Chinmayee Behera
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
amby3
 
Final paper
Final paperFinal paper
Final paper
JDonpfd3
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
cactussky
 

Similar a Email basics (20)

A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Email strategies
Email strategiesEmail strategies
Email strategies
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Spam
SpamSpam
Spam
 
Email
EmailEmail
Email
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptx
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Email Best Practices for Nonprofits
Email Best Practices for NonprofitsEmail Best Practices for Nonprofits
Email Best Practices for Nonprofits
 
Final paper
Final paperFinal paper
Final paper
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Good e mail practices
Good e mail practicesGood e mail practices
Good e mail practices
 
Bad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptxBad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptx
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Email basics

  • 2. Email  Guidelines / etiquette  Privacy  Spam  Hoaxes/chain letters
  • 4. Basic Guidelines  Length  Be concise, to the point  Use the subject line  Senior Services rule – no complete client names  Read it carefully before sending it  Be professional
  • 5. Tone  We all interact with the printed word as though it has a personality and that personality makes positive and negative impressions on us  Without immediate feedback your message can easily be misinterpreted by your reader, so it can be important to follow the basic rules of etiquette to construct an appropriate tone
  • 6. Tone  AVOID ALL CAPITAL LETTERS  Humor, sarcasm – can be difficult to convey and/or interpret  Emoticons – use - sparingly :-)
  • 7. Emoticons :-) = Happy :-( = Sad ;-) = Wink (sarcasm) :-0 = yell
  • 8. Identify Yourself  Signature  Full name  Title  Company  Address  Phone number  Fax number
  • 9. Replies and Forwarding  Use the “reply to” or “reply to all” option  Maintains a link to the original message  Maintains “thread” of correspondence  Forwarding message  Not the same as replying  Mail original message to someone other than the sender  Use caution when forarding private or sensitive messages without the permission of the sender  May be inappropriate to forward a portion of a message
  • 10. Using the “CC:” Field  Carbon Copy  Everyone in the “To” and “CC” fields are visible  “This email is not addressed to you, you’re just getting a copy” (FYI)  Can be overused  “Reply to All” will be sent to everyone in the “CC” and “To” fields
  • 11. Using the “Bcc” field  Blind Carbon Copy  Conceals addresses from other recipients  Use for mass mailings  No need for others to see list of recipients  Will not receive a “Reply To” or “Reply to All” message
  • 12. Email Attachments  Never open an unexpected attachment  Even from someone you know  Used to spread viruses  Scan questionable attachments  On demand scan / scan upon open  When sending attachments, tell the recipient  The name of the file  The program it is saved in  The version of the program
  • 13. Etiquette - Flaming  Verbal attack  Not an appropriate use  Ignore  Steps to avoid  Carefully read messages before sending  Don’t send messages in all upper case  Don’t send insulting email  Don’t send mass-mailing advertisements
  • 15. Privacy of Email  Not a secure form of communication  Don’t send secret or confidential information  Credit card information  Social security number  Passwords  More like a postcard than a sealed letter  Think before you forward  Do you have the sender’s permission?
  • 16. Privacy of Email  Subject to review with sufficient justification  Court order  Evidence as part of an investigation  Message may be mistakenly addressed  Return message to sender and delete
  • 17. When NOT to Communicate Via Email  Don’t send email of a sensitive or confidential nature  Don’t use email to communicate complaints or dissatisfaction with someone  Have a phone or face-to-face conversation with the person  Promotes 2-way communication  If you find yourself responding more than 3 times on the same topic ~  Have a phone or face-to-face conversation with the person
  • 18. Privacy of Email  If you wouldn’t want it broadcast on the 6:00 news – don’t put it in an email!!
  • 19. Hoaxes and Chain Letters
  • 20. Purpose and Cost  Send to everyone  Messages true??  Appeal to sense of good will  Cost  Time to read  Stress placed on servers  Spammers harvest email addresses from hoaxes and chain letters
  • 21. Cost of Hoaxes and Chain Letters  Send to 10 people  They send to 10 people (100)  They send to 10 people (1,000)  They send to 10 people (10,000)  They send to 10 people (100,000)  …. They send to 10 people “six degrees of separation”  1,000,000 - 1 million people !
  • 23.
  • 24. Hoax/Chain Letter Prevention  Do NOT forward the message  Sites used to check validity: Snopes: http://www.snopes.com Hoaxbusters: http://hoaxbusters.ciac.org/HBHoaxInfo.html F-Secure: http://www.f-secure.com/virus-info/hoax McAfee: http://vil.nai.com/vil/hoaxes.aspx
  • 25. Phishing  Process by which someone obtains private information through deceptive or illicit means  Used to falsely assume another person’s identity  Most commonly an email stating your account information needs updating
  • 31. How Secure Do You Need to Be?  Be prudent not paranoid  Did you initiate the action?  Is the source trustworthy?  Best thing to do is to type in the URL and check your account directly without following any links in the email  Watch for URL’s that are numeric or different from the link you clicked on  Many legitimate emails no longer contain a link (Paypal)  When in doubt Google it
  • 32. Spam
  • 33. Spam  Junk mail  Unsolicited bulk mailings  Overloads mailboxes  20 - 90% of incoming traffic  Adult content, health promotions, software offers, investment ads, get-rich quick schemes  Chain letters, hoaxes, jokes  NEVER respond to spam!
  • 34. Spam  How they obtain email addresses:  Posted on the web (chat, newsgroups, etc.)  Web-based discussion boards  Inappropriate sharing or sale of email addresses  Companies not respecting user opt-out preferences  Signing up for “offers”  Guessing (random generation)  Stealing via malware
  • 35. Spam  Spammers hide true source of mail  Misconfigured mail servers allow this  Sign up for free accounts  Spam scanning system  Determines if each message is spam  Point system  Lists / libraries / keywords  Blacklist / Whitelist  {BULK} = may be spam
  • 36. Senior Services Response to Spam  Defining spam  Difficult  Did you sign up for weight-loss tips?  Are you really interested in advancing your degree on-line?  Can’t block all sites  Also include legitimate mail  Barracuda spam firewall
  • 37. Senior Services Response to Spam Barracuda Spam Firewall  Rate control  Recipient verification  Virus protection  Fingerprint analysis  Intent analysis  Image analysis  Spam rules scoring engine  Policy (user-specified rules)
  • 38. Senior Services Response to Spam Barracuda Spam Firewall  Allowed 25,059 since April 18  Blocked 786,312  152 viruses  1,788 “tagged”  96.5 % BLOCKED at senior services  Normally 20 - 90% of incoming traffic
  • 39. Senior Services Response to Spam  Set up filters to sort spam messages  Place in junk mail folder and then review
  • 40. Senior Services Response to Spam  Reporting spam  jpugh@seniorservices1.Org
  • 41. Other Methods to Reduce Spam  Contact your congressperson  Be cautious when giving out your email address  Complain to the internet service provider where the message originated  Forward the message  Abuse@domain_name ( abuse@seniorservices1.org, abuse@yahoo.com, abuse@school.edu)
  • 42. Summary  Email is a valuable communication tool  Sometimes – it is NOT the best or most appropriate method of communication  Follow the basic guidelines presented to improve the quality of your communications
  • 43. Questions?  Email: jpugh@seniorservices1.org  Phone: 382-0515 ext. 122