Thursday, October 17, 2013

Potential hazards of attachments


Most attachments are simply a means of document delivery. However, it has also become commonplace for hackers to use attachments to launch cyber-attacks, typically with executable code, which produce many varied effects, some highly destructive and malicious. When a recipient receives a suspicious attachment, it should be scanned and, unless it is from a trusted source, not opened. Some corporations, hosting companies, and ISPs will block, quarantine, or remove files with specifically identified file extensions. It is beneficial to consider at least some of these security measures to prevent inadvertent file removal. Care should be taken as well not to forward such messages without a security scan.
1. Do not send attachments that are not needed.
2. Do not return attachments when replying. The original sender knows what he or she attached.

 Finally, when attachments are sent, some may have similar names as other files on the sender’s system. With an inadvertent slip, the wrong attachment may go out, perhaps a compromising or confidential document. Therefore, opening attachments to validate they are appropriate and correct is critical to a proper email process.

Great news and an announcement! My book, NetiquetteIQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email has gone on sale at the CreateSpace estore:

As a NetiquetteIQ blog reader, you can use the discount code KBQALZA7. This discount is only through the estore. Thank you for your support on the blog and with the book. The book and Kindle version will soon be available on Amazon.

More good news!

The Kindle version of my book is now available! Go to the following site to purchase it:


Anyone who would like to review the book and have it posted on my blog or website, please contact me

Please visit our website