Thursday, October 17, 2013

Potential hazards of attachments



 

Most attachments are simply a means of document delivery. However, it has also become commonplace for hackers to use attachments to launch cyber-attacks, typically with executable code, which produce many varied effects, some highly destructive and malicious. When a recipient receives a suspicious attachment, it should be scanned and, unless it is from a trusted source, not opened. Some corporations, hosting companies, and ISPs will block, quarantine, or remove files with specifically identified file extensions. It is beneficial to consider at least some of these security measures to prevent inadvertent file removal. Care should be taken as well not to forward such messages without a security scan.
 
1. Do not send attachments that are not needed.
2. Do not return attachments when replying. The original sender knows what he or she attached.

 Finally, when attachments are sent, some may have similar names as other files on the sender’s system. With an inadvertent slip, the wrong attachment may go out, perhaps a compromising or confidential document. Therefore, opening attachments to validate they are appropriate and correct is critical to a proper email process.
++++++++++++++++++++++++++++++++++

Great news and an announcement! My book, NetiquetteIQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email has gone on sale at the CreateSpace estore:http://createspace.com/4083121

As a NetiquetteIQ blog reader, you can use the discount code KBQALZA7. This discount is only through the estore. Thank you for your support on the blog and with the book. The book and Kindle version will soon be available on Amazon.

More good news!

The Kindle version of my book is now available! Go to the following site to purchase it:

http://www.amazon.com/dp/B00FFAMN0U

#PaulBabicki
#netiquette

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com


Please visit our website http://netiquetteiq.com

 

1 comment:

  1. Conducting business using email comes with responsibilities. Obviously we are not perfect but if email is the means by which we are to conduct our business, this book addresses a good set of appropriate actions and what amounts to at set of mutual responsibilities.

    ReplyDelete