Most attachments are simply a means of document delivery. However, it has also become commonplace for hackers to use attachments to launch cyber-attacks, typically with executable code, which produce many varied effects, some highly destructive and malicious. When a recipient receives a suspicious attachment, it should be scanned and, unless it is from a trusted source, not opened. Some corporations, hosting companies, and ISPs will block, quarantine, or remove files with specifically identified file extensions. It is beneficial to consider at least some of these security measures to prevent inadvertent file removal. Care should be taken as well not to forward such messages without a security scan.
1. Do not send attachments that are not needed.
2. Do not return attachments when replying. The original sender knows what he or she attached.
Great news and an announcement! My book, NetiquetteIQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email has gone on sale at the CreateSpace estore:http://createspace.com/4083121
As a NetiquetteIQ blog reader, you can use the discount code KBQALZA7. This discount is only through the estore. Thank you for your support on the blog and with the book. The book and Kindle version will soon be available on Amazon.
More good news!
The Kindle version of my book is now available! Go to the following site to purchase it:
Anyone who would like to review the book and have it posted on my blog or website, please contact me firstname.lastname@example.org
Please visit our website http://netiquetteiq.com