Security audits, training staff not to open
suspicious email attachments, and limiting access to sensitive data are recommended.
They can also scan files regularly for unusual changes in file sizes, programs that match known malware,
suspicious email attachments and other warning signs.
Not exact matches
If you receive a
suspicious email that appears to be from someone you know, confirm by phone whether they sent it before you click on any links or
attachments.
Look out for any
suspicious emails asking you to download
attachments, click on links or share bank information.
Sandboxes divert
email carrying a
suspicious attachment or link to a quarantined area where the payload is «clicked» to see if anything bad happens.
Ensure staff are aware of cyber-protection protocols and understand NOT to open links or
attachments from unexpected or
suspicious emails.
Of course, never forget the basics, either: never open
email attachments from untrusted or unknown senders, or from known senders if the
email looks
suspicious or confusing.
Similar to
attachments, do NOT click on a link if anything else about the
email seems
suspicious.
Users should also be on the lookout for
suspicious text messages or
emails about the service containing
attachments or that request a password since Twitter will never do either of those two things and such messages likely contain malware or are being used as part of a phishing attempt.
Some are caught because they contain a
suspicious attachment, a link that seems fishy or words that are commonly found in
emails advertising Viagra, penny stocks or something more salacious.
About 25 percent of
email users open
suspicious emails, Wierzbicki said, and 11 percent open
attachments or click on links in those
emails — which activates the malware that compromises systems.