Basic rule: We are very careful and suspicious when we open our email, especially when we receive email that we do not expect.
We must be aware that no one can steal our passwords online and our personal data in general without our consent.
1. We never open emails that we don’t expect. We don’t open unknown emails. We are not responding to unknown emails.
2. If we receive something “suspicious” we delete it immediately, especially if it is in the spam file.
3. Even if the email appears to have been sent from a valid account/sender, we should check it out and be suspicious. If necessary, we contact the sender to verify that they sent us this email.
4. Very often, phishing emails are spelling and have quite spelling and syntax errors. Therefore, we do not open such email messages or follow suggested links or open their attached files.
5. Suspicious email attachments should not be opened, especially those with suffixes: (.bat, .chm, .cmd, .com, .exe, .hta, .ocx, .pif, .scr, .shs, .vbe, vbs, .ps1, .wsf, js).
6. If we open this email, we won’t follow (click) the links in the message. You’d better type the address yourself.
8. Every time we follow a link, we check in the address line (URL) that we are in the correct / designated location, that the appropriate and valid security certificate exists and that the connection is encrypted (HTTPS), especially if it is a service.
9. If we find that a message is not from the valid sender, or we think we have generally found a phishing email, then we report it immediately in order to protect other users.
10. We need to encrypt emails when sending personal data. https://www.certcoop.eu/wp-content/uploads/2019/04/Encrypted_email_exchange.ogv
11. When promoting e-mail, it is a good practice to use BCC (Blind Carbon Copy) so that recipients do not appear.
The following videos are educational material from the Directorate’s participation in the European Program (EU Horizon 2020) DOGANA:
1 – SALUTATION
2 – URGENCY
3 – PERSONAL INFORMATION
4 – LINKS
5 – GRAMMAR, SPELLING AND OPTICS
6 – SOCIAL NETWORKING AND MOBILE PHISHING