{"id":60,"date":"2020-02-12T06:04:50","date_gmt":"2020-02-12T06:04:50","guid":{"rendered":"https:\/\/training.inukasystem.com\/?p=60"},"modified":"2020-02-12T14:50:07","modified_gmt":"2020-02-12T11:50:07","slug":"using-caution-with-email-attachments","status":"publish","type":"post","link":"https:\/\/training.inukasystem.com\/index.php\/60\/2020\/04\/12\/using-caution-with-email-attachments\/","title":{"rendered":"Using Caution with Email Attachments"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Why can email attachments be dangerous?<\/h3>\n\n\n\n<p>Some characteristics that make email attachments convenient and popular also make them a common tool for attackers:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Email is easily circulated&nbsp;<\/strong>\u2013 Forwarding email is so simple that viruses can quickly infect many machines. Most viruses do not even require users to forward the email\u2014they scan a users\u2019 mailbox for email addresses and automatically send the infected message to all of the addresses they find. Attackers take advantage of the reality that most users will automatically trust and open a message that comes from someone they know.<\/li><li><strong>Email programs try to address all users\u2019 needs&nbsp;<\/strong>\u2013 Almost any type of file can be attached to an email message, so attackers have more freedom with the types of viruses they can send.<\/li><li><strong>Email programs offer many \u201cuser-friendly\u201d features<\/strong>&nbsp;\u2013 Some email programs have the option to automatically download email attachments, which immediately exposes your computer to viruses within the attachments.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">What steps can you take to protect yourself and others in your address book?<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Be wary of unsolicited attachments, even from people you know.<\/strong>&nbsp;Just because an email message looks like it came from someone you know does not mean that it did. Many viruses can \u201cspoof\u201d the return address, making it look like the message came from someone else. If you can, check with the person who supposedly sent the message to make sure it\u2019s legitimate before opening any attachments. This includes email messages that appear to be from your internet service provider (ISP) or software vendor and claim to include patches or antivirus software. ISPs and software vendors do not send patches or software in email.<\/li><li><strong>Keep software up to date.<\/strong>&nbsp;Install software patches so that attackers can\u2019t take advantage of known problems or vulnerabilities . Many operating systems offer automatic updates. If this option is available, you should enable it.<\/li><li><strong>Trust your instincts.<\/strong>&nbsp;If an email or email attachment seems suspicious, don\u2019t open it, even if your antivirus software indicates that the message is clean. Attackers are constantly releasing new viruses, and the antivirus software might not have the signature. At the very least, contact the person who supposedly sent the message to make sure it\u2019s legitimate before you open the attachment. However, especially in the case of forwards, even messages sent by a legitimate sender might contain a virus. If something about the email or the attachment makes you uncomfortable, there may be a good reason. Don\u2019t let your curiosity put your computer at risk.<\/li><li><strong>Save and scan any attachments before opening them.<\/strong>&nbsp;If you have to open an attachment before you can verify the source, take the following steps:<ol><li>Be sure the signatures in your antivirus software are up to date.<\/li><li>Save the file to your computer or a disk.<\/li><li>Manually scan the file using your antivirus software.<\/li><li>If the file is clean and doesn\u2019t seem suspicious, go ahead and open it.<\/li><\/ol><\/li><li><strong>Turn off the option to automatically download attachments.<\/strong>&nbsp;To simplify the process of reading email, many email programs offer the feature to automatically download attachments. Check your settings to see if your software offers the option, and make sure to disable it.<\/li><li><strong>Consider creating separate accounts on your computer.<\/strong>&nbsp;Most operating systems give you the option of creating multiple user accounts with different privileges. Consider reading your email on an account with restricted privileges. Some viruses need \u201cadministrator\u201d privileges to infect a computer.<\/li><li><strong>Apply additional security practices.<\/strong>&nbsp;You may be able to filter certain types of attachments through your email software or a firewall.<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Why can email attachments be dangerous? Some characteristics that make email attachments convenient and popular also make them a common tool for attackers: Email is easily circulated&nbsp;\u2013 Forwarding email is. <a class=\"read-more-link\" href=\"https:\/\/training.inukasystem.com\/index.php\/60\/2020\/04\/12\/using-caution-with-email-attachments\/\">read more&#8230;<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,2],"tags":[26,24],"class_list":["post-60","post","type-post","status-publish","format-standard","hentry","category-email_and_communication","category-it_and_security","tag-attachments","tag-email"],"_links":{"self":[{"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/posts\/60","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/comments?post=60"}],"version-history":[{"count":1,"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/posts\/60\/revisions"}],"predecessor-version":[{"id":67,"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/posts\/60\/revisions\/67"}],"wp:attachment":[{"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/media?parent=60"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/categories?post=60"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/training.inukasystem.com\/index.php\/wp-json\/wp\/v2\/tags?post=60"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}