Email Security Awareness

Awareness:

l   Email is not a secure form of communication and should never be used to send or receive confidential or sensitive information.

l   Encryption mechanism should be adopted to protect the confidentiality of your email attachments whenever necessary.

l   Be careful when addressing email to be sure it is being sent to your intended recipient(s).

l   Check the source of your email and assess validity and veracity of the email message.  Email is subject to spoofing in which the identity of the sender may be forged.

l   Be careful with email attachments. Never open email attachments from strangers or from senders you know if attachments are not expected

l   Report the incident to ITB if irregularity is noticed

 

Avoiding Virus

l   Do not use public PC workstation particularly those located in Cyber/Internet cafes or public libraries to access TWGHs email platform

l   Ensure that your PC workstation is installed with Anti-virus and up-to-date virus definition and the PC is free from virus

l   Do not use any PC workstation with file sharing software to access TWGHs email platform.

l   Do not save your password in the desktop client or web browser.  Close the desktop client or web browser after you finished your E-mail.  Screen saver with password-protected should be enabled.

l   Do not open any email message or attachments from strangers or chain-letters

 

Avoiding Spam

Spam is digital junk mail without regard to the relevance of message for or the desire of the designated receiver to receive them.  Do not follow any of the tag line instructions on spam. The best response to spam is no response.  Common Types of Spam are:

l    Phishing, pyramid schemes, virus hoaxes, chain letters, and fraudulent business opportunities.

l    Legitimate promotions and advertisements from commercial online businesses including retailers, financial institutions and utilities.

 

To reduce the amount of spam you receive:

l    Check the source of your email and delete the message unopened what you consider spam.

l    Do not pass along chain letters and virus hoax message to your friends.

l    Do not send people online greeting cards as the greeting card web site might store and sell your email address to spammers.

l    Do not use your company email address on any web-based form which will likely make you a target for spammers. Consider to use a personal email account for temporary use or on web forms where an email address is required.  You can delete the free account if it becomes overrun with spam and create a new one, leaving your company email account intact and clutter-free.

l    Do not reply to or follow web links inside spam messages. These include message inviting you to visit a URL (These can point to a different web site designed to steal personal information) and avoid clicking on "Remove yourself from the mailing list" links which are almost always invalid and are often used to verify the existence of a valid email address or to confirm that messages are being read. Following these links will usually result in you getting more spam, not less. (The only exception is where you have taken steps to sign up personally for a mailing list, and messages from that list provide instructions for unsubscribing.)