Email attachments are risky. They might contain malware, or be so large that they eat up too much space in your inbox. The best approach is to not open them and delete them, unless they come from a trusted sender. Encourage your contacts to share via cloud links instead.
Secure email services can encrypt your messages to ensure they’re only accessible to authorized parties – not even the email provider will be able to access them. Some services go one step further and allow you to create aliases that protect your private correspondence and keep your primary address anonymous.
One of the best-known email scams the “Nigerian prince” scheme is important to recognize, but it’s hardly the only one. Some others to keep an eye out for include emails purporting to be from government agencies (which almost never communicate with individuals in this manner) and communications from Internet service providers (ISPs) and software companies, […]
These times are especially busy for bad actors. They’ll often target their attacks around the weekends or holidays, when IT infrastructures are at their most vulnerable. Whether at home or work, be extra cautious when opening emails. Phishing scams are especially deceptive at these times. If you receive a suspicious email offering you a great […]
Natural disasters such as Hurricanes, Tornadoes and Floods prompt scammers to solicit contributions supposedly for a charitable organization or a good cause. Definitely it’s best not to respond to unsolicited spam e-mails. Also, be suspicious of individuals representing themselves over e-mail as officials soliciting for donations. Do not click on links within an unsolicited e-mail. […]
Ransomware encrypts your files and demands payment for their decryption. It can start with a malicious link or attachment targeting vulnerability in outdated software. Be sure not to click these items if you don’t recognize them and/or if they were flagged by your security software. Also, the FBI says you should never give in and […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.opentext.com/about/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.