SlideShare uma empresa Scribd logo
1 de 43
Email Basics
Email
   Guidelines / etiquette
   Privacy
   Spam
   Hoaxes/chain letters
Guidelines / Etiquette
Basic Guidelines
   Length
       Be concise, to the point
   Use the subject line
       Senior Services rule – no complete client
        names
   Read it carefully before sending it
   Be professional
Tone
   We all interact with the printed word as
    though it has a personality and that
    personality makes positive and negative
    impressions on us
   Without immediate feedback your message
    can easily be misinterpreted by your reader,
    so it can be important to follow the basic
    rules of etiquette to construct an appropriate
    tone
Tone
   AVOID ALL CAPITAL LETTERS
   Humor, sarcasm – can be difficult to
    convey and/or interpret
   Emoticons – use - sparingly :-)
Emoticons
:-) = Happy

:-( = Sad

;-) = Wink (sarcasm)

:-0 = yell
Identify Yourself
   Signature
       Full name
       Title
       Company
       Address
       Phone number
       Fax number
Replies and Forwarding
   Use the “reply to” or “reply to all” option
       Maintains a link to the original message
       Maintains “thread” of correspondence
   Forwarding message
       Not the same as replying
       Mail original message to someone other than the
        sender
       Use caution when forarding private or sensitive
        messages without the permission of the sender
       May be inappropriate to forward a portion of a
        message
Using the “CC:” Field
   Carbon Copy
   Everyone in the “To” and “CC” fields are
    visible
   “This email is not addressed to you,
    you’re just getting a copy” (FYI)
   Can be overused
   “Reply to All” will be sent to everyone in
    the “CC” and “To” fields
Using the “Bcc” field
   Blind Carbon Copy
   Conceals addresses from other
    recipients
   Use for mass mailings
       No need for others to see list of recipients
   Will not receive a “Reply To” or “Reply
    to All” message
Email Attachments
   Never open an unexpected attachment
       Even from someone you know
   Used to spread viruses
   Scan questionable attachments
       On demand scan / scan upon open
   When sending attachments, tell the recipient
       The name of the file
       The program it is saved in
       The version of the program
Etiquette - Flaming
   Verbal attack
   Not an appropriate use
   Ignore
   Steps to avoid
       Carefully read messages before sending
       Don’t send messages in all upper case
       Don’t send insulting email
       Don’t send mass-mailing advertisements
Privacy of Email
Privacy of Email
   Not a secure form of communication
   Don’t send secret or confidential information
       Credit card information
       Social security number
       Passwords
   More like a postcard than a sealed letter
   Think before you forward
       Do you have the sender’s permission?
Privacy of Email
   Subject to review with sufficient
    justification
       Court order
       Evidence as part of an investigation
   Message may be mistakenly addressed
       Return message to sender and delete
When NOT to Communicate
Via Email
   Don’t send email of a sensitive or confidential
    nature
   Don’t use email to communicate complaints
    or dissatisfaction with someone
       Have a phone or face-to-face conversation with
        the person
       Promotes 2-way communication
   If you find yourself responding more than 3
    times on the same topic ~
       Have a phone or face-to-face conversation with
        the person
Privacy of Email
   If you wouldn’t want it broadcast on the
    6:00 news – don’t put it in an email!!
Hoaxes and Chain Letters
Purpose and Cost
   Send to everyone
   Messages true??
   Appeal to sense of good will
   Cost
       Time to read
       Stress placed on servers
   Spammers harvest email addresses
    from hoaxes and chain letters
Cost of Hoaxes and Chain
Letters
   Send to 10 people
       They send to 10 people (100)
            They send to 10 people (1,000)
                 They send to 10 people (10,000)
                     They send to 10 people (100,000)


   …. They send to 10 people
            “six degrees of separation”

   1,000,000 - 1 million people !
Examples
Hoax/Chain Letter Prevention
 Do NOT forward the message
 Sites used to check validity:

Snopes: http://www.snopes.com
Hoaxbusters:
  http://hoaxbusters.ciac.org/HBHoaxInfo.html
F-Secure:
  http://www.f-secure.com/virus-info/hoax
McAfee: http://vil.nai.com/vil/hoaxes.aspx
Phishing
   Process by which someone obtains
    private information through deceptive
    or illicit means
       Used to falsely assume another
        person’s identity
   Most commonly an email stating your
    account information needs updating
Phishing Example
Phishing Example
Phishing Example
Phishing Example
Phishing Example
How Secure Do You Need to
Be?
   Be prudent not paranoid
   Did you initiate the action?
   Is the source trustworthy?
   Best thing to do is to type in the URL and check your
    account directly without following any links in the
    email
   Watch for URL’s that are numeric or different from
    the link you clicked on
   Many legitimate emails no longer contain a link
    (Paypal)
   When in doubt Google it
Spam
Spam
   Junk mail
   Unsolicited bulk mailings
   Overloads mailboxes
       20 - 90% of incoming traffic
       Adult content, health promotions, software offers,
        investment ads, get-rich quick schemes
       Chain letters, hoaxes, jokes
   NEVER respond to spam!
Spam
   How they obtain email addresses:
       Posted on the web (chat, newsgroups, etc.)
       Web-based discussion boards
       Inappropriate sharing or sale of email addresses
       Companies not respecting user opt-out
        preferences
       Signing up for “offers”
       Guessing (random generation)
       Stealing via malware
Spam
   Spammers hide true source of mail
       Misconfigured mail servers allow this
       Sign up for free accounts
   Spam scanning system
       Determines if each message is spam
            Point system
            Lists / libraries / keywords
            Blacklist / Whitelist
            {BULK} = may be spam
Senior Services Response to Spam
   Defining spam
       Difficult
            Did you sign up for weight-loss tips?
            Are you really interested in advancing your
             degree on-line?
   Can’t block all sites
       Also include legitimate mail
   Barracuda spam firewall
Senior Services Response to Spam
         Barracuda Spam Firewall
   Rate control
   Recipient verification
   Virus protection
   Fingerprint analysis
   Intent analysis
   Image analysis
   Spam rules scoring engine
   Policy (user-specified rules)
Senior Services Response to Spam
         Barracuda Spam Firewall
   Allowed 25,059 since April 18
   Blocked 786,312
       152 viruses
       1,788 “tagged”
   96.5 % BLOCKED at senior services
       Normally 20 - 90% of incoming traffic
Senior Services Response to Spam
   Set up filters to sort spam messages
       Place in junk mail folder and then review
Senior Services Response to Spam
   Reporting spam
       jpugh@seniorservices1.Org
Other Methods to Reduce
Spam
   Contact your congressperson
   Be cautious when giving out your email
    address
   Complain to the internet service provider
    where the message originated
       Forward the message
       Abuse@domain_name (
        abuse@seniorservices1.org, abuse@yahoo.com,
        abuse@school.edu)
Summary
   Email is a valuable communication tool
   Sometimes – it is NOT the best or most
    appropriate method of communication
   Follow the basic guidelines presented to
    improve the quality of your
    communications
Questions?
   Email: jpugh@seniorservices1.org
   Phone: 382-0515 ext. 122

Mais conteúdo relacionado

Mais procurados

Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer JungleJason S
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackersseema Vishwakarma
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview PptAntonio Ieranò
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internetapemberton1
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attackClaranet UK
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...Liberteks
 
E mail etiquettes
E mail etiquettesE mail etiquettes
E mail etiquettesJpRawat
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats mohamad Hamizi
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
American Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy PolicyAmerican Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy Policyfarrahesham
 

Mais procurados (16)

Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview Ppt
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Common Email Security Mistakes
Common Email Security MistakesCommon Email Security Mistakes
Common Email Security Mistakes
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internet
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...
 
E mail etiquettes
E mail etiquettesE mail etiquettes
E mail etiquettes
 
Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
How to Detect Email Fraud
How to Detect Email FraudHow to Detect Email Fraud
How to Detect Email Fraud
 
Irm 13-phishing
Irm 13-phishingIrm 13-phishing
Irm 13-phishing
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
American Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy PolicyAmerican Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy Policy
 

Destaque

Sending Email Basics PHP
Sending Email Basics PHPSending Email Basics PHP
Sending Email Basics PHPProdigyView
 
Marathi Journalism in the 19th century
Marathi Journalism in the 19th century Marathi Journalism in the 19th century
Marathi Journalism in the 19th century Saurabh Deshpande
 
यशाची गुरुकिल्ली भाग 2
यशाची गुरुकिल्ली  भाग 2यशाची गुरुकिल्ली  भाग 2
यशाची गुरुकिल्ली भाग 2dattatray godase
 
Marathi Manus Kute Aahe
Marathi Manus Kute AaheMarathi Manus Kute Aahe
Marathi Manus Kute Aaheprasad_sakat
 
Basic Internet Introduction in English and Marathi
Basic Internet Introduction in English and MarathiBasic Internet Introduction in English and Marathi
Basic Internet Introduction in English and MarathiMayur Patil
 
Cultural Heritage of India
Cultural Heritage of IndiaCultural Heritage of India
Cultural Heritage of IndiaSargun Kohli
 
Rain water harvesting ppt
Rain water harvesting pptRain water harvesting ppt
Rain water harvesting pptPalash Jain
 
Pollution.Ppt
Pollution.PptPollution.Ppt
Pollution.PptSVS
 
The Science of Email Marketing
The Science of Email MarketingThe Science of Email Marketing
The Science of Email MarketingHubSpot
 

Destaque (13)

Sending Email Basics PHP
Sending Email Basics PHPSending Email Basics PHP
Sending Email Basics PHP
 
Elementary
ElementaryElementary
Elementary
 
Marathi Journalism in the 19th century
Marathi Journalism in the 19th century Marathi Journalism in the 19th century
Marathi Journalism in the 19th century
 
यशाची गुरुकिल्ली भाग 2
यशाची गुरुकिल्ली  भाग 2यशाची गुरुकिल्ली  भाग 2
यशाची गुरुकिल्ली भाग 2
 
Marathi Manus Kute Aahe
Marathi Manus Kute AaheMarathi Manus Kute Aahe
Marathi Manus Kute Aahe
 
Basic Internet Introduction in English and Marathi
Basic Internet Introduction in English and MarathiBasic Internet Introduction in English and Marathi
Basic Internet Introduction in English and Marathi
 
Maharashtra
 Maharashtra Maharashtra
Maharashtra
 
Circulatory system
Circulatory systemCirculatory system
Circulatory system
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
Cultural Heritage of India
Cultural Heritage of IndiaCultural Heritage of India
Cultural Heritage of India
 
Rain water harvesting ppt
Rain water harvesting pptRain water harvesting ppt
Rain water harvesting ppt
 
Pollution.Ppt
Pollution.PptPollution.Ppt
Pollution.Ppt
 
The Science of Email Marketing
The Science of Email MarketingThe Science of Email Marketing
The Science of Email Marketing
 

Semelhante a Email basics

A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 
Email strategies
Email strategiesEmail strategies
Email strategiesAlan Haller
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfHost It Smart
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxDr Ganesh Saini
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfChinmayee Behera
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxvdgtkhdh
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxamby3
 
Email Best Practices for Nonprofits
Email Best Practices for NonprofitsEmail Best Practices for Nonprofits
Email Best Practices for NonprofitsMolly Maple Bryant
 
Final paper
Final paperFinal paper
Final paperJDonpfd3
 
Security awareness
Security awarenessSecurity awareness
Security awarenessSanoop Nair
 
Bad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptxBad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptxGEETHA LATHA
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 

Semelhante a Email basics (20)

A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Email strategies
Email strategiesEmail strategies
Email strategies
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Spam
SpamSpam
Spam
 
Email
EmailEmail
Email
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptx
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Email Best Practices for Nonprofits
Email Best Practices for NonprofitsEmail Best Practices for Nonprofits
Email Best Practices for Nonprofits
 
Final paper
Final paperFinal paper
Final paper
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Good e mail practices
Good e mail practicesGood e mail practices
Good e mail practices
 
Bad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptxBad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptx
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 

Último

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Email basics

  • 2. Email  Guidelines / etiquette  Privacy  Spam  Hoaxes/chain letters
  • 4. Basic Guidelines  Length  Be concise, to the point  Use the subject line  Senior Services rule – no complete client names  Read it carefully before sending it  Be professional
  • 5. Tone  We all interact with the printed word as though it has a personality and that personality makes positive and negative impressions on us  Without immediate feedback your message can easily be misinterpreted by your reader, so it can be important to follow the basic rules of etiquette to construct an appropriate tone
  • 6. Tone  AVOID ALL CAPITAL LETTERS  Humor, sarcasm – can be difficult to convey and/or interpret  Emoticons – use - sparingly :-)
  • 7. Emoticons :-) = Happy :-( = Sad ;-) = Wink (sarcasm) :-0 = yell
  • 8. Identify Yourself  Signature  Full name  Title  Company  Address  Phone number  Fax number
  • 9. Replies and Forwarding  Use the “reply to” or “reply to all” option  Maintains a link to the original message  Maintains “thread” of correspondence  Forwarding message  Not the same as replying  Mail original message to someone other than the sender  Use caution when forarding private or sensitive messages without the permission of the sender  May be inappropriate to forward a portion of a message
  • 10. Using the “CC:” Field  Carbon Copy  Everyone in the “To” and “CC” fields are visible  “This email is not addressed to you, you’re just getting a copy” (FYI)  Can be overused  “Reply to All” will be sent to everyone in the “CC” and “To” fields
  • 11. Using the “Bcc” field  Blind Carbon Copy  Conceals addresses from other recipients  Use for mass mailings  No need for others to see list of recipients  Will not receive a “Reply To” or “Reply to All” message
  • 12. Email Attachments  Never open an unexpected attachment  Even from someone you know  Used to spread viruses  Scan questionable attachments  On demand scan / scan upon open  When sending attachments, tell the recipient  The name of the file  The program it is saved in  The version of the program
  • 13. Etiquette - Flaming  Verbal attack  Not an appropriate use  Ignore  Steps to avoid  Carefully read messages before sending  Don’t send messages in all upper case  Don’t send insulting email  Don’t send mass-mailing advertisements
  • 15. Privacy of Email  Not a secure form of communication  Don’t send secret or confidential information  Credit card information  Social security number  Passwords  More like a postcard than a sealed letter  Think before you forward  Do you have the sender’s permission?
  • 16. Privacy of Email  Subject to review with sufficient justification  Court order  Evidence as part of an investigation  Message may be mistakenly addressed  Return message to sender and delete
  • 17. When NOT to Communicate Via Email  Don’t send email of a sensitive or confidential nature  Don’t use email to communicate complaints or dissatisfaction with someone  Have a phone or face-to-face conversation with the person  Promotes 2-way communication  If you find yourself responding more than 3 times on the same topic ~  Have a phone or face-to-face conversation with the person
  • 18. Privacy of Email  If you wouldn’t want it broadcast on the 6:00 news – don’t put it in an email!!
  • 19. Hoaxes and Chain Letters
  • 20. Purpose and Cost  Send to everyone  Messages true??  Appeal to sense of good will  Cost  Time to read  Stress placed on servers  Spammers harvest email addresses from hoaxes and chain letters
  • 21. Cost of Hoaxes and Chain Letters  Send to 10 people  They send to 10 people (100)  They send to 10 people (1,000)  They send to 10 people (10,000)  They send to 10 people (100,000)  …. They send to 10 people “six degrees of separation”  1,000,000 - 1 million people !
  • 23.
  • 24. Hoax/Chain Letter Prevention  Do NOT forward the message  Sites used to check validity: Snopes: http://www.snopes.com Hoaxbusters: http://hoaxbusters.ciac.org/HBHoaxInfo.html F-Secure: http://www.f-secure.com/virus-info/hoax McAfee: http://vil.nai.com/vil/hoaxes.aspx
  • 25. Phishing  Process by which someone obtains private information through deceptive or illicit means  Used to falsely assume another person’s identity  Most commonly an email stating your account information needs updating
  • 31. How Secure Do You Need to Be?  Be prudent not paranoid  Did you initiate the action?  Is the source trustworthy?  Best thing to do is to type in the URL and check your account directly without following any links in the email  Watch for URL’s that are numeric or different from the link you clicked on  Many legitimate emails no longer contain a link (Paypal)  When in doubt Google it
  • 32. Spam
  • 33. Spam  Junk mail  Unsolicited bulk mailings  Overloads mailboxes  20 - 90% of incoming traffic  Adult content, health promotions, software offers, investment ads, get-rich quick schemes  Chain letters, hoaxes, jokes  NEVER respond to spam!
  • 34. Spam  How they obtain email addresses:  Posted on the web (chat, newsgroups, etc.)  Web-based discussion boards  Inappropriate sharing or sale of email addresses  Companies not respecting user opt-out preferences  Signing up for “offers”  Guessing (random generation)  Stealing via malware
  • 35. Spam  Spammers hide true source of mail  Misconfigured mail servers allow this  Sign up for free accounts  Spam scanning system  Determines if each message is spam  Point system  Lists / libraries / keywords  Blacklist / Whitelist  {BULK} = may be spam
  • 36. Senior Services Response to Spam  Defining spam  Difficult  Did you sign up for weight-loss tips?  Are you really interested in advancing your degree on-line?  Can’t block all sites  Also include legitimate mail  Barracuda spam firewall
  • 37. Senior Services Response to Spam Barracuda Spam Firewall  Rate control  Recipient verification  Virus protection  Fingerprint analysis  Intent analysis  Image analysis  Spam rules scoring engine  Policy (user-specified rules)
  • 38. Senior Services Response to Spam Barracuda Spam Firewall  Allowed 25,059 since April 18  Blocked 786,312  152 viruses  1,788 “tagged”  96.5 % BLOCKED at senior services  Normally 20 - 90% of incoming traffic
  • 39. Senior Services Response to Spam  Set up filters to sort spam messages  Place in junk mail folder and then review
  • 40. Senior Services Response to Spam  Reporting spam  jpugh@seniorservices1.Org
  • 41. Other Methods to Reduce Spam  Contact your congressperson  Be cautious when giving out your email address  Complain to the internet service provider where the message originated  Forward the message  Abuse@domain_name ( abuse@seniorservices1.org, abuse@yahoo.com, abuse@school.edu)
  • 42. Summary  Email is a valuable communication tool  Sometimes – it is NOT the best or most appropriate method of communication  Follow the basic guidelines presented to improve the quality of your communications
  • 43. Questions?  Email: jpugh@seniorservices1.org  Phone: 382-0515 ext. 122