E-mails
?
... are used to obtain data (phishing).
... are gateways for malware.
... can deceive by using fake sender addresses.
?
Check the sender, subject, content and attachment for credibility.
If in doubt, contact the IT department or ask known senders before opening suspicious attachments.
Email signatures are used as an additional protection instance to ensure the trustworthiness of the sender address and the content of the message.
E-Mails verschlüsseln | BSI
Quelle: BSI
Phishing-E-Mails enttarnen! | BSI
Quelle: BSI
No-Phishing-Training
The research group SECUSO (Security, Usability, Society) has developed a quiz and a game as training tools for detecting fraudulent messages.
Unfortunately there aren't any englisch versions of these tools as of yet.