SlideShare une entreprise Scribd logo
1  sur  43
Email Basics
Email
   Guidelines / etiquette
   Privacy
   Spam
   Hoaxes/chain letters
Guidelines / Etiquette
Basic Guidelines
   Length
       Be concise, to the point
   Use the subject line
       Senior Services rule – no complete client
        names
   Read it carefully before sending it
   Be professional
Tone
   We all interact with the printed word as
    though it has a personality and that
    personality makes positive and negative
    impressions on us
   Without immediate feedback your message
    can easily be misinterpreted by your reader,
    so it can be important to follow the basic
    rules of etiquette to construct an appropriate
    tone
Tone
   AVOID ALL CAPITAL LETTERS
   Humor, sarcasm – can be difficult to
    convey and/or interpret
   Emoticons – use - sparingly :-)
Emoticons
:-) = Happy

:-( = Sad

;-) = Wink (sarcasm)

:-0 = yell
Identify Yourself
   Signature
       Full name
       Title
       Company
       Address
       Phone number
       Fax number
Replies and Forwarding
   Use the “reply to” or “reply to all” option
       Maintains a link to the original message
       Maintains “thread” of correspondence
   Forwarding message
       Not the same as replying
       Mail original message to someone other than the
        sender
       Use caution when forarding private or sensitive
        messages without the permission of the sender
       May be inappropriate to forward a portion of a
        message
Using the “CC:” Field
   Carbon Copy
   Everyone in the “To” and “CC” fields are
    visible
   “This email is not addressed to you,
    you’re just getting a copy” (FYI)
   Can be overused
   “Reply to All” will be sent to everyone in
    the “CC” and “To” fields
Using the “Bcc” field
   Blind Carbon Copy
   Conceals addresses from other
    recipients
   Use for mass mailings
       No need for others to see list of recipients
   Will not receive a “Reply To” or “Reply
    to All” message
Email Attachments
   Never open an unexpected attachment
       Even from someone you know
   Used to spread viruses
   Scan questionable attachments
       On demand scan / scan upon open
   When sending attachments, tell the recipient
       The name of the file
       The program it is saved in
       The version of the program
Etiquette - Flaming
   Verbal attack
   Not an appropriate use
   Ignore
   Steps to avoid
       Carefully read messages before sending
       Don’t send messages in all upper case
       Don’t send insulting email
       Don’t send mass-mailing advertisements
Privacy of Email
Privacy of Email
   Not a secure form of communication
   Don’t send secret or confidential information
       Credit card information
       Social security number
       Passwords
   More like a postcard than a sealed letter
   Think before you forward
       Do you have the sender’s permission?
Privacy of Email
   Subject to review with sufficient
    justification
       Court order
       Evidence as part of an investigation
   Message may be mistakenly addressed
       Return message to sender and delete
When NOT to Communicate
Via Email
   Don’t send email of a sensitive or confidential
    nature
   Don’t use email to communicate complaints
    or dissatisfaction with someone
       Have a phone or face-to-face conversation with
        the person
       Promotes 2-way communication
   If you find yourself responding more than 3
    times on the same topic ~
       Have a phone or face-to-face conversation with
        the person
Privacy of Email
   If you wouldn’t want it broadcast on the
    6:00 news – don’t put it in an email!!
Hoaxes and Chain Letters
Purpose and Cost
   Send to everyone
   Messages true??
   Appeal to sense of good will
   Cost
       Time to read
       Stress placed on servers
   Spammers harvest email addresses
    from hoaxes and chain letters
Cost of Hoaxes and Chain
Letters
   Send to 10 people
       They send to 10 people (100)
            They send to 10 people (1,000)
                 They send to 10 people (10,000)
                     They send to 10 people (100,000)


   …. They send to 10 people
            “six degrees of separation”

   1,000,000 - 1 million people !
Examples
Hoax/Chain Letter Prevention
 Do NOT forward the message
 Sites used to check validity:

Snopes: http://www.snopes.com
Hoaxbusters:
  http://hoaxbusters.ciac.org/HBHoaxInfo.html
F-Secure:
  http://www.f-secure.com/virus-info/hoax
McAfee: http://vil.nai.com/vil/hoaxes.aspx
Phishing
   Process by which someone obtains
    private information through deceptive
    or illicit means
       Used to falsely assume another
        person’s identity
   Most commonly an email stating your
    account information needs updating
Phishing Example
Phishing Example
Phishing Example
Phishing Example
Phishing Example
How Secure Do You Need to
Be?
   Be prudent not paranoid
   Did you initiate the action?
   Is the source trustworthy?
   Best thing to do is to type in the URL and check your
    account directly without following any links in the
    email
   Watch for URL’s that are numeric or different from
    the link you clicked on
   Many legitimate emails no longer contain a link
    (Paypal)
   When in doubt Google it
Spam
Spam
   Junk mail
   Unsolicited bulk mailings
   Overloads mailboxes
       20 - 90% of incoming traffic
       Adult content, health promotions, software offers,
        investment ads, get-rich quick schemes
       Chain letters, hoaxes, jokes
   NEVER respond to spam!
Spam
   How they obtain email addresses:
       Posted on the web (chat, newsgroups, etc.)
       Web-based discussion boards
       Inappropriate sharing or sale of email addresses
       Companies not respecting user opt-out
        preferences
       Signing up for “offers”
       Guessing (random generation)
       Stealing via malware
Spam
   Spammers hide true source of mail
       Misconfigured mail servers allow this
       Sign up for free accounts
   Spam scanning system
       Determines if each message is spam
            Point system
            Lists / libraries / keywords
            Blacklist / Whitelist
            {BULK} = may be spam
Senior Services Response to Spam
   Defining spam
       Difficult
            Did you sign up for weight-loss tips?
            Are you really interested in advancing your
             degree on-line?
   Can’t block all sites
       Also include legitimate mail
   Barracuda spam firewall
Senior Services Response to Spam
         Barracuda Spam Firewall
   Rate control
   Recipient verification
   Virus protection
   Fingerprint analysis
   Intent analysis
   Image analysis
   Spam rules scoring engine
   Policy (user-specified rules)
Senior Services Response to Spam
         Barracuda Spam Firewall
   Allowed 25,059 since April 18
   Blocked 786,312
       152 viruses
       1,788 “tagged”
   96.5 % BLOCKED at senior services
       Normally 20 - 90% of incoming traffic
Senior Services Response to Spam
   Set up filters to sort spam messages
       Place in junk mail folder and then review
Senior Services Response to Spam
   Reporting spam
       jpugh@seniorservices1.Org
Other Methods to Reduce
Spam
   Contact your congressperson
   Be cautious when giving out your email
    address
   Complain to the internet service provider
    where the message originated
       Forward the message
       Abuse@domain_name (
        abuse@seniorservices1.org, abuse@yahoo.com,
        abuse@school.edu)
Summary
   Email is a valuable communication tool
   Sometimes – it is NOT the best or most
    appropriate method of communication
   Follow the basic guidelines presented to
    improve the quality of your
    communications
Questions?
   Email: jpugh@seniorservices1.org
   Phone: 382-0515 ext. 122

Contenu connexe

Tendances

Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer JungleJason S
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackersseema Vishwakarma
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview PptAntonio Ieranò
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internetapemberton1
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attackClaranet UK
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...Liberteks
 
E mail etiquettes
E mail etiquettesE mail etiquettes
E mail etiquettesJpRawat
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats mohamad Hamizi
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
American Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy PolicyAmerican Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy Policyfarrahesham
 

Tendances (16)

Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview Ppt
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Common Email Security Mistakes
Common Email Security MistakesCommon Email Security Mistakes
Common Email Security Mistakes
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internet
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...
 
E mail etiquettes
E mail etiquettesE mail etiquettes
E mail etiquettes
 
Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
How to Detect Email Fraud
How to Detect Email FraudHow to Detect Email Fraud
How to Detect Email Fraud
 
Irm 13-phishing
Irm 13-phishingIrm 13-phishing
Irm 13-phishing
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
American Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy PolicyAmerican Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy Policy
 

En vedette

Sending Email Basics PHP
Sending Email Basics PHPSending Email Basics PHP
Sending Email Basics PHPProdigyView
 
Marathi Journalism in the 19th century
Marathi Journalism in the 19th century Marathi Journalism in the 19th century
Marathi Journalism in the 19th century Saurabh Deshpande
 
यशाची गुरुकिल्ली भाग 2
यशाची गुरुकिल्ली  भाग 2यशाची गुरुकिल्ली  भाग 2
यशाची गुरुकिल्ली भाग 2dattatray godase
 
Marathi Manus Kute Aahe
Marathi Manus Kute AaheMarathi Manus Kute Aahe
Marathi Manus Kute Aaheprasad_sakat
 
Basic Internet Introduction in English and Marathi
Basic Internet Introduction in English and MarathiBasic Internet Introduction in English and Marathi
Basic Internet Introduction in English and MarathiMayur Patil
 
Cultural Heritage of India
Cultural Heritage of IndiaCultural Heritage of India
Cultural Heritage of IndiaSargun Kohli
 
Rain water harvesting ppt
Rain water harvesting pptRain water harvesting ppt
Rain water harvesting pptPalash Jain
 
Pollution.Ppt
Pollution.PptPollution.Ppt
Pollution.PptSVS
 
The Science of Email Marketing
The Science of Email MarketingThe Science of Email Marketing
The Science of Email MarketingHubSpot
 

En vedette (13)

Sending Email Basics PHP
Sending Email Basics PHPSending Email Basics PHP
Sending Email Basics PHP
 
Elementary
ElementaryElementary
Elementary
 
Marathi Journalism in the 19th century
Marathi Journalism in the 19th century Marathi Journalism in the 19th century
Marathi Journalism in the 19th century
 
यशाची गुरुकिल्ली भाग 2
यशाची गुरुकिल्ली  भाग 2यशाची गुरुकिल्ली  भाग 2
यशाची गुरुकिल्ली भाग 2
 
Marathi Manus Kute Aahe
Marathi Manus Kute AaheMarathi Manus Kute Aahe
Marathi Manus Kute Aahe
 
Basic Internet Introduction in English and Marathi
Basic Internet Introduction in English and MarathiBasic Internet Introduction in English and Marathi
Basic Internet Introduction in English and Marathi
 
Maharashtra
 Maharashtra Maharashtra
Maharashtra
 
Circulatory system
Circulatory systemCirculatory system
Circulatory system
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
Cultural Heritage of India
Cultural Heritage of IndiaCultural Heritage of India
Cultural Heritage of India
 
Rain water harvesting ppt
Rain water harvesting pptRain water harvesting ppt
Rain water harvesting ppt
 
Pollution.Ppt
Pollution.PptPollution.Ppt
Pollution.Ppt
 
The Science of Email Marketing
The Science of Email MarketingThe Science of Email Marketing
The Science of Email Marketing
 

Similaire à Email basics

A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 
Email strategies
Email strategiesEmail strategies
Email strategiesAlan Haller
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfHost It Smart
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxDr Ganesh Saini
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfChinmayee Behera
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxvdgtkhdh
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxamby3
 
Email Best Practices for Nonprofits
Email Best Practices for NonprofitsEmail Best Practices for Nonprofits
Email Best Practices for NonprofitsMolly Maple Bryant
 
Final paper
Final paperFinal paper
Final paperJDonpfd3
 
Security awareness
Security awarenessSecurity awareness
Security awarenessSanoop Nair
 
Bad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptxBad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptxGEETHA LATHA
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 

Similaire à Email basics (20)

A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Email strategies
Email strategiesEmail strategies
Email strategies
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Spam
SpamSpam
Spam
 
Email
EmailEmail
Email
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
Business Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptxBusiness Email Etiquette & Ethics ppt.pptx
Business Email Etiquette & Ethics ppt.pptx
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Email Best Practices for Nonprofits
Email Best Practices for NonprofitsEmail Best Practices for Nonprofits
Email Best Practices for Nonprofits
 
Final paper
Final paperFinal paper
Final paper
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Good e mail practices
Good e mail practicesGood e mail practices
Good e mail practices
 
Bad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptxBad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptx
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 

Dernier

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Dernier (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Email basics

  • 2. Email  Guidelines / etiquette  Privacy  Spam  Hoaxes/chain letters
  • 4. Basic Guidelines  Length  Be concise, to the point  Use the subject line  Senior Services rule – no complete client names  Read it carefully before sending it  Be professional
  • 5. Tone  We all interact with the printed word as though it has a personality and that personality makes positive and negative impressions on us  Without immediate feedback your message can easily be misinterpreted by your reader, so it can be important to follow the basic rules of etiquette to construct an appropriate tone
  • 6. Tone  AVOID ALL CAPITAL LETTERS  Humor, sarcasm – can be difficult to convey and/or interpret  Emoticons – use - sparingly :-)
  • 7. Emoticons :-) = Happy :-( = Sad ;-) = Wink (sarcasm) :-0 = yell
  • 8. Identify Yourself  Signature  Full name  Title  Company  Address  Phone number  Fax number
  • 9. Replies and Forwarding  Use the “reply to” or “reply to all” option  Maintains a link to the original message  Maintains “thread” of correspondence  Forwarding message  Not the same as replying  Mail original message to someone other than the sender  Use caution when forarding private or sensitive messages without the permission of the sender  May be inappropriate to forward a portion of a message
  • 10. Using the “CC:” Field  Carbon Copy  Everyone in the “To” and “CC” fields are visible  “This email is not addressed to you, you’re just getting a copy” (FYI)  Can be overused  “Reply to All” will be sent to everyone in the “CC” and “To” fields
  • 11. Using the “Bcc” field  Blind Carbon Copy  Conceals addresses from other recipients  Use for mass mailings  No need for others to see list of recipients  Will not receive a “Reply To” or “Reply to All” message
  • 12. Email Attachments  Never open an unexpected attachment  Even from someone you know  Used to spread viruses  Scan questionable attachments  On demand scan / scan upon open  When sending attachments, tell the recipient  The name of the file  The program it is saved in  The version of the program
  • 13. Etiquette - Flaming  Verbal attack  Not an appropriate use  Ignore  Steps to avoid  Carefully read messages before sending  Don’t send messages in all upper case  Don’t send insulting email  Don’t send mass-mailing advertisements
  • 15. Privacy of Email  Not a secure form of communication  Don’t send secret or confidential information  Credit card information  Social security number  Passwords  More like a postcard than a sealed letter  Think before you forward  Do you have the sender’s permission?
  • 16. Privacy of Email  Subject to review with sufficient justification  Court order  Evidence as part of an investigation  Message may be mistakenly addressed  Return message to sender and delete
  • 17. When NOT to Communicate Via Email  Don’t send email of a sensitive or confidential nature  Don’t use email to communicate complaints or dissatisfaction with someone  Have a phone or face-to-face conversation with the person  Promotes 2-way communication  If you find yourself responding more than 3 times on the same topic ~  Have a phone or face-to-face conversation with the person
  • 18. Privacy of Email  If you wouldn’t want it broadcast on the 6:00 news – don’t put it in an email!!
  • 19. Hoaxes and Chain Letters
  • 20. Purpose and Cost  Send to everyone  Messages true??  Appeal to sense of good will  Cost  Time to read  Stress placed on servers  Spammers harvest email addresses from hoaxes and chain letters
  • 21. Cost of Hoaxes and Chain Letters  Send to 10 people  They send to 10 people (100)  They send to 10 people (1,000)  They send to 10 people (10,000)  They send to 10 people (100,000)  …. They send to 10 people “six degrees of separation”  1,000,000 - 1 million people !
  • 23.
  • 24. Hoax/Chain Letter Prevention  Do NOT forward the message  Sites used to check validity: Snopes: http://www.snopes.com Hoaxbusters: http://hoaxbusters.ciac.org/HBHoaxInfo.html F-Secure: http://www.f-secure.com/virus-info/hoax McAfee: http://vil.nai.com/vil/hoaxes.aspx
  • 25. Phishing  Process by which someone obtains private information through deceptive or illicit means  Used to falsely assume another person’s identity  Most commonly an email stating your account information needs updating
  • 31. How Secure Do You Need to Be?  Be prudent not paranoid  Did you initiate the action?  Is the source trustworthy?  Best thing to do is to type in the URL and check your account directly without following any links in the email  Watch for URL’s that are numeric or different from the link you clicked on  Many legitimate emails no longer contain a link (Paypal)  When in doubt Google it
  • 32. Spam
  • 33. Spam  Junk mail  Unsolicited bulk mailings  Overloads mailboxes  20 - 90% of incoming traffic  Adult content, health promotions, software offers, investment ads, get-rich quick schemes  Chain letters, hoaxes, jokes  NEVER respond to spam!
  • 34. Spam  How they obtain email addresses:  Posted on the web (chat, newsgroups, etc.)  Web-based discussion boards  Inappropriate sharing or sale of email addresses  Companies not respecting user opt-out preferences  Signing up for “offers”  Guessing (random generation)  Stealing via malware
  • 35. Spam  Spammers hide true source of mail  Misconfigured mail servers allow this  Sign up for free accounts  Spam scanning system  Determines if each message is spam  Point system  Lists / libraries / keywords  Blacklist / Whitelist  {BULK} = may be spam
  • 36. Senior Services Response to Spam  Defining spam  Difficult  Did you sign up for weight-loss tips?  Are you really interested in advancing your degree on-line?  Can’t block all sites  Also include legitimate mail  Barracuda spam firewall
  • 37. Senior Services Response to Spam Barracuda Spam Firewall  Rate control  Recipient verification  Virus protection  Fingerprint analysis  Intent analysis  Image analysis  Spam rules scoring engine  Policy (user-specified rules)
  • 38. Senior Services Response to Spam Barracuda Spam Firewall  Allowed 25,059 since April 18  Blocked 786,312  152 viruses  1,788 “tagged”  96.5 % BLOCKED at senior services  Normally 20 - 90% of incoming traffic
  • 39. Senior Services Response to Spam  Set up filters to sort spam messages  Place in junk mail folder and then review
  • 40. Senior Services Response to Spam  Reporting spam  jpugh@seniorservices1.Org
  • 41. Other Methods to Reduce Spam  Contact your congressperson  Be cautious when giving out your email address  Complain to the internet service provider where the message originated  Forward the message  Abuse@domain_name ( abuse@seniorservices1.org, abuse@yahoo.com, abuse@school.edu)
  • 42. Summary  Email is a valuable communication tool  Sometimes – it is NOT the best or most appropriate method of communication  Follow the basic guidelines presented to improve the quality of your communications
  • 43. Questions?  Email: jpugh@seniorservices1.org  Phone: 382-0515 ext. 122