dcsimg

Find an IT Download

Recognizing and Avoiding E-mail Scams

These guidelines will help you avoid the swarm of e-mail scams and threats out there, including phishing and identity theft schemes. It's a jungle out there; take every precaution.


163 KB | 3 files | null DOC,null PDF

E-mail provides us a convenient and powerful communications tool. Unfortunately, it also provides scammers and other malicious individuals an easy means for luring potential victims. The scams they attempt run from old-fashioned bait-and-switch operations to phishing schemes using a combination of email and bogus web sites to trick victims into divulging sensitive information. To protect yourself from these scams, you should understand what they are, what they look like, how they work, and what you can do to avoid them. The following guide gives recommendations on how you can minimize your chances of falling victim to an e-mail scam.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Recognizing and Avoiding E-mail Scams.pdf

Related IT DOWNLOADS

Recent IT Downloads
Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversat...Read More

Recent IT Downloads
Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat inform...Read More

Recent IT Downloads
Colocation Checklist

This checklist will help make sure you ask the important questions that will affect your coloc...Read More

Recent IT Downloads
Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including ...Read More