How Not to Look Like a Phish - Slide 6

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next How Not to Look Like a Phish-6 Next

Be very cautious about using “click here” links. You may think they read better, but customers should rightly be suspicious of any attempt to obscure the destination of a link. Written-out addresses are better.

Phishing is an increasing and serious problem. Luckily, consumers and some tools are getting better at identifying and deleting them. Unfortunately for businesses, many legitimate messages get thrown away because they look too much like phishing messages. This slideshow highlights seven ideas identified by Westfield Insurance that companies should keep in mind when developing company e-mail.


Related Topics : Box.net, IT Management Automation, SharePoint, Facebook, T-Mobile

More Slideshows

SAPSocialCollabSuccess0x 6 Strategies for Being Successful with Social Collaboration

Enterprise social collaboration solutions are most successful when they contribute to business value and benefits that address company goals. ...  More >>

IT_Man86-290x195 5 Criteria for Selecting the Best Enterprise Collaboration Tool

Chosen carefully, collaboration tools will save time, cut costs and reduce complications associated with storing and retrieving documents throughout a company's operations. ...  More >>

ClickSoftwareEnterpriseAR0x 5 Ways Pokémon GO Is Driving Augmented Reality in the Enterprise

With the consumerization of AR, it appears the technology is finally within arm's reach for those savvy enterprises willing to reach out and grab it. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.