Petros Kavazis
Forum Replies Created
-
AuthorPosts
-
October 8, 2024 at 4:01 pm #7136
Handling Suspicious Emails or Messages:
1. I verify the Sender’s email address to identify signs of phishing or spoofing. If the email appears to come from a legitimate source but seems suspicious, I cross-reference it with official contact details.
2. I never click on any links or open attachments from untrusted or unexpected emails. Instead, I hover over links to see if they match legitimate URLs and, when necessary, I open them in a sandboxed environment(https://www.browserling.com/).
3. If I suspect an email to be part of a phishing campaign, I report it to the appropriate internal team or my AV’s abuse service for further analysis.
4. Using tools like MXToolbox or manual header analysis, I inspect the email’s metadata for inconsistencies that indicate a spoofed origin or malicious content.
5. For clear-cut cases of phishing or scam attempts, I block the sender, report it and delete the email to avoid accidental exposure in the future.Frequency of Password Updates:
– I update passwords at least every 3-6 months, depending on the sensitivity of the account or when my credentials have been leaked. -
AuthorPosts