Petros Kavazis

Forum Replies Created

  • Author
    Posts
  • October 8, 2024 at 4:01 pm #7136

    Handling Suspicious Emails or Messages:
    1. I verify the Sender’s email address to identify signs of phishing or spoofing. If the email appears to come from a legitimate source but seems suspicious, I cross-reference it with official contact details.
    2. I never click on any links or open attachments from untrusted or unexpected emails. Instead, I hover over links to see if they match legitimate URLs and, when necessary, I open them in a sandboxed environment(https://www.browserling.com/).
    3. If I suspect an email to be part of a phishing campaign, I report it to the appropriate internal team or my AV’s abuse service for further analysis.
    4. Using tools like MXToolbox or manual header analysis, I inspect the email’s metadata for inconsistencies that indicate a spoofed origin or malicious content.
    5. For clear-cut cases of phishing or scam attempts, I block the sender, report it and delete the email to avoid accidental exposure in the future.

    Frequency of Password Updates:
    – I update passwords at least every 3-6 months, depending on the sensitivity of the account or when my credentials have been leaked.