Contact Sales:     | Pay My BillClient SupportGet Started!

Email Best Practices for Businesses in the Modern Workplace

With more focus on working from home, it’s a great time to remind your employees of email best practices for businesses to keep your network safe.  Here are six of Iconic IT’s email best practices to keep your business connected and secure.

1. Never Use the Same Passwords Across Multiple Platforms

This makes more sense if you look at your passwords as a virtual skeleton key. Skeleton keys are specially cut to give the user access to every door in a building. If thieves manage to get a skeleton key, no room is safe; they can move from room to room and steal anything they please. Separate keys ensure that a thief has limited access and can only open the door that matches that key. That room may be compromised, but the rest of the building is safe.

A password manager can help your employees keep passwords organized and secure.

2.  Look but Don’t Click

Be aware that cybercriminals are getting more sophisticated. They can send emails that appear to be from a reputable site or a trusted source. Often, the suspicious emails contain attachments that also appear to be legitimate. Once clicked, these attachments spread malware throughout your employees’ devices and your network.

As part of your email best practices for your business, advise your employees never to open an attachment unless they can verify the sender.

3.  Never Open Emails That Contain Grammatically Incorrect Subject Lines and Content

No one is perfect and occasional spelling and grammatical errors happen to the best of us; but an email that has a heavily misspelled subject line is suspect. Likewise, if the content and body of the email contains many spelling and grammatical errors, it is most likely a phishing attempt.

Be on the lookout for very vague greetings, too; impersonal “To” lines and greetings are the calling cards of phishing attempts.

Phishing attempts may slide past your email and spam filters, so educate your employees.

4.  Sense of Urgency and Requests for Known Information? Don’t Respond!

We’ve all heard the joke about a psychic asking a person’s name and the person responding, “Don’t you already know?” That’s exactly the concept behind phony emails requesting information that the alleged sender should “already know.” Examples include “banks” requesting account information, “HR departments” requesting social security numbers, or any sender requesting password updates.

If these are sent with a sense of urgency or any threat, it should be a double red flag for your users.

5. Email Best Practices: Verify, Verify, Verify

Your employees should be reminded to carefully check the sender address before opening any email. The differences are very subtle, usually involving a domain name change (.org vs .com, for instance) or a misspelling of the company or sender the email is allegedly from. Encourage your employees to reach out to coworkers for verification that an email was sent if they suspect it may be a phishing attempt.

6. Have a Plan in Place “Just in Case”

No matter how prepared your employees are, they still may accidentally click on a risky attachment. Have a plan in place, just in case. The plan should include, at a minimum, instructions for isolating the machine and notification procedures.

Cybersecurity Training

These tips and lots more are all covered under cybersecurity training. With so many of your employees working remotely, it’s more important to make sure they are protecting your network than it has ever been before.

Heads Up Before Requesting Information

As a CEO or business owner, you may genuinely need to send emails to your employees. Never ask for any personal information from them via email and advise them to reach out to your office if they receive any odd requests from you. Encourage them to touch base with their supervisors, HR, Finance, or any other department or co-worker if they spot odd, unsolicited information requests from those departments.

You may choose to notify supervisors before requesting any information from your employees to notify them that an upcoming request is legitimately from your office. Remember, though: never ask them to send sensitive or personal data of any kind via email. Encourage them to call a centralized employee for any information you may need or allow their supervisors to collect the information for you.

If these extra steps sound like a lot more work, just keep in mind: It’s far easier to verify communications than it is to clean up following a breach.

Email Best Practices at a Glance

For more information about email best practices for your business, request this beautiful breakroom poster, delivered to your office at no charge or obligation to you.

Iconic IT has the information you need to help you through this time and beyond. Click here for more tools and resources, free to browse, download and use immediately.

Does Creating a Cybersecurity Plan Make Your Head Spin?

RECENT BLOG POST

Southwest Florida Business Today Awards & In the News

Iconic IT in the News in Bonita Springs FL

Iconic IT was profiled in Southwest Florida Business Today for how businesses remain positive following COVID-19. Chase Sonen, an account […]
Read Post
Sales and Marketing Team at Iconic IT - SMKO 2020 COVID-19

Creating the Best Future for Your Small to Medium-Sized Business After COVID19

Little by little, business will begin coming back after COVID19. Creating the best future for your small to medium-sized business after COVID19 starts now. With a little foresight and planning, you can come out of the starting gate far ahead of the competition and turn the pandemic into an amazing growth opportunity for your business.
Read Post
It Services in Telehealth and Technology COVID-19

Staying HIPAA Compliant While Working from Home

Your remote workers aren’t exempt from HIPAA regulations. Protect them and your organization from costly violations.
Read Post
Email Security COVID-19

Email Best Practices for Businesses in the Modern Workplace

If thieves manage to get a skeleton key, no room is safe; they can move from room to room and steal anything they please.
Read Post
Cybersecurity Awards & In the News

Iconic IT Warns of Disturbing Coronavirus Cybersecurity Threats: Remote Workers Especially Vulnerable

FOR IMMEDIATE RELEASE Contact: Gabriela Ramirez, Communication Manager Iconic IT is warning businesses of a disturbing new trend in cyber […]
Read Post
Stimulus Checks for IT Solutions Awards & In the News

Keep Your Stimulus Checks Safe, Warns Mike Fowler, CEO of Iconic IT

FOR IMMEDIATE RELEASE Contact: Gaby Ramirez, Iconic IT  Hackers and Scammers are Already Hard at Work Stealing Economic Impact Payment Checks  [April 10, […]
Read Post
Mike Fowler, CEO of Iconic IT COVID-19

From the Desk of Mike Fowler, Iconic IT CEO

In our effort to keep you informed, I wanted to update you on how Iconic IT is responding to this […]
Read Post
Iconic IT in the news in the Rochester NY Business Journal Awards & In the News

Iconic IT in the News in Rochester NY

Iconic IT was profiled in the Rochester Business Journal for its upgraded security services for its clients at no charge.  […]
Read Post
IT Support for Small to Medium Size Businesses COVID-19

Six Tips for Your Business to Survive Round Two of COVID-19

Looking for tips for your business to survive COVID-19? Here are six tips to keep your doors open during round […]
Read Post
Coronavirus - Financial and Healthcare Crisis COVID-19

COVID-19 Financial Resources Expire at the End of This Year: Here Is a List

COVID-19 has changed the face of business forever, especially small to medium-sized organizations. In times of uncertainty, it’s helpful to […]
Read Post