Email Best Practices for Businesses: COVID-19 and Beyond

With more focus on working from home, it’s a great time to remind your employees of email best practices for businesses to keep your network safe.  Here are six of Iconic IT’s email best practices to keep your business connected and secure.

1. Never Use the Same Passwords Across Multiple Platforms

This makes more sense if you look at your passwords as a virtual skeleton key. Skeleton keys are specially cut to give the user access to every door in a building. If thieves manage to get a skeleton key, no room is safe; they can move from room to room and steal anything they please. Separate keys ensure that a thief has limited access and can only open the door that matches that key. That room may be compromised, but the rest of the building is safe.

A password manager can help your employees keep passwords organized and secure.

2.  Look but Don’t Click

Be aware that cybercriminals are getting more sophisticated. They can send emails that appear to be from a reputable site or a trusted source. Often, the suspicious emails contain attachments that also appear to be legitimate. Once clicked, these attachments spread malware throughout your employees’ devices and your network.

As part of your email best practices for your business, Advise your employees never to open an attachment unless they can verify the sender.

3.  Never Open Emails That Contain Grammatically Incorrect Subject Lines and Content

No one is perfect and occasional spelling and grammatical errors happen to the best of us; but an email that has a heavily misspelled subject line is suspect. Likewise, if the content and body of the email contains many spelling and grammatical errors, it is most likely a phishing attempt.

Be on the lookout for very vague greetings, too; impersonal “To” lines and greetings are the calling cards of phishing attempts.

4.  Sense of Urgency and Requests for Known Information? Don’t Respond!

We’ve all heard the joke about a psychic asking a person’s name and the person responding, “Don’t you already know?” That’s exactly the concept behind phony emails requesting information that the alleged sender should “already know.” Examples include “banks” requesting account information, “HR departments” requesting social security numbers, or any sender requesting password updates.

If these are sent with a sense of urgency or any threat, it should be a double red flag for your users.

5. Email Best Practices: Verify, Verify, Verify

Your employees should be reminded to carefully check the sender address before opening any email. The differences are very subtle, usually involving a domain name change (.org vs .com, for instance) or a misspelling of the company or sender the email is allegedly from. Encourage your employees to reach out to coworkers for verification that an email was sent if they suspect it may be a phishing attempt.

6. Have a Plan in Place “Just in Case”

No matter how prepared your employees are, they still may accidentally click on a risky attachment. Have a plan in place, just in case. The plan should include, at a minimum, instructions for isolating the machine and notification procedures.

Cybersecurity Training

These tips and lots more are all covered under cybersecurity training. With so many of your employees working remotely, it’s more important to make sure they are protecting your network than it has ever been before.

Heads Up Before Requesting Information

As a CEO or business owner, you may genuinely need to send emails to your employees. Never ask for any personal information from them via email and advise them to reach out to your office if they receive any odd requests from you. Encourage them to touch base with their supervisors, HR, Finance, or any other department or co-worker if they spot odd, unsolicited information requests from those departments.

You may choose to notify supervisors before requesting any information from your employees to notify them that an upcoming request is legitimately from your office. Remember, though: never ask them to send sensitive or personal data of any kind via email. Encourage them to call a centralized employee for any information you may need or allow their supervisors to collect the information for you.

If these extra steps sound like a lot more work, just keep in mind: It’s far easier to verify communications than it is to clean up following a breach.

Email Best Practices at a Glance

For more information about email best practices for your business, request this beautiful breakroom poster, delivered to your office at no charge or obligation to you.

Iconic IT has the information you need to help you through this time and beyond. Click here for more tools and resources, free to browse, download and use immediately.

RECENT BLOG POST

COVID-19

Iconic IT in the News in Bonita Springs FL

Iconic IT was profiled in Southwest Florida Business Today for how businesses remain positive following COVID-19. Chase Sonen, an account […]

Read Post
COVID-19

How IT Services in Bonita Springs Florida Can Help Your Business Survive COVID19

From stay-at-home orders impacting customers to businesses being forced to temporarily shut their doors and embrace a remote workforce, there is no small to medium-sized business in Florida that hasn’t been touched by the pandemic in some form or another. IT managed services may be the last thing on your mind right now, but IT services in Bonita Springs Florida can help your business survive COVID19.

Read Post
Blog

Working Remotely in Rochester and Buffalo

Working remotely in Rochester and New York can be challenging. Here are six tips to help your teams make the most of working remotely.

Read Post