BurgiTech Logo

Surpriiiise!

Are you a HIPAA covered entity?

Hey! You just discovered a perk! For a limited time only, we are giving away free Notice of Privacy Practices posters which are required to be posted on your office wall. Contact us today and mention this "Surprise!" and you'll find out that you will not only get your free NPP but another surprise is waiting for you as well!

You can choose your favorate NPP format:

From the Blog

Cyber Security Awareness Training Series – Part I.I – Email (Attachments)

Burgi Technologies > All  > Cyber Security Awareness Training Series – Part I.I – Email (Attachments)

Cyber Security Awareness Training Series – Part I.I – Email (Attachments)

Security risks associated with Email attachments

Everyone knows better than to open the door to a suspicious stranger with a bag and let them inside. But this is actually a very common occurrence in the digital world. Email attachments are one of the most common ways to get infected with malware. It’s critical that you avoid opening an attachment if you don’t know who an email is coming from. Even though it may look like an Excel file, a PDF, an image or something else it may in fact be malicious. A downloaded attachment can sometimes immediately infect your computer or may execute a macro after opening a document such as Word or Excel.

How to avoid being hacked or infected by email attachments?

Your IT department may put rules in place to keep certain types of attachments from being sent or received. But even if so, be sure to always be cautious before opening anything and let your IT department know if you think you received a sketchy email. Be cautious also with attachments from people you do know. Check the address of the sender to make sure it’s who it says it is and not someone impersonating them. Even if it is from the correct address their email could have been hacked and used to trick you into opening something malicious. If the email seems fishy or isn’t typical of them do not open the attachment.

What to do if you received a suspicious email?

Well, first, do not click or open the attachments. When in doubt, connect with your IT security team or follow other company policies for suspicious emails and call or text the sender and ask if they actually sent the email. If they did not, let them know they should change their email password and security questions because they were probably breached.

Let’s review the top tips for email attachments:

Never open or save attachments from an unknown sender.

Even when an email comes from someone you trust, if it looks fishy, don't open or save the attachment.

Let your IT department know if you received a suspicious email.

Seek expert advice

Conclusion

If getting sketchy emails is becoming a growing problem for you and your business, our team of Cyber Security experts here at Burgi Tech are available to help and provide consultation and solutions to minimize any Cyber Security risk to your business. If you are interested in finding out more about Network Security Services in Orange County get in touch with us for a free consultation today! Our IT specialists will help you figure out how you can have your network secured and protected in no time at all.

BurgiTech Team