{"id":587,"date":"2012-08-14T09:00:24","date_gmt":"2012-08-14T09:00:24","guid":{"rendered":"http:\/\/blog.mozilla.org\/theden\/?p=587"},"modified":"2012-07-20T15:25:01","modified_gmt":"2012-07-20T15:25:01","slug":"3-tips-for-using-email-securely","status":"publish","type":"post","link":"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/","title":{"rendered":"3 Tips for Using Email Securely"},"content":{"rendered":"<p>Not every email scam is as easy to detect as the \u201cYou\u2019ve won a kajillion dollars!\u201d email. Sometimes email scams or attacks look like very legitimate messages. Here are some tips for staying secure when reading the messages in your inbox.<\/p>\n<p>1. <em>Be aware:<\/em> It\u2019s important to understand that it\u2019s super easy for someone to make an email message look legit \u2014 for example, an email that says it\u2019s from your bank or someone you know. If you want to be safe, to see if the message you\u2019re reading might not be for real, then always follow the next two steps.<\/p>\n<p>2. <em>Be smart:<\/em> If an email requests that you send any private information, such as a password or an identification number, there\u2019s an extremely good chance that there\u2019s a scammer behind it. Mark the message as \u201cjunk\u201d and delete it. If there\u2019s an attachment and you\u2019re unsure, don\u2019t even open it.<\/p>\n<p>3. <em>Be cautious:<\/em> If there are links in an email message, take some extra steps before clicking.<\/p>\n<ul>\n<li>Place your mouse over the link and look in the bottom left of your browser window. Sometimes email marketers use links that look funny in order to get click numbers. But other times, it\u2019s very obvious that the URL isn\u2019t what you think it is. If you\u2019re expecting to go to your bank\u2019s website, but the URL begins with www.kittensaresocute.com, then you\u2019ll know right away not to click. It may not always be that obvious, because scammers get more tricky all the time, but some don\u2019t expect you to even check. You can even look more closely to see if anything is spelled incorrectly, such as www.paypall.com (with two Ls instead of one), another sign of a scam.<\/li>\n<li>If you can&#8217;t see the URL when you hover over the link, you can copy and paste the link into a word-processing document. Right-click on the pasted link and select &#8220;Edit Hyperlink&#8221; from the menu that appears. Selecting &#8220;Edit Hyperlink&#8221; will open a pop-up window in Word that shows in the &#8220;Address&#8221; field the Web address to which the link directs.<\/li>\n<li>Clicking the link could be dangerous, but if you find that you did click on such a link, double-check the name of the site as shown in the location bar of the browser and be especially careful if the site name displayed is an IP address (e.g. &#8220;192.168.25.75&#8221;) instead of a domain name (e.g. &#8220;www.example.com&#8221;); in the former case it is very likely the site is not legitimate. Again, if something is misspelled in the URL (using the www.paypall.com example, where Paypal is spelled with two Ls), don\u2019t enter any personal information on the site.<\/li>\n<li>At this point, you could also check the certificate verification of the website. Check for the &#8220;lock&#8221; icon on the status bar that shows that you are on a secured site. Also check that the URL begins with &#8220;https&#8221; in the location bar when making transactions online.<\/li>\n<li>If you click on a link and have any concerns whatsoever, close the browser window. You can always take the extra step to go to a website directly (for example: type in your bank\u2019s URL) or call a business to confirm if something came from them. If the email has legitimate information \u2014 like a fraud alert \u2014 it should also be on the company website.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Not every email scam is as easy to detect as the \u201cYou\u2019ve won a kajillion dollars!\u201d email. Sometimes email scams or attacks look like very legitimate messages. Here are some tips for staying secure when reading the messages in your &hellip; <a class=\"go\" href=\"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/\">Continue reading<\/a><\/p>\n","protected":false},"author":378,"featured_media":338,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30,11034,11372],"tags":[278480,11363,69],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>3 Tips for Using Email Securely - The Den<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carmen Collins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/\",\"url\":\"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/\",\"name\":\"3 Tips for Using Email Securely - The Den\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mozilla.org\/theden\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.mozilla.org\/theden\/files\/2012\/05\/email.png\",\"datePublished\":\"2012-08-14T09:00:24+00:00\",\"dateModified\":\"2012-07-20T15:25:01+00:00\",\"author\":{\"@id\":\"https:\/\/blog.mozilla.org\/theden\/#\/schema\/person\/f72e292cb1e656a930fa14cbf7406b5b\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/#primaryimage\",\"url\":\"https:\/\/blog.mozilla.org\/theden\/files\/2012\/05\/email.png\",\"contentUrl\":\"https:\/\/blog.mozilla.org\/theden\/files\/2012\/05\/email.png\",\"width\":\"200\",\"height\":\"186\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.mozilla.org\/theden\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Tips for Using Email Securely\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.mozilla.org\/theden\/#website\",\"url\":\"https:\/\/blog.mozilla.org\/theden\/\",\"name\":\"The Den\",\"description\":\"A cozy corner of the Web filled with content just for you.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.mozilla.org\/theden\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.mozilla.org\/theden\/#\/schema\/person\/f72e292cb1e656a930fa14cbf7406b5b\",\"name\":\"Carmen Collins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/theden\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/292ae5a546ea93c5beb246979d0e8d77?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/292ae5a546ea93c5beb246979d0e8d77?s=96&d=mm&r=g\",\"caption\":\"Carmen Collins\"},\"url\":\"https:\/\/blog.mozilla.org\/theden\/author\/ccollinsmozilla-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Tips for Using Email Securely - The Den","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/","twitter_misc":{"Written by":"Carmen Collins","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/","url":"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/","name":"3 Tips for Using Email Securely - The Den","isPartOf":{"@id":"https:\/\/blog.mozilla.org\/theden\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/#primaryimage"},"image":{"@id":"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mozilla.org\/theden\/files\/2012\/05\/email.png","datePublished":"2012-08-14T09:00:24+00:00","dateModified":"2012-07-20T15:25:01+00:00","author":{"@id":"https:\/\/blog.mozilla.org\/theden\/#\/schema\/person\/f72e292cb1e656a930fa14cbf7406b5b"},"breadcrumb":{"@id":"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/#primaryimage","url":"https:\/\/blog.mozilla.org\/theden\/files\/2012\/05\/email.png","contentUrl":"https:\/\/blog.mozilla.org\/theden\/files\/2012\/05\/email.png","width":"200","height":"186"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mozilla.org\/theden\/2012\/08\/14\/3-tips-for-using-email-securely\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.mozilla.org\/theden\/"},{"@type":"ListItem","position":2,"name":"3 Tips for Using Email Securely"}]},{"@type":"WebSite","@id":"https:\/\/blog.mozilla.org\/theden\/#website","url":"https:\/\/blog.mozilla.org\/theden\/","name":"The Den","description":"A cozy corner of the Web filled with content just for you.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mozilla.org\/theden\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.mozilla.org\/theden\/#\/schema\/person\/f72e292cb1e656a930fa14cbf7406b5b","name":"Carmen Collins","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/theden\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/292ae5a546ea93c5beb246979d0e8d77?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/292ae5a546ea93c5beb246979d0e8d77?s=96&d=mm&r=g","caption":"Carmen Collins"},"url":"https:\/\/blog.mozilla.org\/theden\/author\/ccollinsmozilla-com\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mozilla.org\/theden\/wp-json\/wp\/v2\/posts\/587"}],"collection":[{"href":"https:\/\/blog.mozilla.org\/theden\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mozilla.org\/theden\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/theden\/wp-json\/wp\/v2\/users\/378"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/theden\/wp-json\/wp\/v2\/comments?post=587"}],"version-history":[{"count":0,"href":"https:\/\/blog.mozilla.org\/theden\/wp-json\/wp\/v2\/posts\/587\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/theden\/wp-json\/wp\/v2\/media\/338"}],"wp:attachment":[{"href":"https:\/\/blog.mozilla.org\/theden\/wp-json\/wp\/v2\/media?parent=587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mozilla.org\/theden\/wp-json\/wp\/v2\/categories?post=587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mozilla.org\/theden\/wp-json\/wp\/v2\/tags?post=587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}