Category / Section
How to Identify Safe and Verified Emails
Updated:
Overview
To ensure the safety of emails, it is important to recognize trusted domains and use additional verification methods. This guide provides detailed steps to help users identify legitimate emails and avoid potential phishing or spam attempts.
Steps to Identify Safe Emails
-
Verify the Sender’s Email Domain
- Emails from trusted sources should originate from specific domains. For example:
@bluejacketinc.org(system generated emails will come from it@bluejacketinc.org)@bluejacketacademy.org(system generated emails will come from it@bluejacketacademy.org)
- Always confirm that the email address matches these domains exactly. Be cautious of slight variations or misspellings, which could indicate phishing attempts.
- Emails from trusted sources should originate from specific domains. For example:
-
Check for External Warnings in Gmail
- Gmail provides an “External” warning banner for emails sent from outside your organization. Pay attention to this warning, as it can help you identify messages that may not be from a trusted sender.
- Gmail provides an “External” warning banner for emails sent from outside your organization. Pay attention to this warning, as it can help you identify messages that may not be from a trusted sender.
- Look for the Verified Logo
- Trusted Blue Jacket IT vendors may include a verified logo as part of their email authentication. Ensure the logo matches the image blow.
-
Be Cautious with Links and Attachments
- Avoid clicking on links or downloading attachments from emails unless you are certain of the sender’s authenticity. If in doubt, contact the sender through a known and trusted method to confirm the email’s legitimacy.
-
Report Suspicious Emails
- If you receive an email that appears suspicious, report it to the INFOSEC Spam Detection button for further investigation.
By following these steps, you can significantly reduce the risk of falling victim to phishing or fraudulent emails.