Articles in this section
Category / Section

How to Identify Safe and Verified Emails

Updated:

Overview

To ensure the safety of emails, it is important to recognize trusted domains and use additional verification methods. This guide provides detailed steps to help users identify legitimate emails and avoid potential phishing or spam attempts.

Steps to Identify Safe Emails

  1. Verify the Sender’s Email Domain

    • Emails from trusted sources should originate from specific domains. For example:
    • Always confirm that the email address matches these domains exactly. Be cautious of slight variations or misspellings, which could indicate phishing attempts.
  2. Check for External Warnings in Gmail

    • Gmail provides an “External” warning banner for emails sent from outside your organization. Pay attention to this warning, as it can help you identify messages that may not be from a trusted sender.
      1.png

2.png

  1. Look for the Verified Logo
    • Trusted Blue Jacket IT vendors may include a verified logo as part of their email authentication. Ensure the logo matches the image blow.

Safe_Sender_Box.png

  1. Be Cautious with Links and Attachments

    • Avoid clicking on links or downloading attachments from emails unless you are certain of the sender’s authenticity. If in doubt, contact the sender through a known and trusted method to confirm the email’s legitimacy.
  2. Report Suspicious Emails

    • If you receive an email that appears suspicious, report it to the INFOSEC Spam Detection button for further investigation.

3.png

By following these steps, you can significantly reduce the risk of falling victim to phishing or fraudulent emails.

Was this article useful?
Yes
Needs Improved
Help us improve this page
Please provide feedback or comments
Access denied
Access denied