3

Aside from being “Nice” and “Courteous”, using MS Word, briefly explain the technical part of what is “email etiquette” and provide specific examples to illustrate your answer.

When you receive an e-mail message, what do you look for to determine if it is fake, harmful, or dangerous to open. That devices are used by scammers to phish for your information? Give specific examples.

How do you know if the source is legitimate?
What type of action should you NEVER do in an e-mail message?
What should you ALWAYS do that you can verify suspicious E-Mail?

Plishers are always finding ways to grab a working e-mail address. Once they have one, they can sell it to vendors. Most of the times, the message you received is totally clean but it is a fake ad that goes no where.

What traps do they have to capture your e-mail eddress?
What can you do to avoid said traps?