Legitimate IT email content

 

Please review the following guidelines outlining the content that you can expect to find in emails sent from our department, as well as what you should not expect. Familiarizing yourself with this information will greatly assist in identifying potential phishing emails.

 

1. Sensitive Data: Legitimate IT emails won’t ask you to share sensitive data (such as credit card numbers, Passwords, or personal identification) via email. If you encounter such requests, treat them with suspicion. 2. Software Updates or Patches: IT will send emails about software updates, security patches, or system maintenance. These communications are essential for keeping your devices secure. Be cautious of any email that asks you to download attachments or click on links without proper context. 3. Urgent Actions: Be wary of emails that create a sense of urgency, demanding immediate action. Legitimate IT communications will provide clear instructions without pressuring you. 4. Financial Transactions: IT will never ask you to transfer money or perform financial transactions via email.

5. Unsolicited Attachments or Links: Be cautious of emails with unexpected attachments or links. Legitimate IT communications will provide context and explain why you need to download or click on something. Remember, vigilance is crucial. Always double-check the sender’s email address, scrutinize the content, and verify any unusual requests with your IT department. Cybercriminals often use email impersonation to exploit unsuspecting staff, so stay informed and cautious!