Topic: Email Skills – Digital Security
Part 1: The Dos and Don’ts of email at work
The weakest link in any organisation’s cybersecurity chain is the employees themselves. Let’s put together a list of basic rules for using email safely at work
Vocabulary:
the weakest link: (idiom) the least strong or successful part of a group or system
multifactor authentication: (n.) a multi-step account login process that requires users to enter more information than just a password
vice versa: (adv.) shows that what you have just said is also true in the opposite order
device: (n.) a thing made for a particular purpose, especially mechanical or electronic equipment
encrypt: (v.) convert something into a code to maintain confidentiality
plug in: (v.) connect something to a power source.
Part2: Analysis
Read an email. Does it seem legitimate? Do you notice anything suspicious about it?
Part 3: How secure is your email?
There are three key areas that fraudsters could target in order to gain access to your email.
Vocabulary:
fraudster: (n.) a person who gets money by deceiving others
have a trick up one’s sleeve: (v.) a secret strategy or plan
phishing: (n.) sending fake emails that appear to be from trustworthy companies to obtain information or money illegally
server: (n.) a system or computer that provides information to other computers.