Topic: Email Skills – Digital Security
Part 1: The Dos and Don’ts of email at work
The weakest link in any organisation’s cybersecurity chain is the employees themselves. Let’s put together a list of basic rules for using email safely at work; write DO or DON’T in the blank spaces as appropriate.
Vocabulary:
the weakest link: (idiom) the least strong or successful part of a group or system
multifactor authentication: (n.) a multi-step account login process that requires users to enter more information than just a password
vice versa: (adv.) shows that what you have just said is also true in the opposite order
device: (n.) a thing made for a particular purpose, especially mechanical or electronic equipment
encrypt: (v.) convert something into a code to maintain confidentiality
plug in: (v.) connect something to a power source.
Part2: Analysis
Read the provided email. Does it seem legitimate? Do you notice anything suspicious about it?
Part 3:
The email used a common tactic to lure users – claiming the presence of suspicious activity. But that’s not their only method.