{"id":1181,"date":"2010-08-25T12:59:40","date_gmt":"2010-08-25T18:59:40","guid":{"rendered":"http:\/\/webii.net\/blog\/2010\/08\/beware-of-attachment-emails\/"},"modified":"2022-01-31T16:34:07","modified_gmt":"2022-01-31T22:34:07","slug":"beware-of-attachment-emails","status":"publish","type":"post","link":"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/","title":{"rendered":"Beware of Attachment Emails"},"content":{"rendered":"<p>The trend of late is a revisit from \u201cyour account has been updated\u201d emails.\u00a0 These emails may be phrased to tell you that a recent security patch has been applied to your email service or website, or something similar.\u00a0 Then you will be asked to open an attached file to remedy the problem or officially apply the \u201csecurity\u201d fix.\u00a0 Beware \u2013 and definitely hesitate \u2013 before opening any attachment.<\/p>\n<p>In most cases, your <a href=\"https:\/\/www.webii.net\/web-hosting\/\">web hosting<\/a> or email hosting provider will never ask you to open a file to deal with any sort of technical support issue.\u00a0 If you are unsure, simply pick up the phone and call your tech support team, or email them directly in a fresh email message (not a reply to or forward of that suspicious message).\u00a0 If you enjoy <a href=\"https:\/\/www.webii.net\/website-services\/\">WEBii services<\/a>, these emails are absolutely NOT from us \u2013 we will never ask you to open a file to address anything with your email services.<\/p>\n<p>This is a recycled tactic used by hackers and spammers to gain some sort of control over your computer or your information.\u00a0 A file is most likely malicious software.\u00a0 The message may even say it is \u201cfrom\u201d your own <a href=\"https:\/\/www.sitereserve.com\/\">website domain<\/a>.<\/p>\n<p>A good rule of thumb is to only open attachments that you are expecting from parties that you know.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The trend of late is a revisit from \u201cyour account has been updated\u201d emails.\u00a0 These emails may be phrased to tell you that a recent security patch has been applied to your email service or website, or something similar.\u00a0 Then you will be asked to open an attached file to remedy the problem or officially [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":10410,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10,11,300],"tags":[],"class_list":["post-1181","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-quick-tips","category-tech-support","category-www-learning-center"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Beware of Attachment Emails - WEBii<\/title>\n<meta name=\"description\" content=\"A key cybersecurity practice is to not open things from people that you don&#039;t know. You want to be as safe as possible from potential hacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beware of Attachment Emails\" \/>\n<meta property=\"og:description\" content=\"A key cybersecurity practice is to not open things from people that you don&#039;t know. You want to be as safe as possible from potential hacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/\" \/>\n<meta property=\"og:site_name\" content=\"Web Marketing &amp; Web Development Company Blog - WEBii\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/webiinet\" \/>\n<meta property=\"article:published_time\" content=\"2010-08-25T18:59:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-31T22:34:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2010\/08\/Hacker-Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"428\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jacqueline Sinex\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jacqueline Sinex\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/beware-of-attachment-emails\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/beware-of-attachment-emails\\\/\"},\"author\":{\"name\":\"Jacqueline Sinex\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#\\\/schema\\\/person\\\/f4b38a14e3a80c2113ac6397739c77f6\"},\"headline\":\"Beware of Attachment Emails\",\"datePublished\":\"2010-08-25T18:59:40+00:00\",\"dateModified\":\"2022-01-31T22:34:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/beware-of-attachment-emails\\\/\"},\"wordCount\":220,\"publisher\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/beware-of-attachment-emails\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/uploads\\\/2010\\\/08\\\/Hacker-Image.jpg\",\"articleSection\":[\"Quick Tips\",\"Tech Support\",\"WWW Learning Center\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/beware-of-attachment-emails\\\/\",\"url\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/beware-of-attachment-emails\\\/\",\"name\":\"Beware of Attachment Emails - WEBii\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/beware-of-attachment-emails\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/beware-of-attachment-emails\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/uploads\\\/2010\\\/08\\\/Hacker-Image.jpg\",\"datePublished\":\"2010-08-25T18:59:40+00:00\",\"dateModified\":\"2022-01-31T22:34:07+00:00\",\"description\":\"A key cybersecurity practice is to not open things from people that you don't know. You want to be as safe as possible from potential hacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/beware-of-attachment-emails\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.webii.net\\\/blog\\\/beware-of-attachment-emails\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/beware-of-attachment-emails\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/uploads\\\/2010\\\/08\\\/Hacker-Image.jpg\",\"contentUrl\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/uploads\\\/2010\\\/08\\\/Hacker-Image.jpg\",\"width\":640,\"height\":428,\"caption\":\"Photo by Clint Patterson on Unsplash\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/beware-of-attachment-emails\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quick Tips\",\"item\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/category\\\/quick-tips\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Beware of Attachment Emails\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/\",\"name\":\"Web Marketing &amp; Web Development Company Blog - WEBii\",\"description\":\"web design . web development . seo . marketing . web hosting . + more\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#organization\",\"name\":\"WEBii\",\"url\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/fb-banner-webii-seo.jpg\",\"contentUrl\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/fb-banner-webii-seo.jpg\",\"width\":1200,\"height\":598,\"caption\":\"WEBii\"},\"image\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#\\\/schema\\\/person\\\/f4b38a14e3a80c2113ac6397739c77f6\",\"name\":\"Jacqueline Sinex\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/wphb-cache\\\/gravatar\\\/8b2\\\/8b2a612b27eed2b3a9f8e6a977e3a226x96.jpg\",\"url\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/wphb-cache\\\/gravatar\\\/8b2\\\/8b2a612b27eed2b3a9f8e6a977e3a226x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/wphb-cache\\\/gravatar\\\/8b2\\\/8b2a612b27eed2b3a9f8e6a977e3a226x96.jpg\",\"caption\":\"Jacqueline Sinex\"},\"description\":\"Managing Director\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/webiinet\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/jsinex\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Beware of Attachment Emails - WEBii","description":"A key cybersecurity practice is to not open things from people that you don't know. You want to be as safe as possible from potential hacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/","og_locale":"en_US","og_type":"article","og_title":"Beware of Attachment Emails","og_description":"A key cybersecurity practice is to not open things from people that you don't know. You want to be as safe as possible from potential hacks.","og_url":"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/","og_site_name":"Web Marketing &amp; Web Development Company Blog - WEBii","article_author":"https:\/\/www.facebook.com\/webiinet","article_published_time":"2010-08-25T18:59:40+00:00","article_modified_time":"2022-01-31T22:34:07+00:00","og_image":[{"width":640,"height":428,"url":"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2010\/08\/Hacker-Image.jpg","type":"image\/jpeg"}],"author":"Jacqueline Sinex","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jacqueline Sinex","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/#article","isPartOf":{"@id":"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/"},"author":{"name":"Jacqueline Sinex","@id":"https:\/\/www.webii.net\/blog\/#\/schema\/person\/f4b38a14e3a80c2113ac6397739c77f6"},"headline":"Beware of Attachment Emails","datePublished":"2010-08-25T18:59:40+00:00","dateModified":"2022-01-31T22:34:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/"},"wordCount":220,"publisher":{"@id":"https:\/\/www.webii.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2010\/08\/Hacker-Image.jpg","articleSection":["Quick Tips","Tech Support","WWW Learning Center"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/","url":"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/","name":"Beware of Attachment Emails - WEBii","isPartOf":{"@id":"https:\/\/www.webii.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/#primaryimage"},"image":{"@id":"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2010\/08\/Hacker-Image.jpg","datePublished":"2010-08-25T18:59:40+00:00","dateModified":"2022-01-31T22:34:07+00:00","description":"A key cybersecurity practice is to not open things from people that you don't know. You want to be as safe as possible from potential hacks.","breadcrumb":{"@id":"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/#primaryimage","url":"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2010\/08\/Hacker-Image.jpg","contentUrl":"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2010\/08\/Hacker-Image.jpg","width":640,"height":428,"caption":"Photo by Clint Patterson on Unsplash"},{"@type":"BreadcrumbList","@id":"https:\/\/www.webii.net\/blog\/beware-of-attachment-emails\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.webii.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Quick Tips","item":"https:\/\/www.webii.net\/blog\/category\/quick-tips\/"},{"@type":"ListItem","position":3,"name":"Beware of Attachment Emails"}]},{"@type":"WebSite","@id":"https:\/\/www.webii.net\/blog\/#website","url":"https:\/\/www.webii.net\/blog\/","name":"Web Marketing &amp; Web Development Company Blog - WEBii","description":"web design . web development . seo . marketing . web hosting . + more","publisher":{"@id":"https:\/\/www.webii.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.webii.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.webii.net\/blog\/#organization","name":"WEBii","url":"https:\/\/www.webii.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.webii.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2015\/12\/fb-banner-webii-seo.jpg","contentUrl":"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2015\/12\/fb-banner-webii-seo.jpg","width":1200,"height":598,"caption":"WEBii"},"image":{"@id":"https:\/\/www.webii.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.webii.net\/blog\/#\/schema\/person\/f4b38a14e3a80c2113ac6397739c77f6","name":"Jacqueline Sinex","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.webii.net\/blog\/wp-content\/wphb-cache\/gravatar\/8b2\/8b2a612b27eed2b3a9f8e6a977e3a226x96.jpg","url":"https:\/\/www.webii.net\/blog\/wp-content\/wphb-cache\/gravatar\/8b2\/8b2a612b27eed2b3a9f8e6a977e3a226x96.jpg","contentUrl":"https:\/\/www.webii.net\/blog\/wp-content\/wphb-cache\/gravatar\/8b2\/8b2a612b27eed2b3a9f8e6a977e3a226x96.jpg","caption":"Jacqueline Sinex"},"description":"Managing Director","sameAs":["https:\/\/www.facebook.com\/webiinet","https:\/\/www.linkedin.com\/in\/jsinex"]}]}},"_links":{"self":[{"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/posts\/1181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/comments?post=1181"}],"version-history":[{"count":0,"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/posts\/1181\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/media\/10410"}],"wp:attachment":[{"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/media?parent=1181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/categories?post=1181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/tags?post=1181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}