@@ -66,7 +66,7 @@ A better practice than email attachments is to have files on a server and send l
*Links, often innocuous looking or even hidden within emails, are a major way adversaries get rogue software inside networks. Before clicking a link or anywhere on an email, even if it appears to be from someone you know, check that it points to a domain name that you recognize and expect (such as roadmapconsulting.org or the domain where your organization's files are stored). In most email programs, as on the web, hovering over a link displays the URL it points to. If the link's destination is unexpected or unfamiliar, check with the sender to make sure the email is legitimate. Similarly, don't open an attachment unless you are expecting it and the file name is in line with that expectation.*
**NEVER***click on links or open files from unknown senders or in otherwise suspicious emails. Unlike people you know and are working with, someone you don't know will never send you a file that you actually need; if a link from an unknown sender actually contains useful information, you will be able to access it via another, more trusted method (for example, a web search).*
***NEVER****click on links or open files from unknown senders or in otherwise suspicious emails. Unlike people you know and are working with, someone you don't know will never send you a file that you actually need; if a link from an unknown sender actually contains useful information, you will be able to access it via another, more trusted method (for example, a web search).*
:heavy_check_mark: **Don't send mass email from standard accounts; instead, use a third-party service and, if possible, a dedicated mass email subdomain.**