Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revisionBoth sides next revision | ||
public:emai:geninfo [2021-09-30 09:16] – [Quarantine access] vesely | public:emai:geninfo [2024-04-22 08:38] – vesely | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Email at CERGE-EI in general ====== | ====== Email at CERGE-EI in general ====== | ||
+ | ===== Email Related Guidelines ===== | ||
+ | |||
+ | **CUNI Guideline – Use of private e-mail addresses**: | ||
+ | |||
+ | In principle: | ||
+ | < | ||
+ | |||
+ | **…o**// | ||
+ | |||
+ | Conclusion: If you get work email from non-institutional email address (like google.com, seznam.cz, post.de, outlook.com, | ||
+ | |||
+ | ===== Important Eecommendations ===== | ||
+ | |||
+ | **Never use your login name as your email address** - use format name.surname@cerge-ei.cz not username@cerge-ei.cz to avoid guessing your real account name by hackers. If your username is publicly known there is much more oportunity to misuse it. Attackers can repeatedly lock your account during brute-force campaigns, for example. | ||
+ | |||
+ | **Use different password for email account and network acconut** - passwords to email accounts are usually stored at several places (email clients) so it is much easier to reveal these. If passwords are the same, attacker gain access to all your account. | ||
===== Email Services Limitations ===== | ===== Email Services Limitations ===== | ||
Line 32: | Line 48: | ||
==== Attachment filtering ==== | ==== Attachment filtering ==== | ||
- | Some attachments are <font inherit/ | + | Some attachments are |
+ | <font inherit/ | ||
* **Executable files** | * **Executable files** | ||
Line 40: | Line 57: | ||
* Emails containing disallowed content (like executable files) are **rejected**. | * Emails containing disallowed content (like executable files) are **rejected**. | ||
* **Password protected files are removed** | * **Password protected files are removed** | ||
- | <font inherit/ | + | <font inherit/ |
They may contain malicious code, ransomware, viruses. \\ | They may contain malicious code, ransomware, viruses. \\ | ||
Don't open any file unless you are certain it's legitimate. \\ | Don't open any file unless you are certain it's legitimate. \\ | ||
Line 49: | Line 66: | ||
Ironport sends hourly digest about new quarantined messages | Ironport sends hourly digest about new quarantined messages | ||
- | It is practical to keep the link to your personal quarantine page for future use (link " | + | It is practical to keep the link to your personal quarantine page for future use (link: View All Quarantined Messages) |
+ | |||
+ | for details go to [[: | ||
+ | |||
+ | {{: | ||
- | {{: |