What will happen if we open Spam Mail?

Spam mail is not harmful. What's harmful is the action taken towards it

We all face it before; I am very sure. That x number of unread emails in the junk/spam mailbox. Very tempting to find out what it is, yet very scared to do that. 

This might seem like a risky move but for me, I open it anyway. The reason because I have once been told by a cybersecurity expert that, as long as we don’t click on any attachments, links and all, we are safe. Although they can track if we open the email or not, they can’t inject any virus to us. Well, that was what I am told, but is it really true?

Not to say that I don’t trust my friend, but my web safety is my responsibility, so it is best for me to study this matter on my own. Below are my findings.

Is opening Spam mail safe?

The answer is yes, to a certain extent. Just view the email won’t actually bring much damage, as long as the person is wise enough to differentiate which is a genuine email and which is a phishing email. But if one decided to open an attachment or click on a link, there is a high chance of getting a virus or hack. The reason behind is simple, the trojan horse, malware, or any virus will be required someone to click on it to activate. So, as long as we don’t do that, it’s technically safe. Also, it is advisable to view email using plain text option instead of HTML. Just to be sure. 

It was a different story last time

Last time, emails are allowed to contain HTML code. What this means is that hacker can put some code to run whenever you open the email. This is a security flaw that affected many people as although email client can filter spam, but there will always be a missing case. 

What to do to make ourselves safe when opening an email?

Well, there are many things else that we should do to make sure we are safe when opening an email. Below are few

Do not open an unknown attachment

Suspiciously attachment should not be open, let alone attachment from an unknown email. It’s more to the cybersecurity culture of a company because although the email you received is from your colleague, there are still risk that their device is being compromised. So, if it looks suspicious to you, don’t open first. Reach out to your colleague and get them to confirm if they have sent you the attachment. Of course, it is wise to not open any .exe file as usually, these kinds of file come with a virus. 

Links, just don’t click it

Again, if it looks suspicious, don’t click it. It does not make sense if your CEO sent you a link telling you that it is funny and ask you to view it (other than your CEO is playful and often do this kind of thing). 

Keep yourself updated

Whatever it is, one must make sure the mail client, web browser, and operating system are always updated. Usually, updates will come with the latest and safest security features, and outdated software will result in some very nasty consequences. So, keep yourself updated for the sake of cybersecurity.

Antivirus is a must

It can’t save you from everything but at least it helps to filter out those common ones. Plus, usually, antivirus software is the first to know about the latest virus and will immediately rectify it. So, get a good one and stay protected. 

Final Verdict

Spam mail is harmless to a certain extent. What we need to make sure is that the cybersecurity culture of the company is right. Cybersecurity awareness course is one of the ways to build the right culture that can handle spam mail well. 

Power User vs Top feature in Pivot Table – Part 2

Ways of inserting Pivot Table

a) There are many ways to connect your data to Pivot Table. One of the most mainstream way to insert Pivot Table is hitting the “Pivot Table” command from the “Insert” tab.

b) You also can find the “Summarized with Pivot Table” under the “Table Tools” tab. You will only be able to find this table after converting the range of data into a form of Table. Plus, the cursor must be active within the Table region in order to enabling the “Table Tools Tab”.

Continue reading “Power User vs Top feature in Pivot Table – Part 2”

MySQL for the Internet of Things

The essence of the Internet of Things (IoT) is simply interconnected devices that generate and exchange data from observations, facts and other data, making it available to anyone so that we can learn more about the world around us. The IoT is poised to change how we interact with and perceive the world around us, and the possibilities are nearly boundless. As more and more connected devices generate data, we will need to solve the problem of how to collect, store and make sense of IoT data by leveraging the power of database systems.

In this whitepaper, we explore:

  • What is Internet of Thing (IoT)
  • How IoT data is collected and stored
  • How to leverage MySQL in your IoT solution.

How to protect yourself from public Wi-Fi

Photo by Petter Lagson on Unsplash Using a VPN is arguably one of the best ways to stay safe on Public Wi-Fi

I am not sure about others, but me myself often ask this question when I connect myself to a public Wi-Fi, “is this network safe?, and how do I know if there will not be any hackers targeting this network?

One of the reasons to set password for your private network is to ensure that there is no unauthorized access from anyone, especially hackers. The reason for such decision is because a hacker can technically obtain access to all devices that are in the network and from there, do their hacking accordingly. That’s how company IT remote access their company device.

So, to make it clear, there certainly have risks when connecting to public Wi-Fi and the risk is quite big too. For that reason, we will need to know how to protect ourselves from when accessing public Wi-Fi.

The most effective way

Connect to your mobile hotspot

When connecting your mobile hotspot, you can be sure that safety is least of your concern. Technically, you are connecting to your network, so it surely is safe (but of course, your mobile should not get hack first)

The alternative

many of us can’t use our mobile hotspot, for various reasons, so what else can we do when connecting to public wi-fi?

Know what you are connecting

It is a high risk when you access wi-fi that comes from nowhere. Norton shared an article before, saying that there are generally 2 types of Wi-Fi, secured and unsecured. Secured type is the one that needs some sort of commitment to get access. For example, like a password. Unsecured is the type of Wi-Fi where everyone can access without any input. The reason to access a secured network is that it required some effort to access, which will help filter out hackers or cyber attackers from accessing.  

Don’t do banking stuff when connecting to a public wi-fi

We should all understand that sometimes, there is a risk even doing banking stuff using our private network. So, it sure is a wise choice to not do banking stuff when connecting to public wi-fi. The reason is fairly simple, those hackers that are connecting to the same network as you will be able to monitor, imitate, and access your device, which in turns, your bank account.

Access on HTTPS

HTTP means unencrypted connection, HTTPS means encrypted connection. Although accessing HTTPS site does not necessarily guarantee safe connection, but at least it makes it harder for the hacker to get a piece of the data that are traveling between you and the server of the website. 

Don’t make a purchase online

We are very well connected nowadays, which makes it easy for us to purchase anything. However, it is wise to not make any purchase when connected to public Wi-Fi. Try think back the last time you make an online purchase, what information did you provide? Well, for your information, all this information can be easily recorded by hackers that are in the same network as you. 

Use a VPN

I think this is the most secure way to access public Wi-Fi, other than connecting to your mobile network. Accessing a VPN, Virtual Private Network will ensure that your connection to the internet is private. Although there might be cases where security flaws expose your IP address, that is not something happening every day. I am using VPN for my Mobile and computer, and will surely turn them on when I want to do banking stuff (yes, even when connecting to my private network). 

Final Verdict

Everyone will face the situation where you need to connect to public Wi-Fi to get things done. I know that you know that and the hacker knows that too. So, following the step above will make sure that we are at least one step safer when using public Wi-Fi. 

But still, it is crucial to have sound knowledge on cybersecurity so keep yourself safe from the cyber world. Attending a cybersecurity awareness course is one of the ways to gain knowledge of cybersecurity. Don’t wait till it is too late.