1. Purpose of This Document
This guide teaches you how to:
Identify dangerous or fraudulent emails
Verify whether a message is legitimate
Protect your personal business from phishing, malware, and impersonation
Use Gmail, Outlook, and other providers safely
Apply simple, repeatable checks before opening links or attachments
This document is designed for non‑technical users, freelancers, small businesses, and home‑office workers.
2. Why Email Safety Matters
Email is the #1 attack vector used by:
Scammers
Hackers
Identity thieves
Fake companies
Malware distributors
Most attacks succeed because the victim clicked a link or opened an attachment without checking the message first.
A few seconds of verification can prevent:
Account theft
Financial loss
Ransomware
Data leaks
Identity fraud
3. The 5‑Step Email Safety Check (Always Use This)
Step 1 — Verify the Sender
Look at the full email address, not just the display name.
Examples of fake senders:
“Microsoft Support” <microsoft‑security@outlook.com>
“Apple Billing” <apple@billing‑secure‑verify.com>
“Your Bank” <info@bank‑support‑cz.net>
If the domain looks wrong → delete the email.
Step 2 — Check for Urgency or Pressure
Scammers use fear:
“Your account will be deleted today”
“Your package is blocked”
“Pay this invoice immediately”
If the email tries to scare you → stop and verify.
Step 3 — Inspect Links (Without Clicking)
Hover your mouse over the link.
If the link goes to:
A strange domain
A misspelled domain
A long tracking URL
A random IP address
→ Do not open it.
Step 4 — Treat Attachments as Dangerous
Be careful with:
.zip
.rar
.exe
.html
.pdf asking to “Enable content”
.docx asking to “Enable macros”
If you didn’t expect the file → delete it.
Step 5 — Ask Yourself: Did I Expect This Email?
If the answer is no, the email is suspicious.
Unexpected invoices, password resets, or delivery notices are common scams.
4. How to Verify an Email Properly
A. Use Built‑In Tools (Gmail / Outlook)
Gmail
“Show original” → check SPF, DKIM, DMARC
Red banners for dangerous messages
Link scanning
Attachment scanning
Outlook
“View message source”
SmartScreen filtering
Attachment sandboxing
Impersonation detection
These systems block most attacks automatically.
B. Use VirusTotal for Attachments & Links
Upload suspicious files or paste URLs:
virustotal.com
It checks with 70+ antivirus engines.
C. Verify the Domain Manually
Search the company’s real website in your browser. Compare the domain with the email sender.
Example:
Real: paypal.com Fake: paypa1‑secure‑verify.com
D. Contact the Sender Through Another Channel
If the email claims to be from:
Your bank
Your supplier
Your colleague
Your accountant
Call them or message them separately.
Never reply directly to a suspicious email.
5. Best Practices for Personal Business Email Security
A. Use Two‑Factor Authentication (2FA)
Enable 2FA on:
Gmail
Outlook
Seznam
ProtonMail
Your domain provider
This prevents account theft even if your password leaks.
B. Use a Password Manager
Never reuse passwords. Use a password manager to generate strong, unique passwords.
C. Keep Your Devices Updated
Install updates for:
Windows / macOS
Browser
Antivirus
Office apps
Outdated systems are easy to attack.
D. Separate Personal and Business Email
Use different accounts for:
Personal communication
Business communication
Online shopping
Banking
This reduces risk and improves organization.
6. Optional: Advanced Protection for Home‑Office Professionals
Option A — Use a Secure Email Provider
ProtonMail
Tutanota
Mailbox.org
These offer stronger encryption and phishing protection.
Option B — Use Your Own Domain With Extra Filtering
If you own a domain (example.com), you can add:
Cloudflare Email Routing
Spamhaus filtering
DKIM/DMARC/SPF enforcement
This gives you more control.
Option C — Run Your Own Mail Server + Gateway
If you want enterprise‑level filtering:
Code
Internet → Mail Gateway → Your Mail Server → Your Devices
This is advanced and not required for normal users, but useful for IT‑savvy home offices.
7. Quick Reference Checklist (Print This)
Before opening an email:
Check the sender
Check the domain
Check for urgency
Hover over links
Avoid unexpected attachments
Verify through another channel
Always keep:
2FA enabled
Passwords unique
Devices updated