Refined Email
Refined Email
E-mail (electronic mail) is a way to send and receive messages across the Internet. It's similar to
traditional mail, but it also has some key differences.
In 2017, there were 269 billion emails sent each day. By 2019, that had grown to almost
294 billion. This year – 2023 - , people will be sending more than 347 billion
messages a day.
9/5/2023 3
E-MAIL ADVANTAGES
• Productivity tools: e-mail programs are usually packaged with a calendar, address book, instant
messaging, and more, for convenience and productivity.
• Access to web services: If you want to sign up for an account like Facebook or order products
from services like Amazon, you will need an e-mail address so you can be safely identified and
contacted.
• Easy mail management: e-mail service providers have tools that allow you to file, label,
prioritize, find, group, and filter your e-mails for easy management. You can even easily control
spam, or junk e-mail.
• Privacy: Your e-mail is delivered to your own personal and private account.
• Communication with multiple people: You can send an e-mail to multiple people at once,
giving you the option to include as few as or as many people as you want, in a conversation.
• Private, non-display of e-mail addresses: If you don’t want everyone to have the other
person’s e-mail address, you can do that too.
• Accessible anywhere at any time: You don’t have to be at home to get your mail. You can
access it from any computer or mobile device that has an Internet connection.
9/5/2023 4
The username is the name you choose to identify
yourself.
UNDERSTANDING EMAIL
ADDRESSES
9/5/2023 5
The email address needs to be followed by the symbol @ (means “at”),
followed by the Host name, the type of organization, and finally the
country code (if needed).
EXTENSION FOR THE
TYPE OF
ORGANIZATION
USER COUNTRY
(only if
HOST NAME needed)
9/5/2023 6
EMAIL PROVIDERS:
ProtonMail and ZOHO are great too, but may have some cost for them, depending on which version you
choose.
These providers are popular because they allow you to access your e-mail account from anywhere with
an Internet connection. You can also access webmail on your mobile device.
It also gives you a link to sign into any of them, to set up an e-mail account !
.com Company (usually .co in the UK) (future ones may be .biz)
.net Network
Extensions
9/5/2023
can also include country codes, such as .uk, .ca, .za, br, etc. 9
SENDING A COPY OF A MESSAGE TO ANOTHER ADDRESS
• To send a copy of a message to another email address, type the address into the
Cc (Carbon Copy) field.
• When you do this, both or all persons the e-mail goes to, can see who it was send to.
Click on the Cc button and you will see the Blind carbon copy (Bcc) letters. This is for sending
is a copy of the message to someone in secret - other recipients of the message will not know that
the person has received a copy of the message.
9/5/2023 11
THE YAHOO E-MAIL MAIN PAGE
9/5/2023 12
THE GOOGLE, G-MAIL MAIN PAGE
9/5/2023 13
AOL MAIN PAGE
9/5/2023 14
9/5/2023 15
UNDERSTANDING THE EMAIL INTERFACE
Below are some examples of different email interfaces from Gmail. Review the images below to
become familiar with various email interfaces.
Keep in mind that these examples will only provide a general overview.
INBOX
The inbox is where you'll view and manage emails you receive. Emails are listed with the name of
the sender, the subject of the message, and the date received.
9/5/2023 16
MESSAGE PANE
9/5/2023 17
COMPOSE PANE
9/5/2023 18
9/5/2023 19
3) In some e-mail programs, you can click on the
down arrow by a box at the top of your e-mail list,
that usually says “By Date”
9/5/2023 24
1) For those who use Gmail, to remove all of the e-mails from “The New York Times”, point to the
small, square box, to the left of the message, to highlight it.
2) Click on the 3 vertical dots, at the right side to get the small menu and click on “Filter Messages
like These”
9/5/2023 25
When you get the box with the menu, shown below, click on “Search”, and it will put all of the
messages from “The New York Times” together, so you can delete or move them into a side
folder.
9/5/2023 26
This is the calendar page from the Outlook program on my computer. As you can see in the top
ribbon, it gives you all kinds of ways to set up the calendar.
HINT: If you use Zoom to “meet” with people and someone sends you a request to meet and you
accept, the message may disappear but all of the information about the event, can be found in the
Calendar, on the day of the event.
9/5/2023 29
E-MAIL ETIQUETTE
Like any form of online communication, it's important to practice good etiquette and safety
when using e-mail, both for personal use and in the workplace.
Etiquette is a set of rules and guidelines that people use to communicate more effectively.
You should also know how to protect yourself from certain risks, like malware and phishing.
Use these rules as a starting point, then tailor each e-mail you send, based on the situation.
The slideshow below, has some good recommendations about basic e-mail etiquette.
https://edu.gcfglobal.org/en/email101/email-etiquette-and-safety/1/
9/5/2023 30
9/5/2023 31
9/5/2023 32
9/5/2023 33
9/5/2023 34
E-MAIL AND INTERNET SAFETY
RECOMMENDATIONS
9/5/2023 35
9/5/2023 36
9/5/2023 37
Avoiding spam and phishing
From email to instant messaging to social media, the Internet is an essential communication tool.
Unfortunately, it's also popular among scammers and cybercriminals. To protect yourself from
email scams, malicious software, and identity theft, you'll need to understand how to identify
and avoid potentially dangerous content in your inbox, including spam and phishing attempts.
9/5/2023 38
Most e-mail services also have a feature you can use to mark e-mails as spam.
In Gmail, for example, you can select the message and click the Mark as Spam button. This helps
your e-mail provider filter out these types of messages in the future.
9/5/2023 39
Turning off e-mail images
Spam messages often contain images that the sender can track.
When you open the e-mail, the images will load and the spammer will be able to tell if your e-mail
works, which could result in even more spam.
You can avoid this by turning off e-mail images. Let's look at how to do this in Gmail, but
remember that the process will vary depending on your e-mail service.
1.Click the gear icon, then select Settings from the drop-down menu.
9/5/2023 40
SELECT ASK BEFORE DISPLAYING EXTERNAL IMAGES, THEN CLICK SAVE AT THE BOTTOM.
9/5/2023 41
Whenever you open a message with images, Gmail will prevent them from loading by default.
9/5/2023 42
SPAM FILTERS
Whenever you receive an e-mail, most e-mail providers will check to see if it's a real message or
spam. Any likely spam messages will be placed in the spam (or trash) folder so you don’t
accidentally open them when checking your e-mail.
Spam-blocking systems aren’t perfect, though, and there may be times when legitimate e-mails
end up in your spam folder.
You should check your spam folder regularly to make sure you aren’t missing any important e-
mails.
9/5/2023 43
OTHER COMMON e-mail SCAMS - Spam and phishing are common problems, but there are many
other types of e-mail scams you may encounter.
Some will promise to give you a lot of money if you advance a small amount upfront. Others may
pretend to be from people you know in real life, and they'll often ask you to send money or
download an attached file.
As with spam and phishing scams, remember to trust your best judgment. You should never
send someone money just because you've received an e-mail request.
You should also never download e-mail attachments you weren't expecting because they
might contain malware that could damage your computer and steal your personal information.
Spam, scams, and phishing schemes will continue to evolve and change. But now that you know
what to look for—and what to avoid—you can keep your inbox and computer that much safer.
https://www.youtube.com/watch?v=NI3
9/5/2023 7JI7KnSc (5 min) 44
IDENTIFY SUSPICIOUS SITES - If you're ever
unsure whether a website or download is safe, close
it and investigate the site before returning to it. It's
always a good idea to be cautious when browsing
unfamiliar sites.
Online shopping is a convenient way to buy almost anything from the comfort of your home.
While there are some risks with shopping online, there are also many ways to protect yourself and
your financial information.
Watch this great video below to learn more about staying safe when shopping online.
https://www.youtube.com/watch?v=el3N6qQjr-I
To protect sensitive information like credit card numbers, you'll want to shop from your home
Internet connection if possible.
Try to avoid shopping when connected to a public Wi-Fi network or when using a public computer,
such as a library computer.
Public computers and Wi-Fi networks are at a slightly greater risk for hacking, which could put your
information at risk.
Also avoid giving any personal information over a cell phone as it can be picked up by a hacker.46
9/5/2023
USE SECURE PAYMENT METHODS
Credit cards are generally the safest way to pay for items online.
Avoid options like direct wire transfer, bank transfers, or sending cash or checks through the mail.
If you don't like the idea of giving your credit card information to different retailers, you could try
an online payment service like PayPal or Google Wallet.
9/5/2023 47
LOOK AT THE SECURITY SYMBOL
Some websites will display a lock symbol in the address bar. This is most commonly
seen with certain types of websites, like online stores and banking sites. This means the
website is using an HTTPS connection and the S stands for SECURE, which makes it
safe to enter your personal information. You will also find this on the Google website.
The one for Wells Fargo is shown below
You won't see this symbol on all websites, and that's OK—not all websites need this extra
layer of security. However, you should avoid entering any sensitive information, such as
your credit card number, if you don't see this symbol in the address bar.
9/5/2023 48
PHISHING
Phishing scams are messages that try to trick you into providing sensitive information. These
often appear to come from a bank or another trusted source, and they'll usually want you to re-enter
a password, verify a birth date, or confirm a credit card number.
Phishing messages may look real enough at first glance, but it’s surprisingly easy for scammers to
create convincing details.
9/5/2023 49
This is a good example of a phishing or Spam message.
It looks like its from my Daughter Elise, but her e-mail address isn’t the same as the one she
uses all of the time. Its important to look at and check the e-mail address to be sure its
from someone you know or a reliable website.
9/5/2023 50
This is another example of a
Phishing message that I received
twice, at home. It offered me a
$50.00 reward at Amazon if I
would click on a link.
Watch out when a company you use, asks for any personal or computer information or to click on a link, like
below, as its not something they normally do. Important: Always look at how their e-mail address reads.
The one below says little about being from Cincinnati Bell (just on the last line) and the last 2 digits says its
from Brazil so I made sure to permanently delete it, right away !!
__________________________________________________________________________________
9/5/2023 52
Even though I think that I am an observant person when it comes to Phishing messages, the IT
Department at the VA Medical Center sent out 2 test messages to everyone, to see if they opened
them.
AND I OPENED BOTH OF THEM, WITHOUT TAKING THE TIME TO READ THE WORDING !!
9/5/2023 53
This is what I received when I made the mistake of thoroughly reading the last e-mail:
9/5/2023 54
CREATING STRONG PASSWORDS
Just like with any online service, it's important to choose a strong password—in other words, one
that is difficult for someone else to guess.
You'll need to create a password to do just about everything on the Web, from checking your
email to online banking. And while it's simpler to use a short, easy-to-remember password, this
can also pose serious risks to your online security. To protect yourself and your information, you'll
want to use passwords that are long, strong, and difficult for someone else to guess while
still keeping them relatively easy for you to remember.
This is commonly known as hacking. A strong password is one of the best ways to defend your
accounts and private information from hackers.
9/5/2023 55
9/5/2023 56
TIPS FOR CREATING STRONG PASSWORDS
A strong password is one that's easy for you to remember but difficult for others to guess. Let's
take a look at some of the most important things to consider when creating a password.
Never use personal information such as your name, birthday, user name, or email address.
This type of information is often publicly available, which makes it easier for someone to guess
your password.
Use a longer password. Your password should be at least six characters long, although for
extra security it should be even longer.
Don't use the same password for each account. If someone discovers your password for one
account, all of your other accounts will be vulnerable.
Try to include numbers, symbols, and both uppercase and lowercase letters.
Avoid using words that can be found in the dictionary. For example, swimming1 would be a
weak password.
Random passwords are the strongest. If you're having trouble creating one, you can use a
password generator instead, such as the one at https://strongpasswordgenerator.com/
9/5/2023 57
COMMON PASSWORD MISTAKES
Some of the most commonly used passwords are based on family names, hobbies, or just a
simple pattern. While these types of passwords are easy to remember, they're also some of the
least secure. Let's take a look at some of the most common password mistakes and how to fix
them.
Password: brian12kate5
"I doubt anyone could guess my password! It's my kids' names and ages. Who else would know
that?"
Problem: This password uses too much personal information, along with common words that could
be found in the dictionary.
Solution: A stronger version of this password would use symbols, uppercase letters, and a more
random order. Rather than using family names, we could combine a character from a movie with a
food. For example, Chewbacca and pizza could become chEwbAccAp!ZZa.
type of9/5/2023 58
Password: w3St!
Password: w3St!
Problem: At only five characters, this password is way too short. It also includes part of her
address, which is publicly available information.
Solution: A stronger version of this password would be much longer, ideally more than 10
characters. We could also substitute a nearby street name instead of her current address. For
example, Pemberly Ave could become p3MberLY%Av.
9/5/2023 59
Password: 123abccba321
"My password follows a simple pattern, so it's easy to remember and type on
my keyboard."
"
Problem: While patterns like this are easy to remember, they're also some of the first things a
hacker might guess when attempting to access your account.
Solution: Remember that random passwords are much stronger than simple patterns. If you're
having trouble creating a new password, try using a password generator instead. The website for
this is https://strongpasswordgenerator.com/
If you use a password generator, you may also want to create a way to remember the password.
For example, H=jNp2# could be remembered as HARRY = jessica NORTH paris 2 #. This may
still feel pretty random, but with a bit of practice it becomes relatively easy to memorize.
9/5/2023 60
Password: BrAveZ!2
"I use the same passwords for all my accounts. This way, I only have to
remember one password!"
Problem: There's nothing really wrong with this password, but remember that you should never
use the same password with different accounts.
9/5/2023 61
SAFETY AND SECURITY WHEN ON THE INTERNET
YOUR BROWSER'S SECURITY FEATURES - Your computer faces different threats whenever you
browse the Web, including viruses, malware, and spyware.
The good news is your web browser has a lot of built-in security features to help protect your
computer.
Let's take a look at some of the most important features you should know about, as well as some
simple tips you can use to stay safe online.
Watch the video for a summary about your browser's built-in security features.
https://www.youtube.com/watch?v=2ZZQlgV2Gus 2.3 min
9/5/2023 62
9/5/2023 63