E-mails
❔
... are used to obtain data (phishing).
... are gateways for malware.
... can deceive by using fake sender addresses.
❕
Check the sender, subject, content and attachment for credibility.
If in doubt, contact the IT department or ask known senders before opening suspicious attachments.
Email signatures are used as an additional protection instance to ensure the trustworthiness of the sender address and the content of the message.
No-Phishing-Training
The research group SECUSO (Security, Usability, Society) has developed a quiz and a game as training tools for detecting fraudulent messages.
Unfortunately there aren't any englisch versions of these tools as of yet.