Pine branches with snow and fairy lights

Tips and tricks for getting the most out of your email

mail.com blog

Beware of online romance scams!

Nowadays it’s common for romance to blossom online, with almost one-third of US adults having used a dating website or app. Unfortunately for all the lonely hearts out there, there are also lots of scammers online looking for money rather than love.
Man’s hands typing love messages on a smartphone
Is it true love or an online scam? Learn the signs of a romance scammer.
Romance scams, which often take the form of catfishing, are online dating hoaxes that target unsuspecting singles. But there are steps you can take to protect yourself. more
3 people found this article helpful.

Black Friday: mail.com provides more protection against phishing with DMARC security standard

The email provider mail.com is now using the international security standard DMARC (Domain-based Message Authentication, Reporting and Conformance). This improves the protection of its users against fraud emails with forged sender addresses. more
6 people found this article helpful.

What is an SSL certificate?

SSL, TLS, https – it may seem like alphabet soup, but it actually has to do with the security of your data as you surf the web. Whether it’s your online banking credentials or the credit card information you enter on an online shopping site, SSL protocols keep sensitive data from falling into the wrong hands.
Close-up of web browser address bar reading “https”
Did you know that the “s” in https stands for “secure”?
So how do you know if the website you are using has a security certificate? more
3 people found this article helpful.

Inactive accounts: What can happen to unused email addresses?

Suppose your mail.com email account is your primary email address, but you still have one from your college days that you rarely log in to. Or you mostly communicate by text message, so you have an email address for when you need to register for various online services, but you don’t really check it otherwise. Many of us have such dormant accounts and don’t give them much thought.
Close-up of hourglass in front of businessperson working in office
Make sure time doesn’t run out on an inactive email account
But an inactive email address could put you at risk – either of losing data and messages in the account, or of becoming an easy target for hackers. more
11 people found this article helpful.

Business email etiquette: 10 best practices for professional emails

From professional greetings in email to a choosing the right closing, proper email etiquette for business can be tricky. And given the many messages we write, read and reply to every day, it can be easy to make an embarrassing mistake. But it pays to make an effort: Professional email etiquette can help you succeed in your career by showing respect and appreciation in your communications.
Women sits on bench smiling and holding laptop
Email professionalism means using proper email etiquette
mail.com shares 10 of the best practices for email professionalism. more
5 people found this article helpful.

Never forget a birthday again: Use calendars and reminders

Everybody likes to be remembered on their birthdays – in many cultures, it is an important celebration that makes the birthday boy or girl feel special and appreciated. So it can also be very embarrassing to forget a birthday. But with so many friends, relatives and coworkers to keep track of, it’s easy to drop the ball on someone’s big day.
Group of coworkers at office birthday party
Use a birthday calendar – paper or digital – to make sure you never miss the fun!
Our advice: Learn the birthdays of your immediate family by heart, and use these tools to remember the rest! more
3 people found this article helpful.

What is typosquatting?

Fraudulent websites are a common example of a cybersecurity risk. Cybercriminals mimic the sites of trusted businesses to phish for visitors’ personal data or spread malware. One tool in their arsenal is typosquatting, where they buy domain names that are intentional misspellings of popular websites.
Two women dressed in black in dark warehouse room working on computer with two screens
Typosquatting turns simple typos into a tool for cybercrime
But how can a simple typo leave you vulnerable to online scams? more
7 people found this article helpful.

Should I request read receipts for my emails?

Are you sending an important email and want to make sure that the recipient actually opened – and read – it? One way to make sure is by requesting a read receipt. Unfortunately, some people do not like receiving them and will not respond.
Frowning, bearded man with hand on chin holding smartphone and looking at laptop
If you’re worried that your email won’t be read on time, is a read receipt the answer?
Learn how and when to request a read receipt, and your alternatives for getting an email confirmation. more
5 people found this article helpful.

What is a QR code? And why are they suddenly everywhere?

QR codes seem to be everywhere you look nowadays. You see these “square barcodes” on ads and museum exhibits, packages and Wi-Fi access points. Even if you had never noticed them before the coronavirus pandemic, they seem to be everywhere now, playing a key role in exposure tracing in many locations. They also let us access information like restaurant menus without having to touch the surface of any object but our own mobile device.
Corner of mobile device with screen displaying part of a QR code
It’s easy to read a QR code – or create your own!
However, QR codes have been around for more than 25 years. Find out more, including how to create a QR code. more
12 people found this article helpful.

Happy birthday, email!

This year marks the 50th anniversary of email, a technology that has transformed the way the world communicates. From the first-ever message “QWERTYUIOP” to forming the backbone of today’s digital services, email has come a long way. more
5 people found this article helpful.