Saturday, February 3, 2018

Outlook Web App Light > Email safety

Outlook Web App Light > Email safety

The light version of Outlook Web App is simpler in both appearance and function. In addition, because it is HTML-based, it works better with assistive technologies such as screen readers. However, there are fewer security features available in the light version.

The ability to access your mailbox from a public computer or Internet kiosk can be very useful if you do much traveling. But using public computers can put the privacy of your data, your identity, and your security credentials at risk. There are precautions you can take to help protect your data and your privacy when you access your mailbox from a public computer.

If you're wondering why you're seeing the light version of Outlook Web App, how to get back to the standard version of Outlook Web App or to Office, or how to use a different email program on a mobile device or computer, see Outlook Web App Light.

In this article

Traveling with Outlook Web App

Sign in and sign out

What about messages and attachments?

Junk email and phishing

About phishing

Junk Email folder

What if I want to know more?

Traveling with Outlook Web App

You can use Outlook Web App on any computer that has a web browser and an Internet connection. Internet cafes, libraries, and public access terminals, such as Internet kiosks, offer Internet access to patrons at little or no charge. But because the computers that provide this service are available to the public, you need to take precautions to help protect your data and your privacy.

We strongly recommend that you use Outlook Web App only in locations that you trust.

Sign in and sign out

There are some simple steps you can take to protect your account when using a computer or device other than your own.

  • Make sure no one watches you type your user name and password when you sign in.

  • Never select an option that lets you save your name or password for later use. Even if you plan to use the same computer over the course of several days, always type your name and password.

  • Sign out from your mailbox when you finish using it. Signing out helps prevent someone else from using the computer to access your mailbox.

  • Close the browser.

What about messages and attachments?

Before you open a message, make sure it's from someone you trust and are expecting an email message from.

Open attachments only from people you trust.

The best option for opening an attachment when you're using a public computer is to click the Open as Web Page link next to the attachment name. This protects you from potential virus attacks and prevents a copy of the attachment from being created on the computer.

If you want to open an attachment directly instead of as a web page, save it to a folder or a location that you can easily find, such as the Desktop, and then open it from that location. Most browsers give you an option to open the file or save it to disk when you click the link for the attachment. When you finish using the computer, you can delete the attachment and empty the Recycle Binor trash.

Junk email and phishing

Junk email, also known as spam, can strain networks, clog email servers, and fill mailboxes with unwanted and possibly offensive messages and images.

Hidden links to external content, also known as web beacons, are automatically blocked. Web beacons can alert junk email senders to your presence and make you the target of even more junk email messages.

For more information about how to manage junk email, see Options > Junk Email.

About phishing

Phishing is a specific kind of junk email that's used to obtain private information for use in identity theft and other scams. A phishing email message appears to come from a trusted source, such as your bank, and frequently includes the business logo and an apparently legitimate reply address for the trusted source. These email messages are designed to trick you into giving confidential information to the sender that you wouldn't ordinarily send over the Internet. This is usually information that a legitimate business would never request through an email message.

Phishing messages are identified on the information bar, regardless of which folder they're located in. You should exercise caution with a message identified as a possible phishing message.

Junk Email folder

Mail identified as possible junk email is automatically moved to the Junk Email folder, and any active content within the message, such as links or executable code, is disabled. Any message in the Junk Email folder can be marked as legitimate by selecting the message and then clicking Not Junk on the toolbar. When this button is clicked on a selected message, the message is moved to the Inbox.

Note:  When you click Empty Junk Email, the contents of the Junk Email folder are permanently deleted.

What if I want to know more?

Outlook Web App Light

Outlook Web App Light > Mail

Outlook Web App Light > Options

No comments:

Post a Comment