Security
On-Demand Capacity
Business Continuity

Phishing Policy

Extreme Flexibility
Demonstrably Simple
Continual Improvements


  topic image  

Phishing Policy:

1. Please never disclose private password or sign-in information as a result of an email.   It is very easy for a criminal to fake an email, no matter who it says it is from, that can be faked.
2. When we send you an email we know who you are and will never ask you to disclose any private information.   In addition, when we send you an email, we will never disclose any of your private and confidential information.
3. To transfer to an encrypted and secure communication channel, an icon button link to WWW.001LTD.ORG will be provided.   We will never use any other domain name in an email link.   We will only use an 001LTD icon button (in a rounded corner cartouche) as the link.

  topic image  

Email Rules:

Everything disclosed in an email will be copied and recorded by numerous agencies in many countries - your emails are being monitored.   Business private and confidential information must never be disclosed in an email.   Just like every telephone call is recorded, every email is recoded.

  topic image  

Document Management:

Email is part of our document management policy - every email document must be approved by an Officer of the company.   Every formal document has a unique reference number and version number - this can be used as reference.   Every formal document has the similar style, theme, images and iconic buttons in a cartouche (rounded corners).   No document will employ a hyperlink - an underlined text that can be clicked to open another page.

  topic image  

Security Advice:

* Email: no free USA-owned email service is safe. Rent UK-owned (NTLWORLD) email services.
* Encryption: encrypt everything with multiple layers - no single encryption method is safe.
* Browsing: all online browsing is continually monitored by law. Use the "TOR" browser service - it cannot be monitored.
* Cloud: no USA-owned public cloud service is safe. Rent UK-owned cloud services.
* File Storage: no USA-owned file storage service is safe. Rent UK-owned file storage services.
* Social: Facebook is evidence that will be used against you - make sure nothing is real - never disclose your real birthday.
* Location: switch off location services - they only exist to monitor where you have been.
* Wireless: no wireless service of any kind is safe. Make sure bluetooth is switched off or you will be tracked.
* Password: make you pass phrase as long as possible and make sure each password is unique.
* Search: search engines know more about you than you know - use "DuckDuckGo" to eliminate your search history.
 
  topic image  

Five ways to detect phishing:

1. Hover over the link so the URL address will popup as a tooltip.
2. Copy and Paste the link into a document where the address can be seen.
3. Properties to see where it is from.
4. Reason for the email.
5. Delete unsolicited emails.

  topic image  

1. Hover:

Move your on-screen cursor over the link icon and a tooltip will popup to show the link address.
Your browser will popup the link address at the bottom left of your page.
The like address must be WWW.001LTD.ORG and a string of unique numbers that identify the message.
For Example:
  Hover tooltip is "please click to link to WWW.001LTD.ORG quotation document".
  Browser lower status bar is "www.001ltd.org/4444".

  topic image  

2. Cut and Paste:

It is important to know the actual link address and this may be discovered by using cut and paste on the hyperlink.
001LTD will never use a hyperlink, but criminals will and this can be discovered.
Paste the link into a document and then view the hyperlink - a fake hyperlink will use a domain name that you do not recognize.

  topic image  

3. Properties:

Any HTML email can be viewed at the source code level by clickin on "File" and "Properties".
Each email system has its own unique way to show properties and souce code, - try F12 as an alternative method.
The link will follow "a href" - again the domain used will show up as a fake whent he message is phishing.

  topic image  

4. Reason:

When we send you an email it is because you have requested some information and we are responding to your wishes.   If you ae not expecting any information that we will not be sending you an email.
We do not send you marketing message and we do not ask you to be involved in a survey.

  topic image  

5. Delete:

Any unsolicited email should be deleted.
When we send you an email it is because you have requested some information and we are responding to your wishes.
We do not send you marketing message and we do not ask you to be involved in a survey.
Privacy Phishing 23 Oct 2017 : 03:29Copyright © 2017 LeXica Ltd54.167.250.64 request 1 in 0.05 seconds