Frequently Asked Question
Steering away from Common Naming
Last Updated 2 hours ago
Steering away from Common Naming
Why using common email names like sales@, info@, accounts@ is risky
Increased Risk of Spam
- Massive volumes of spam: Commonly used email addresses such as
sales@,info@, andaccounts@are frequently targeted by spammers due to their broad usage. - Higher attack surface: These common addresses expose your business to more potential threats, making it easier for attackers to find a point of entry.
Phishing Exploits
- Statistical likelihood: With an open rate of 2-4%, phishing emails targeting these common addresses are likely to succeed if enough spam is received.
- Higher risk with volume: The more spam you receive, the higher the statistical risk that one of those emails could be a malicious attempt to breach your system.
Recommended Alternatives
- Presales@ - For initial inquiries and customer support.
- Question@ - Useful for general queries and feedback.
- Payable@ - For financial communications related to payments or billing.
How phishing exploits common mailboxes
Phishing attacks often rely on deception, tricking recipients into providing sensitive information or clicking malicious links. Here’s how they exploit common email addresses:
- Social engineering: Attackers craft emails that appear legitimate by mimicking familiar sender names like
sales@orinfo@. - Urgency and credibility: They might use urgency ("urgent payment due") or authority to convince recipients to act quickly.
- Links to malicious sites: Phishing emails often contain links to fake websites designed to steal login credentials or personal information.
- Attachments with malware: Malicious attachments can be disguised as invoices, receipts, or other legitimate documents.
Practical Steps to Mitigate Risk
- Use less common email addresses: Choose unique email addresses like
presales@,question@, andpayable@that are less likely to attract spam. - Implement spam filters: Use robust spam filtering solutions to automatically block suspicious emails.
- Select an Email provider who will track suspicious account access, and supports link-rewriting and adaptive filtering.
- Educate staff: Train your team on recognising phishing attempts and reporting suspected spam.
- Monitor email activity: Regularly check for unusual patterns or large volumes of incoming spam.
By adopting these practices, you can significantly reduce the risk associated with common email addresses while maintaining effective communication channels.
