Phishing Tip 1: Block “junk” or spam email senders to reduce email clutter. 
How to Block email senders:

  1. Open Outlook.
  2. Select the email you want to block.
  3. Click “Junk” on the Outlook toolbar. 
Phishing
  1. Select “Block Sender” from the drop down menu to add the sender’s name to your personal block list. Emails from the sender will now be automatically moved to your “Junk” folder. 
Phishing
  1. Over time your “Junk Mail” folder will fill up. To empty the “Junk Mail” folder, just right click the folder and select “Empty folder.”

Phishing Tip 2: Automatically move external e.g. non-Samuel Merritt generated emails to a folder. This allows you to separate internal from external emails and reduce the likelihood of clicking on a malicious link or attachment. 
How to setup an External folder:

  1. Open Outlook and select “Rules” on the menu bar at the top of Outlook. 
Phishing
  1. Select the small triangle, then “Manage Rules & Alerts” 
Phishing
  1. Select “New Rule…” 
Phishing
  1. Select “Move messages with specific words in the subject to a folder” 
    Click the “Next” button 
Phishing
  1. In the “Rules Wizard” select “with specific words in the subject”. 
    Then click on “specific words” in Step 2 on the lower half of the box. 
Phishing
  1. In the “Search Text” dialog box “Specify words or phrases to search for in the subject:” type [***External***]. 
    Then click the “Add” button. 
Phishing
  1. You should see “[***External***]” in the “Search List”. Click “OK”. 
Phishing
  1. Now click “specified” folder. 
Phishing
  1. You can chose and existing folder or a new one. To select a new folder, click the “New” button. 
Phishing
  1. Give the new folder a distinctive name like “***External*** Mail” 
    Note: using asteriks will list the folder at the top of the list of folders it is nested in. 
    Click “OK”. 
Phishing
  1. You should now have [***External***] as the specific words in the subject, and ***External*** Mail in the move to…folder. 
    Click “Next”. 
Phishing
  1. You can click “Next”, unless you want to edit something. 
Phishing
  1. If there are specific email addresses you KNOW are good, you can add them by selecting “except from people or public group” and adding them. 
    Be very cautious about using this. 
Phishing
  1. Almost Done! 
    Give the Rule a name, like “***External***” that will help you understand what the rule does. 
    Optional: You can have the rule run now on your inbox by selecting “Run this rule now on messages already in “Inbox””. 
    Click “Finish”. 
Phishing
  1. Here is your new Rule! 
    Click “OK”. 
Phishing
  1. Done!

Now that you have the ***External*** emails in a separate folder, you can review those when you have a bit more time to think carefully about them. And remember: “Be paranoid, because the bad guys really are after our patients’ information”.