Handled IT’s Hints and Tips- Why You Need To Check Your Email Rules – Stay Secure!

Handled IT’s Hints and Tips- Why You Need To Check Your Email Rules – Stay Secure!

Cyber attackers often use email rules to silently redirect or delete messages—especially after gaining access to your account.

Apr 2, 2025

Christopher Sayadian

Photo of laptop screen with gmail open.
Photo of laptop screen with gmail open.

Cyber attackers often use email rules to silently redirect or delete messages—especially after gaining access to your account. It’s a sneaky method that can go unnoticed for weeks or months. Regularly checking your email rules is a simple but powerful way to protect yourself.

 

Why It Matters 

• Hidden rules can auto-forward your emails to outside addresses.

• Rules might delete or move important messages without your knowledge.

• Suspicious rules often signal account compromise.

 

 

How to Check Your Mail Rules

 

Outlook (Web):

1. Click the Settings gear icon (top right).

2. Select View all Outlook settings.

3. Navigate to Mail > Rules.

4. Review and edit any rules listed.

 

Outlook (Desktop App):

1. Go to File > Manage Rules & Alerts.

2. Check all rules under the Email Rules tab.

 

Google Workspace (Gmail):

1. Open Gmail.

2. Click the gear icon (top right), then select See all settings.

3. Go to the Filters and Blocked Addresses tab.

4. Review the list of filters:

• Look for filters that delete, forward, or archive emails.

• Watch for filters with vague or suspicious criteria.

5. Click Delete next to anything unfamiliar or questionable.

 

What to Look For

• Filters or rules you didn’t create.

• Any auto-forwarding to external or unknown addresses.

• Filters that automatically delete, archive, or mark messages as read.

• Generic rules (e.g., anything with “invoice” or “payment” in the subject).

 

If You Spot Something Suspicious

1. Delete or disable the rule/filter immediately.

2. Change your email password and ensure no forwarding settings are in place.

3. Turn on Multi-Factor Authentication (MFA) and/or update your existing MFA token.

4. Report it to your IT or security team right away.

 

If you don’t stop and think, you may give cybercriminals exactly what they want.

 

If you want to learn more about protecting your business from phishing and other cyberthreats, get in touch with Handled IT.

 

Our team of experts is here to help you strategically ramp up your cybersecurity measures. Together, we can create a safer digital environment for your business.

 

Don’t hesitate. Reach out to Handled IT Partners today.

 

CONTACT US

Begin your digital transformation today.

Begin your digital transformation today.

1-888-300-9985

info@handled.tech

1-888-300-9985

info@handled.tech

1-888-300-9985

info@handled.tech

Stay updated on our latest developments, insights, and opportunities by following us on LinkedIn.