GPfefferkorn7466 GPfefferkorn7466 20-01-2023 Computers and Technology contestada read each email and determine whether it is legitimate. delete any emails that are attempts at social engineering. keep emails that are safe.