The work is devoted to the analysis of the most common e-mail threats. The main scenarios of the impact of threats are considered and the main recommendations for protecting information from threats, which are carried out by means of attacks on users' e-mails, are given.