Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, September 23 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Email Malware Hackers Business Computing Network Security Microsoft Software Internet Computer Hosted Solutions Tech Term Google IT Services Ransomware Business Mobile Devices User Tips Android Backup Smartphone Managed IT Services Small Business Internet of Things Data Recovery Data Management Efficiency Saving Money Business Continuity Cloud Computing Hardware Windows Innovation IT Support App Data Productivity Communication Windows 10 Cybersecurity Browser Data Backup Facebook Server Managed IT Services Business Management Artificial Intelligence Gmail Encryption Passwords Remote Monitoring Chrome Managed Service Provider Infrastructure Phishing Word Analytics Outsourced IT Windows 10 communications Applications Office 365 Tip of the week Employer-Employee Relationship Disaster Recovery Network Money IT Support Smartphones Vulnerability Productivity Microsoft Office Settings IT Management Google Drive Content Filtering Bandwidth Robot Upgrade Save Money Maintenance YouTube Risk Management Social Media Website Office Tips Data storage Government Antivirus Big Data BYOD LiFi Managing Stress Data loss VPN Unified Threat Management Hosted Solution Data Security Telephone Systems Administration Mouse Vendor Management Server Management Information Workplace Tips Monitors Business Technology desktop Touchscreen Miscellaneous Virtual Private Network Firewall Apple Automation HIPAA Storage End of Support Virtual Reality Mobile Security Wireless Two-factor Authentication Business Intelligence Avoiding Downtime SaaS Laptop Scam Mobile Device The Internet of Things Holiday Paperless Office Company Culture VoIP Outlook Spam Computing WiFi Alert Marketing Budget Politics Cookies MSP Servers Google Calendar Managed Service Social Display Augmented Reality K-12 Schools Emergency Social Networking Network Management Access Control Typing Humor Customer Service Computing Infrastructure Professional Services Dark Web Gadgets Information Technology eWaste Best Practice Star Wars Cyber Monday PowerPoint Current Events Office Samsung Chatbots Tech Support Nanotechnology Development Legislation Digital Payment Wearable Technology Network upgrade Motherboard Cables SharePoint Digital Cryptocurrency Chromebook Alerts USB Microsoft Excel Disaster Users Apps Halloween Identity Continuity Quick Tips Techology Google Docs Fraud Cost Management Managed IT Collaboration Smart Technology Onboarding IT solutions Going Green Social Engineering Websites Screen Reader Charging Statistics Tablet Slack Education Hacks Smart Office How To Lenovo Wires Downloads Document Management Spyware Bitcoin Licensing Dongle Mail Merge Blockchain Uninterrupted Power Supply Scary Stories Google Wallet Solar VoIP Unified Threat Management Computer Care IBM Business Growth Assessment Shortcut File Sharing Distributed Denial of Service Digital Signage Running Cable Printing Safety Superfish Solid State Drive Buisness Legal Smart Tech Bluetooth Comparison Monitoring Password Remote Computing Work Firefox Router Voice over Internet Protocol Identity Theft Windows 8 Virtual Desktop Network Congestion Cooperation Service Level Agreement Address Permissions Unified Communications Sports Drones Compliance User Error Training Corporate Profile Hacker Hotspot Internet Exlporer Patch Management Managed IT Service Troubleshooting Customer Relationship Management Hard Disk Drive Deep Learning Wi-Fi Connectivity Automobile Specifications Spying Writing IT Technicians Optimization Modem FinTech Heating/Cooling Multi-Factor Security Analysis Computers Staff Leominster Dell Regulations Time Management Printer WannaCry Alt Codes Dark Data Language Value Break Fix Cabling Networking Bring Your Own Device Downtime Operating System IoT Search Black Friday Google Maps Employee-Employer Relationship Cybercrime Retail Mirgation Recycling Mobile Data IT Budget Web Server what was your? GPS Recovery How To Work/Life Balance IT Consultant Health Private Cloud Black Market Cameras Tracking Meetings Law Enforcement Cleaning Electronic Medical Records Notifications Physical Security Twitter CCTV Gadget BDR Emoji Webcam Upgrades Crowdsourcing Personal Information Botnet Regulation Error 3D Printing Cortana Point of Sale Ben McDonald shares Travel G Suite Machine Learning Mobile Device Management Processors Unsupported Software Supercomputer CrashOverride Virtualization Staffing Update Motion Sickness Printers Taxes Computer Repair Relocation Administrator Mobile Computing

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3