Bredy Network Management Corporation Blogs

3 minutes reading time (670 words)

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 25 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Business Computing Hackers Internet Software Hosted Solutions Ransomware Business Microsoft Google Network Security Computer IT Services Smartphone Mobile Devices Android Managed IT Services Data Management Backup Tech Term Windows App Business Continuity User Tips Hardware Windows 10 Cloud Computing Browser Small Business Innovation Internet of Things Cybersecurity Data Recovery IT Support Saving Money Business Management Data Artificial Intelligence Gmail Encryption Remote Monitoring Server Efficiency Infrastructure Windows 10 Tip of the week Disaster Recovery Word Outsourced IT Smartphones Data Backup Productivity Productivity Vulnerability IT Support Chrome Managed Service Provider Facebook Phishing Office 365 Government IT Management Google Drive YouTube Bandwidth Upgrade Applications Social Media Risk Management Managed IT Services Analytics communications Office Tips Robot Passwords Big Data Antivirus Data storage Money Settings Communication Paperless Office Hosted Solution SaaS Workplace Tips HIPAA Data Security Server Management Business Technology Administration Content Filtering Mouse Mobile Security Virtual Private Network Holiday Miscellaneous Microsoft Office BYOD Data loss Alert Unified Threat Management Apple Website Telephone Systems Storage Vendor Management Two-factor Authentication Maintenance Monitors Firewall The Internet of Things Save Money Avoiding Downtime Network Scam VoIP Automation End of Support Spam Computing Virtual Reality Employer-Employee Relationship Outlook WiFi LiFi VPN Mobile Device Dell Information Technology Screen Reader Cyber Monday Typing Humor Smart Office Users Halloween Wi-Fi Legislation Wires WannaCry Best Practice Writing Licensing Dongle Cabling Current Events SharePoint Solar Computers Assessment Microsoft Excel Google Maps Touchscreen Apps Dark Data Managed IT Smart Tech Smart Technology Cryptocurrency Quick Tips Techology Work Going Green Scary Stories Statistics Router Tablet Voice over Internet Protocol Google Docs Retail How To Cooperation Lenovo Service Level Agreement IT solutions Politics Compliance Downloads Business Intelligence Display Hotspot Mail Merge Internet Exlporer Blockchain Education Hacks Running Cable desktop Google Wallet Buisness Customer Service Shortcut Connectivity Distributed Denial of Service Digital Payment Bitcoin VoIP IT Technicians Unified Threat Management Optimization Disaster Printing Sports Bluetooth Modem Comparison Digital Business Growth Virtual Desktop Office Samsung Firefox Staff Superfish Leominster Tech Support Regulations Company Culture Legal Language Address Value Permissions Collaboration Password Laptop Unified Communications Drones Chromebook Patch Management IoT Managed IT Service Windows 8 Mirgation User Error Recycling Uninterrupted Power Supply Cookies Specifications Document Management Spyware Hacker Social Engineering Customer Relationship Management Augmented Reality K-12 Schools Websites Heating/Cooling Social Networking Multi-Factor Security Managing Stress Computer Care IBM Deep Learning Computing Infrastructure Professional Services File Sharing Solid State Drive Downtime Star Wars Break Fix Wireless Cybercrime Time Management Chatbots Printer eWaste Marketing Search Nanotechnology Black Friday Identity Theft Alt Codes Safety Wearable Technology Networking Network upgrade Gadgets Servers Motherboard Google Calendar Cables Training Corporate Profile Bring Your Own Device Operating System Remote Computing Alerts Emergency USB Hard Disk Drive Budget Network Congestion Fraud Cost Management Dark Web Automobile Social Network Management Identity Access Control Continuity Supercomputer CrashOverride Machine Learning BDR Staffing Processors Motion Sickness Taxes Virtualization Administrator Unsupported Software Web Server what was your? Update IT Budget Computer Repair Relocation GPS IT Consultant Mobile Data Cameras Recovery How To Work/Life Balance Health Private Cloud FinTech Tracking Meetings Cleaning Black Market CCTV Law Enforcement Webcam Electronic Medical Records Notifications Physical Security Twitter Mobile Device Management Emoji Error Upgrades Gadget Point of Sale Ben McDonald shares Crowdsourcing Personal Information Botnet Travel Mobile Computing G Suite Cortana 3D Printing

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3