Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, December 10 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Business Computing Hackers Business Network Security User Tips Software Computer Internet Microsoft Google IT Services Tech Term Hosted Solutions Efficiency Ransomware Mobile Devices Communication Smartphone Small Business Android Data Backup Productivity Managed IT Services IT Support Internet of Things Saving Money Cloud Computing Business Continuity Browser Innovation Hardware Data Recovery Windows 10 Windows Data Management Business Management Managed IT Services Workplace Tips Data Backup App Cybersecurity Microsoft Office Productivity Upgrade Server Facebook Word Artificial Intelligence Gmail Remote Monitoring Office 365 Disaster Recovery Encryption Passwords Windows 10 Chrome Managed Service Provider Analytics Phishing Tip of the week communications Outsourced IT Vulnerability Network Employer-Employee Relationship Website Money IT Support Mobile Device BYOD Applications Smartphones Infrastructure Miscellaneous Settings Company Culture Save Money Robot Maintenance Users Antivirus YouTube Social Media Data storage Risk Management Government Office Tips IT Management Managed Service Big Data Google Drive VoIP Content Filtering Bandwidth Monitors Telephone Systems Vendor Management desktop Apple Two-factor Authentication Education Automation Firewall Avoiding Downtime Storage Managing Stress Scam End of Support Virtual Reality Development Wireless SaaS HIPAA VPN Access Control Spam Computing Employee-Employer Relationship Data Security Holiday Outlook Laptop Business Technology Operating System Paperless Office Mobile Security Server Management WiFi Virtual Private Network Alert LiFi Touchscreen The Internet of Things Display Hosted Solution Quick Tips Administration Information Business Intelligence Data loss Mouse Unified Threat Management Shortcut Distributed Denial of Service Apps Marketing Onboarding Modem FinTech VoIP Unified Threat Management Tech Support Cryptocurrency Staff Leominster IT solutions Going Green Gadgets Digital Payment Slack Regulations Firefox Superfish Google Docs Language Value Bluetooth Comparison Chromebook Digital Mirgation Recycling Address Permissions Social Engineering Disaster Content IoT Hacks Patch Management Managed IT Service Google Wallet Collaboration Digital Signage Cookies MSP User Error Websites Bitcoin Augmented Reality K-12 Schools Printing Halloween Monitoring Social Networking Customer Relationship Management Business Growth Computing Infrastructure Professional Services Specifications Document Management Spyware Chatbots eWaste Safety Legal Uninterrupted Power Supply Streaming Star Wars Heating/Cooling Multi-Factor Security Password Break Fix Remote Computing Unified Communications Drones File Sharing Troubleshooting Nanotechnology Time Management Printer Windows 8 Computer Care IBM Wearable Technology Network upgrade Black Friday Network Congestion Scary Stories Spying Motherboard Cables Networking Hacker Solid State Drive Alerts USB Search Running Cable Identity Theft Analysis Identity Continuity Emergency Deep Learning Fraud Human Error Cost Management Servers Google Calendar Mobile Device Management Smart Office Dark Web Writing Buisness Screen Reader Charging Network Management Wi-Fi Training Corporate Profile Cyber Monday Computers Automobile Sports Wires Alt Codes Virtual Desktop Hard Disk Drive Licensing Dongle Solar Bring Your Own Device Dell Device Assessment Legislation Dark Data Update Work Microsoft Excel Retail Budget Cabling LED Smart Tech SharePoint Social WannaCry Managed IT Smart Technology Information Technology Google Maps PowerPoint Router Voice over Internet Protocol Techology Politics Typing Humor Cooperation Service Level Agreement Current Events Compliance How To Lenovo Best Practice Hotspot Mobility Internet Exlporer Statistics Tablet Customer Service IT Technicians Optimization Mail Merge Blockchain Office Samsung Downtime Co-Managed IT Connectivity Downloads Cybercrime Black Market IT Consultant Law Enforcement Cameras Print Toner Tracking Notifications Meetings Electronic Medical Records Twitter Physical Security Cleaning Emoji Upgrades Gadget CCTV Crowdsourcing Webcam Personal Information Botnet Cortana Error 3D Printing Point of Sale Ben McDonald shares Processors Travel Printers Machine Learning Virtualization BDR Unsupported Software G Suite Mobile Computing Supercomputer CrashOverride Motion Sickness Regulation Computer Repair Relocation Staffing Administrator Mobile Data Taxes IT Budget How To Work/Life Balance Web Server what was your? Recovery Health Private Cloud GPS

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3