Contact Us Today! 1-844-237-4300
3 minutes reading time (670 words)

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

Varieties of Smart Tech to Consider
3 Industries that Smart Technology is Revolutioniz...

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Cloud Technology Business Computing Email Malware Productivity Privacy Hosted Solutions Hackers Managed IT Services IT Services IT Support Internet Outsourced IT Network Security Software Mobile Devices Ransomware Backup Microsoft Data Data Backup Smartphone Business Internet of Things Innovation Computer Data Recovery Managed Service Provider Hardware Business Continuity Small Business Cloud Computing Windows 10 Android Google Data Management Managed IT Social Media Tech Term Disaster Recovery Remote Monitoring User Tips Communication Artificial Intelligence Windows Smartphones BYOD Browser Encryption Paperless Office Risk Management App Cybersecurity Facebook Efficiency Recovery Saving Money Business Management Save Money Upgrade Mobile Device Management Mobile Device VoIP Applications Firewall Phishing Robot Gmail Office 365 Virtualization Vendor Management Password Hosted Solution Holiday Government Unified Threat Management Document Management Apps Compliance Tip of the week Content Filtering Telephone Systems SaaS Server Big Data Infrastructure Money Bring Your Own Device Data storage Going Green Chrome Productivity Automation Wireless Bandwidth Website Windows 10 Analytics Remote Computing Wi-Fi IT Management Work/Life Balance Virtual Reality Passwords Miscellaneous Apple Antivirus Project Management Regulations Employer-Employee Relationship Workplace Tips Training BDR IT Service Network Computing Computers Data Security Unified Communications Data loss Vulnerability Internet Exlporer Assessment Business Technology Spam Budget Tablet WiFi How To Samsung HIPAA Server Management Information Technology YouTube Printing Files Mobile Security Outlook Flexibility Uninterrupted Power Supply Mouse Administration Avoiding Downtime Help Desk IT Support LiFi Customer Service Tech Support Google Drive Education Politics Word Settings Collaboration IT solutions Upgrades Business Growth Digital Payment Managed IT Services Redundancy Twitter Websites Identity Theft Scam Mobile Computing Licensing Social Sports Hacker The Internet of Things Two-factor Authentication End of Support Health Router VPN communications Smart Technology Patch Management Wireless Technology Legal Office Monitors Customer Relationship Management Microsoft Office Alert Mobility Virtual Private Network Network Management Storage File Sharing Hacks Mobile Data Star Wars Comparison Disaster Identity Trending Typing Crowdsourcing Google Calendar Best Practice Technology Laws Supercomputer Company Culture Blockchain How To Cookies Mail Merge Bitcoin History Access Control Cooperation Touchscreen Techology Downtime Dark Data Personal Information Tracking Recycling Managed IT Service VoIP San Diego Sponsor Operating System Safety Consultation Lenovo Taxes Utility Computing Specifications Chromebook Google Maps Notifications Legislation IT Technicians Statistics Private Cloud IT Budget Managing Stress Permissions Nanotechnology Address Windows 8 Save Time Black Market Cabling SharePoint Staff Disaster Resistance eWaste Break Fix Digital Social Networking Obstacle Identities Unified Threat Management Hotspot Superfish Healthcare Black Friday Roanoke — Central Technology Solutions Search Virtual Desktop Writing Emoji Mirgation Bluetooth Google Wallet Network Congestion Enterprise Content Management Fraud Screen Reader Downloads Augmented Reality Proactive IT Computer Repair Management Dark Web Spyware Motherboard Course Hard Drives Google Docs User Error Language Quick Tips Humor Physical Security Telephony Cost Management Cyber Monday technology services provider Shortcut Retail Cortana Sync Backups 3D Printing Law Enforcement Connectivity Software as a Service Migration Drones Display Public Cloud Firefox Smart Tech Processors Travel Operations Heating/Cooling Deep Learning IT Consulting Botnet Enterprise Resource Planning Data Warehousing Solid State Drive Marketing Maintenance Computing Infrastructure Time Management Networking Current Events Buisness Office Tips Hard Drive WannaCry Technology Assurance Group ’s 18 Gadgets Mobile Device Managment Software Tips Unsupported Software Virus Gadget IoT Technology Tips Chatbots Hacking Alt Codes Update Automobile Computer Care Net Neutrality Multi-Factor Security Wearable Technology Servers Data Breach Electronic Medical Records Machine Learning Mobile Microsoft Excel Modem Cryptocurrency Printer Alerts GPS Cache Distributed Denial of Service Annual Convention Users Social Engineering USB CCTV Administrator Meetings Relocation G Suite Webcam IT Consultant Point of Sale Error Cybercrime Hard Disk Drive Web Server Emergency Cameras Motion Sickness CrashOverride