Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

Varieties of Smart Tech to Consider
3 Industries that Smart Technology is Revolutioniz...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Cloud Technology Business Computing Privacy Email Malware Hosted Solutions IT Services Productivity Hackers Managed IT Services Internet IT Support Network Security Software Outsourced IT Data Mobile Devices Ransomware Microsoft Data Backup Business Backup Computer Tech Term Innovation Google Data Recovery Internet of Things Hardware Smartphone Cloud Computing Managed Service Provider Business Continuity Small Business Data Management Windows 10 Android User Tips Communication Social Media Remote Monitoring Disaster Recovery Managed IT Facebook Efficiency Browser Encryption VoIP Artificial Intelligence Windows Paperless Office Productivity Smartphones BYOD IT Support Save Money Risk Management Workplace Tips Cybersecurity App Network Applications Business Management Unified Threat Management Mobile Device Saving Money Robot Upgrade Mobile Device Management Firewall Gmail Phishing Recovery Money Bring Your Own Device Big Data Data storage Going Green Holiday Government Chrome Wi-Fi Document Management Vendor Management Tip of the week Password Compliance Bandwidth Hosted Solution Website Telephone Systems SaaS Server Infrastructure Apps BDR Passwords Content Filtering Office 365 Virtualization Computing Windows 10 Managed Service IT Management Unified Communications Wireless Virtual Reality Collaboration Router Work/Life Balance Two-factor Authentication Project Management Miscellaneous Antivirus Analytics Remote Computing Employer-Employee Relationship Regulations IT Service Training Data Security Apple Computers Data loss Vulnerability Storage File Sharing Automation Uninterrupted Power Supply communications Flexibility Files Chromebook Avoiding Downtime Help Desk IoT Information Budget Customer Service Word Managed IT Services Redundancy Information Technology Tech Support Spam YouTube Printing Upgrades The Internet of Things Politics WiFi Outlook Twitter Quick Tips Scam Mouse Digital Payment Smart Technology Websites Identity Theft Administration Google Drive VPN Licensing Education Settings End of Support Health Patch Management LiFi Customer Relationship Management Business Growth Office Internet Exlporer IT solutions Monitors Virtual Private Network Mobile Computing Microsoft Office Alert Blockchain Network Management Healthcare HIPAA Assessment Business Technology Hacker Mobility Social Mobile Security Server Management Sports How To How To Samsung Wireless Technology Legal Tablet Safety Break Fix Social Networking Consultation Lenovo Connectivity Crowdsourcing Remote Workers Gadgets Alt Codes Dark Data Personal Information SharePoint Staff Vulnerabilities Supercomputer Buisness Address WPA3 G Suite History Unified Threat Management Hotspot Statistics Enterprise Resource Planning Tracking Cryptocurrency Black Friday Roanoke — Central Technology Solutions Notifications Fraud Screen Reader Disaster Resistance Hard Drive Features Taxes Mirgation Digital Obstacle Google Maps Hacks Black Market Dark Web Motherboard Superfish Users Typing Downloads Augmented Reality Search Geography Private Cloud IT Budget technology services provider Fleet Tracking Cabling Best Practice User Error Language Bluetooth Mobile Bitcoin Writing Emoji Cyber Monday Smart Tech Proactive IT Cache Electronic Health Records Operating System Network Congestion Software as a Service Migration Spyware Course Data Warehousing Star Wars Monitoring Point of Sale Computer Repair Operations Shortcut High-Speed Internet Downtime Technology Assurance Group ’s 18 Firefox Asset Tracking Physical Security Maintenance Computing Infrastructure Company Culture Windows 8 Save Time Retail Cortana 3D Printing Net Neutrality Heating/Cooling IT Consulting Recycling Telephony Identities Display Technology Tips Chatbots MSP Sync Processors Microsoft Excel Modem Time Management Networking Utility Computing Law Enforcement Consulting Multi-Factor Security Wearable Technology WannaCry Development Public Cloud Distributed Denial of Service Annual Convention OneNote Travel Virtual Desktop Google Wallet Office Tips Printer Alerts Hacking Managing Stress Botnet Software Tips Unsupported Software Virus Servers Data Breach eWaste Hard Drives Google Docs Update Comparison Identity Proactive Mobile Device Managment Humor Cookies Gadget Managed Services Provider Electronic Medical Records Google Calendar Cables Automobile Computer Care Backups Social Engineering USB Managed IT Service San Diego Employee-Employer Relationship Drones Access Control Cooperation Disaster Trending Enterprise Content Management Machine Learning Remote Monitoring and Management Deep Learning Mobile Data Technology Laws Management GPS Solid State Drive Specifications Mail Merge Current Events Permissions Nanotechnology Touchscreen Techology Cost Management E-Commerce Marketing Legislation IT Technicians VoIP Sponsor Wires Meetings Relocation Webcam IT Consultant Regulation Hard Disk Drive Error Cybercrime Cyberattacks Web Server Emergency Read Only CrashOverride Cameras Motion Sickness Printers CCTV Administrator