Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

Varieties of Smart Tech to Consider
3 Industries that Smart Technology is Revolutioniz...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, February 18 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Privacy Malware Hosted Solutions Hackers IT Services Internet Productivity Network Security Productivity Managed IT Services Outsourced IT Data Software Data Backup IT Support Business Mobile Devices Innovation Computer Ransomware Tech Term Data Recovery Hardware Microsoft Google Backup Cloud Computing Small Business Internet of Things Efficiency Managed Service Provider Business Continuity Smartphone Paperless Office User Tips Social Media Disaster Recovery Windows 10 Remote Monitoring Data Management Smartphones Android Browser IT Support Encryption Upgrade Managed IT Business Management Communication Artificial Intelligence VoIP Facebook Save Money Collaboration BYOD Phishing Windows Workplace Tips Windows 10 Mobile Device Management Holiday Risk Management Mobile Device Cybersecurity App communications Vendor Management Network Applications Office 365 Recovery Saving Money Bandwidth Managed IT Services Government Unified Threat Management Firewall Document Management Wi-Fi Employer-Employee Relationship Apps Passwords Gmail Robot Server Bring Your Own Device BDR Big Data Wireless Chrome Password Healthcare Automation Virtualization IT Management Tip of the week Hosted Solution Website Scam Antivirus Project Management Information Compliance Infrastructure Content Filtering Money Data storage Telephone Systems Vulnerability SaaS Going Green IT Service Office Microsoft Office Printing File Sharing Computers Storage Unified Communications Tablet Router Analytics Remote Computing Files Two-factor Authentication Help Desk Quick Tips Politics Customer Service Apple Managed Service Social Work/Life Balance Blockchain Virtual Reality Customer Relationship Management Miscellaneous Data loss Computing Data Security Regulations Training Server Management How To Budget Information Technology Machine Learning Mobility Monitors Operating System Alert Uninterrupted Power Supply Electronic Medical Records Users Outlook Mouse The Internet of Things Spam Software as a Service YouTube Google Drive How To Samsung Word WiFi Smart Technology Remote Monitoring and Management Maintenance Redundancy Management Downtime Settings Flexibility Business Growth Private Cloud Chromebook Remote Workers Administration Tech Support Avoiding Downtime Education Mobile Computing LiFi Internet Exlporer VPN Hacker Digital Payment Upgrades Patch Management IoT IT solutions Websites Identity Theft HIPAA Licensing Twitter Access Control Wireless Technology Legal Mobile Security Virtual Private Network Employees Sports Network Management End of Support Health Assessment Business Technology Company Culture Technology Laws MSP RMM Gadgets Hacks Gadget Unified Threat Management Hotspot Office Tips Mail Merge Recycling Cyberattacks Buisness Typing Automobile Computer Care Black Friday Roanoke — Central Technology Solutions Development Zero-Day Threat Bitcoin Fraud Screen Reader Unsupported Software Virus VoIP Sponsor Utility Computing Consulting Best Practice Mirgation Update Touchscreen Techology Dark Web Motherboard OneNote GPS Downloads Augmented Reality Consultation Lenovo Managing Stress Instant Messaging PowerPoint Cyber Monday technology services provider Social Engineering USB Statistics Proactive Tech Terms User Error Language Address eWaste Read Only Disaster Resistance Cables Backup and Disaster Recovery Windows 8 Save Time Crowdsourcing Meetings Smart Tech Mobile Data Digital Obstacle Managed Services Provider Supercomputer Migration Identities G Suite History Data Warehousing Search Employee-Employer Relationship Tracking Operations Superfish Enterprise Content Management Finance Professional Services Technology Assurance Group ’s 18 Safety Bluetooth Theft Taxes Computing Infrastructure Dark Data Personal Information Security Cameras Google Maps Proactive IT Wires Human Error Net Neutrality Spyware Course Cost Management E-Commerce Google Wallet IT Budget Technology Tips Chatbots Virtual Assistant Hard Drives Google Docs Cabling Microsoft Excel Modem Notifications Shortcut Connectivity Multi-Factor Security Wearable Technology Vulnerabilities Authentication Distributed Denial of Service Annual Convention Black Market WPA3 Financial Humor Printer Alerts Firefox Enterprise Resource Planning Bookmarks Remote Worker Heating/Cooling IT Consulting Permission Virtual Desktop Backups Point of Sale Hard Drive Features Drones Comparison Identity Writing Emoji Wasting Time Solid State Drive Cookies WannaCry Deep Learning Google Calendar Network Congestion Time Management Networking Geography Authorization Sync Managed IT Service San Diego Hacking Fleet Tracking Procurement Current Events Telephony Cooperation Computer Repair Mobile Favorites ROI Servers Data Breach Test Law Enforcement Physical Security Cache Electronic Health Records Alt Codes Public Cloud Specifications Retail Cortana Cryptocurrency Travel Permissions Nanotechnology 3D Printing Star Wars Monitoring Botnet Legislation IT Technicians Display High-Speed Internet Mobile Device Managment Software Tips Break Fix Social Networking Processors Disaster Trending Asset Tracking Marketing SharePoint Staff Conferencing Notes Cameras Motion Sickness CCTV Administrator Relocation Printers Webcam Hard Disk Drive IT Consultant Error Cybercrime Emergency Regulation Web Server CrashOverride