Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

Varieties of Smart Tech to Consider
3 Industries that Smart Technology is Revolutioniz...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, November 18 2018

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Cloud Technology Business Computing Email Privacy Malware Hosted Solutions Hackers IT Services Internet Productivity Managed IT Services Outsourced IT Network Security IT Support Data Software Data Backup Business Mobile Devices Microsoft Ransomware Computer Tech Term Backup Productivity Innovation Data Recovery Business Continuity Smartphone Google Internet of Things Managed Service Provider Hardware Cloud Computing Small Business Windows 10 Disaster Recovery Android Data Management Managed IT User Tips Artificial Intelligence Communication Remote Monitoring Browser Efficiency Encryption Social Media Windows Smartphones BYOD VoIP Facebook IT Support Paperless Office Phishing Save Money App Mobile Device Cybersecurity Workplace Tips Risk Management Business Management Government Mobile Device Management Recovery Unified Threat Management Firewall Collaboration Applications Gmail Server Network BDR Robot Saving Money Bandwidth Upgrade Apps Document Management Virtualization Content Filtering Tip of the week Passwords Project Management Wi-Fi Infrastructure Big Data Money Bring Your Own Device Compliance Data storage Vulnerability Chrome Going Green Telephone Systems SaaS Vendor Management Office 365 Hosted Solution Password Website Windows 10 Holiday IT Management Automation Managed IT Services Healthcare Politics Apple Work/Life Balance Antivirus Help Desk Employer-Employee Relationship Customer Service Router communications Two-factor Authentication Managed Service Customer Relationship Management Virtual Reality Training Computing Data loss Unified Communications Miscellaneous Data Security File Sharing Regulations Wireless Office IT Service Files Computers Storage Analytics Remote Computing Word Settings Tech Support IT solutions Business Growth How To Samsung Redundancy Digital Payment Remote Monitoring and Management Flexibility Quick Tips Scam Mobile Computing Chromebook Websites Sports Identity Theft Hacker Avoiding Downtime Social The Internet of Things VPN Licensing Remote Workers Patch Management Wireless Technology Legal Upgrades Maintenance Smart Technology Twitter Virtual Private Network IoT Information Network Management Users Machine Learning Mobility Spam Budget Assessment Business Technology Server Management WiFi Information Technology Internet Exlporer How To YouTube End of Support Health Blockchain Tablet HIPAA Printing Uninterrupted Power Supply Mouse Monitors Outlook Administration Microsoft Office Alert Mobile Security LiFi Google Drive Education Break Fix Social Networking Search Private Cloud IT Budget Proactive Mobile Data SharePoint Staff Superfish Virtual Desktop eWaste Read Only Bluetooth Cables Google Wallet Unified Threat Management Hotspot Cabling Managed Services Provider Black Friday Roanoke — Central Technology Solutions Finance Safety Fraud Screen Reader Spyware Course Employee-Employer Relationship Dark Data Hard Drives Personal Information Google Docs Mirgation Proactive IT Enterprise Content Management Dark Web Motherboard Shortcut Downloads Augmented Reality Point of Sale Management Humor Wires Human Error Drones Notifications User Error Language Firefox Cost Management E-Commerce Backups Cyber Monday technology services provider IT Consulting Vulnerabilities Deep Learning Authentication Black Market Smart Tech Sync Connectivity Solid State Drive Software as a Service Migration Heating/Cooling Telephony Marketing Data Warehousing WannaCry Public Cloud Buisness WPA3 Operations Time Management Law Enforcement Gadgets Networking Enterprise Resource Planning Bookmarks Writing Current Events Emoji Hacking Botnet Alt Codes Permission Computing Infrastructure Travel Hard Drive Features Network Congestion Technology Assurance Group ’s 18 Servers Data Breach Geography Authorization Net Neutrality Mobile Device Managment Software Tips Cryptocurrency Computer Repair Technology Tips Chatbots Microsoft Excel Modem Automobile Computer Care Fleet Tracking Physical Security Multi-Factor Security Wearable Technology Gadget Mobile Favorites Retail Cortana Disaster Trending Typing Test 3D Printing Printer Alerts Cache Electronic Health Records Display Hacks Distributed Denial of Service Annual Convention Technology Laws GPS High-Speed Internet Best Practice Employees Processors Mail Merge Star Wars Monitoring Bitcoin Comparison Identity Cookies VoIP Sponsor Downtime Asset Tracking Office Tips Operating System Google Calendar Touchscreen Techology Company Culture Conferencing San Diego Supercomputer MSP Unsupported Software Virus Access Control Cooperation Consultation Crowdsourcing Lenovo Meetings Recycling Cyberattacks Update Managed IT Service Statistics Tracking Development Zero-Day Threat Address G Suite Utility Computing History Consulting Windows 8 Electronic Medical Records Save Time Specifications USB Permissions Nanotechnology Digital Obstacle Google Maps OneNote Identities Legislation IT Technicians Disaster Resistance Taxes Managing Stress Instant Messaging Social Engineering Webcam Backup and Disaster Recovery IT Consultant Hard Disk Drive Error Printers Cybercrime Web Server Emergency CrashOverride Cameras Regulation Motion Sickness Administrator CCTV Relocation RMM