Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: Getting Back to Email Security Basics

Tip of the Week: Getting Back to Email Security Basics

Email is a particular favorite attack vector of many who would do wrong by your business, as it is easily one of the most used communications in most businesses today. Do your employees know how large of a responsibility they have to your business’ security just by using email? In order to prevent unfortunate security blunders, you need to make sure you and your employees know a few best practices when it comes to handling email securely.

For this week’s tip, we’ll review these best practices.

Yes, it can be annoying to have to enter a password everywhere, and yes, it can be hard to remember a different one for every account. However, your employees need to know why they have to deal with these annoyances, too, and why they can’t just use their pet’s name with the year they graduated and call it a day.

The fact of the matter is, too many people want to do just that: significant personal detail, significant number, password done. Cybercriminals know this, and are more than willing to put in the time and effort to find out about one of your employees if it gets them access to a bigger prize. Using social engineering tactics and studying what they can of online activity, these criminals can gain a significant amount of information about your employees (or even you) with relatively little effort. Without better password practices put in place, they could then likely deduce the password of someone in your organization and from there, they’re in… especially if your email password is reused repeatedly to gain access to other facets of the business.

If remembering x-amount of different passwords is a concern, work with your team and implement a password manager, or a program specifically designed to protect passwords and reduce the number that have to be recalled.

Depending on how your company deals with email, for example, if you are using Outlook, your employees probably aren’t typing in their email passwords very often, if at all. This puts the email password even further from top of mind, but it’s important to remember that these passwords need to be changed regularly and kept secure.

2FA, or Two-Factor Authentication
What’s more secure than a password? Two passwords - or at least, a password and an additional code that is generated when an account is being accessed. This is how 2FA works - in addition to their usual password, an employee needs to provide a generated code (usually obtained via their mobile device) in order to access an account. As a result, a hacker who happened to steal some passwords from some database somewhere still wouldn’t have enough information to access your accounts--and because the second piece of authentication is delivered by some other means, like a number generated by an authentication app on the user’s mobile device, the hacker would have that much harder of a time obtaining that as well.

Clicking What Shouldn’t Be Clicked
There is an unfortunate tendency to automatically trust things that come in via our email, whether its an attachment or a link, as these are commonly used avenues for cyberthreats to come in by. This is probably because these attacks can be effective against any level of an organization - an intern could mistakenly let in a threat, as could the president or CEO and anyone in between.

These threats are often known as phishing scams, as the attacker simply casts out their net and waits for someone to take the bait. These scams often leverage emails that include links to quite convincing facsimiles of the site the link purports to direct to. Unfortunately, this only makes phishing a bigger threat.

Another favorite attack like this that cybercriminals like to use is to include a good, old-fashioned virus in an attachment. If you aren’t expecting an attachment in an email, don’t click it! In addition, it always helps to run a quick virus scan if you aren’t sure.

For help in running these scans and maintaining your security, or with any other IT questions you may have, you can always turn to the professionals at Central Technology Solutions. Reach out to us by calling 1-844-237-4300.

Which is Best for Your Server Needs, In-House or H...
WPA3 is Boosting Network Security


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, September 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Cloud Technology Business Computing Privacy Email Malware IT Services Hosted Solutions Hackers Productivity Internet Managed IT Services IT Support Software Network Security Outsourced IT Data Mobile Devices Microsoft Business Ransomware Data Backup Computer Tech Term Backup Innovation Hardware Smartphone Google Internet of Things Data Recovery Business Continuity Cloud Computing Small Business Managed Service Provider Windows 10 Data Management Android User Tips Communication Disaster Recovery Remote Monitoring Social Media Managed IT Artificial Intelligence BYOD VoIP Windows Smartphones Facebook Browser Efficiency Encryption Productivity Paperless Office Risk Management Save Money App Cybersecurity Workplace Tips IT Support Applications Mobile Device Management Business Management Firewall Unified Threat Management Mobile Device Gmail Phishing Robot Network Upgrade Saving Money Recovery Hosted Solution Holiday Website Tip of the week Government Wi-Fi Document Management Apps Passwords Content Filtering Compliance Money Infrastructure Bring Your Own Device SaaS Server Data storage Telephone Systems Going Green BDR Big Data Vendor Management Chrome Password Office 365 Bandwidth Virtualization IT Management Apple Project Management Router Collaboration Antivirus Two-factor Authentication Employer-Employee Relationship Virtual Reality Work/Life Balance Miscellaneous Computing Vulnerability Managed Service Data Security Regulations Data loss Training IT Service Computers Wireless Unified Communications File Sharing Storage Automation Windows 10 Analytics Remote Computing Files Settings Word Business Growth Managed IT Services Administration Redundancy Chromebook Flexibility Education Avoiding Downtime Help Desk LiFi Tech Support Quick Tips Scam The Internet of Things Mobile Computing Healthcare Customer Service Politics Hacker IT solutions Social VPN Smart Technology Digital Payment Upgrades Websites Identity Theft Wireless Technology Legal Twitter Patch Management Sports Customer Relationship Management Licensing Virtual Private Network End of Support Health Network Management communications Internet Exlporer HIPAA Budget Assessment Business Technology Office Blockchain IoT Information Information Technology How To Monitors Server Management Mobility Microsoft Office Alert Mobile Security Printing Mouse Spam Outlook Uninterrupted Power Supply WiFi Tablet YouTube Google Drive How To Samsung Mirgation Tracking Development Superfish Safety Fraud Screen Reader G Suite History Utility Computing Consulting Search Dark Data Personal Information Taxes Google Wallet Managing Stress Dark Web Motherboard Google Maps OneNote Bluetooth Downloads Augmented Reality eWaste Spyware Course Cyber Monday technology services provider Private Cloud IT Budget Hard Drives Google Docs Proactive Proactive IT Notifications User Error Language Software as a Service Migration Cables Black Market Smart Tech Cabling Humor Managed Services Provider Virtual Desktop Shortcut Operations Drones Enterprise Content Management Firefox Writing Emoji Data Warehousing Backups Employee-Employer Relationship Management Network Congestion Technology Assurance Group ’s 18 Solid State Drive Remote Monitoring and Management Heating/Cooling IT Consulting Maintenance Computing Infrastructure Point of Sale Deep Learning Computer Repair Technology Tips Chatbots Wires Time Management Networking Net Neutrality Current Events Cost Management E-Commerce WannaCry Multi-Factor Security Wearable Technology Telephony Alt Codes Vulnerabilities Retail Cortana Microsoft Excel Modem Sync Connectivity Remote Workers Hacking Physical Security Enterprise Resource Planning Marketing Display Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Servers Data Breach 3D Printing Printer Alerts Law Enforcement Comparison Identity Botnet Buisness Processors Travel Hard Drive Features Gadgets Google Calendar Typing Geography Cookies Mobile Device Managment Software Tips Hacks Disaster Trending Office Tips Best Practice Mobile Mail Merge Update Managed IT Service San Diego Automobile Computer Care Bitcoin Fleet Tracking Technology Laws Unsupported Software Virus Access Control Cooperation Gadget Users VoIP Sponsor Electronic Medical Records Specifications Machine Learning Operating System Touchscreen Techology Cache Electronic Health Records Legislation IT Technicians GPS High-Speed Internet Consultation Lenovo Social Engineering USB Permissions Nanotechnology Star Wars Monitoring Company Culture Address Break Fix Social Networking Windows 8 Save Time Asset Tracking Statistics Mobile Data SharePoint Staff Digital Obstacle Black Friday Roanoke — Central Technology Solutions Supercomputer Identities MSP Downtime Disaster Resistance Unified Threat Management Hotspot Crowdsourcing Recycling Read Only Webcam Hard Disk Drive IT Consultant Printers Error Cybercrime Emergency CrashOverride Web Server Cameras Regulation Motion Sickness CCTV Administrator Cyberattacks Relocation Meetings