Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: Getting Back to Email Security Basics

Tip of the Week: Getting Back to Email Security Basics

Email is a particular favorite attack vector of many who would do wrong by your business, as it is easily one of the most used communications in most businesses today. Do your employees know how large of a responsibility they have to your business’ security just by using email? In order to prevent unfortunate security blunders, you need to make sure you and your employees know a few best practices when it comes to handling email securely.

For this week’s tip, we’ll review these best practices.

Passwords
Yes, it can be annoying to have to enter a password everywhere, and yes, it can be hard to remember a different one for every account. However, your employees need to know why they have to deal with these annoyances, too, and why they can’t just use their pet’s name with the year they graduated and call it a day.

The fact of the matter is, too many people want to do just that: significant personal detail, significant number, password done. Cybercriminals know this, and are more than willing to put in the time and effort to find out about one of your employees if it gets them access to a bigger prize. Using social engineering tactics and studying what they can of online activity, these criminals can gain a significant amount of information about your employees (or even you) with relatively little effort. Without better password practices put in place, they could then likely deduce the password of someone in your organization and from there, they’re in… especially if your email password is reused repeatedly to gain access to other facets of the business.

If remembering x-amount of different passwords is a concern, work with your team and implement a password manager, or a program specifically designed to protect passwords and reduce the number that have to be recalled.

Depending on how your company deals with email, for example, if you are using Outlook, your employees probably aren’t typing in their email passwords very often, if at all. This puts the email password even further from top of mind, but it’s important to remember that these passwords need to be changed regularly and kept secure.

2FA, or Two-Factor Authentication
What’s more secure than a password? Two passwords - or at least, a password and an additional code that is generated when an account is being accessed. This is how 2FA works - in addition to their usual password, an employee needs to provide a generated code (usually obtained via their mobile device) in order to access an account. As a result, a hacker who happened to steal some passwords from some database somewhere still wouldn’t have enough information to access your accounts--and because the second piece of authentication is delivered by some other means, like a number generated by an authentication app on the user’s mobile device, the hacker would have that much harder of a time obtaining that as well.

Clicking What Shouldn’t Be Clicked
There is an unfortunate tendency to automatically trust things that come in via our email, whether its an attachment or a link, as these are commonly used avenues for cyberthreats to come in by. This is probably because these attacks can be effective against any level of an organization - an intern could mistakenly let in a threat, as could the president or CEO and anyone in between.

These threats are often known as phishing scams, as the attacker simply casts out their net and waits for someone to take the bait. These scams often leverage emails that include links to quite convincing facsimiles of the site the link purports to direct to. Unfortunately, this only makes phishing a bigger threat.

Another favorite attack like this that cybercriminals like to use is to include a good, old-fashioned virus in an attachment. If you aren’t expecting an attachment in an email, don’t click it! In addition, it always helps to run a quick virus scan if you aren’t sure.

For help in running these scans and maintaining your security, or with any other IT questions you may have, you can always turn to the professionals at Central Technology Solutions. Reach out to us by calling 1-844-237-4300.

Which is Best for Your Server Needs, In-House or H...
WPA3 is Boosting Network Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, January 21 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Email Privacy Hosted Solutions Hackers IT Services Internet Network Security Productivity Managed IT Services Outsourced IT Software Data Data Backup IT Support Productivity Business Mobile Devices Tech Term Ransomware Innovation Microsoft Computer Hardware Backup Data Recovery Small Business Google Internet of Things Cloud Computing Managed Service Provider Smartphone Business Continuity Windows 10 Smartphones Android Disaster Recovery Efficiency Data Management Social Media Remote Monitoring User Tips Communication Artificial Intelligence VoIP Browser Encryption Paperless Office Managed IT Upgrade Windows Save Money Facebook Business Management BYOD IT Support Phishing Mobile Device Management Mobile Device App Holiday Collaboration Workplace Tips Risk Management Cybersecurity Windows 10 Passwords Gmail Managed IT Services Wi-Fi Firewall Employer-Employee Relationship communications Network Robot Government Applications Unified Threat Management Saving Money Bandwidth Bring Your Own Device Server Recovery BDR Password IT Management Healthcare Content Filtering Tip of the week Office 365 Scam Antivirus Project Management Compliance Big Data Infrastructure SaaS Chrome Document Management Telephone Systems Vulnerability Money Data storage Going Green Hosted Solution Website Vendor Management Virtualization Apps Wireless Help Desk Blockchain Analytics Remote Computing File Sharing Quick Tips Customer Service Virtual Reality Files Apple Managed Service Customer Relationship Management Miscellaneous Social Information Unified Communications Politics Data loss Regulations Data Security Work/Life Balance Office IT Service Computing Router Microsoft Office Two-factor Authentication Computers Storage Automation Printing Training Outlook Word IT solutions Mouse Chromebook Internet Exlporer Machine Learning Mobility Redundancy Flexibility Avoiding Downtime HIPAA Google Drive Access Control Remote Monitoring and Management Sports Settings Tablet Mobile Security Business Growth VPN Upgrades Remote Workers Mobile Computing Patch Management Twitter Hacker Private Cloud Users Tech Support Virtual Private Network IoT Spam Wireless Technology Legal Network Management End of Support Health WiFi Digital Payment Assessment Business Technology YouTube Server Management Monitors The Internet of Things Employees Websites Identity Theft How To Downtime Company Culture Alert Licensing Electronic Medical Records Uninterrupted Power Supply Maintenance Administration Budget Smart Technology Education Information Technology LiFi How To Samsung Operating System Gadget Search Safety Printer Alerts Proactive Tech Terms Automobile Computer Care Superfish Dark Data Personal Information Distributed Denial of Service Annual Convention eWaste Read Only Bluetooth Cables Backup and Disaster Recovery Comparison Identity Managed Services Provider Windows 8 Save Time Cookies Enterprise Content Management Finance GPS Spyware Course Notifications Google Calendar Employee-Employer Relationship Identities Proactive IT Shortcut Black Market Cooperation Theft Managed IT Service San Diego Management Crowdsourcing Meetings Writing Emoji Wires Human Error Marketing Google Wallet Supercomputer Firefox Specifications Cost Management E-Commerce IT Consulting Network Congestion Permissions Nanotechnology Vulnerabilities Authentication Gadgets Tracking Legislation IT Technicians Connectivity Buisness Hard Drives Google Docs G Suite History Heating/Cooling Bookmarks Humor Taxes WannaCry SharePoint Staff WPA3 Financial Google Maps Time Management Networking Computer Repair Break Fix Social Networking Enterprise Resource Planning Backups Hacking Retail Cortana Unified Threat Management Hotspot Permission Drones IT Budget Physical Security Black Friday Roanoke — Central Technology Solutions Hard Drive Features Servers Data Breach Display Fraud Screen Reader Geography Authorization Deep Learning 3D Printing Mirgation Solid State Drive Cabling Motherboard Mobile Favorites Current Events Processors Downloads Augmented Reality Fleet Tracking Procurement Security Cameras Dark Web Point of Sale Disaster Trending User Error Language Test Alt Codes Office Tips Cyber Monday technology services provider Cache Electronic Health Records Technology Laws Update Smart Tech High-Speed Internet Mail Merge Unsupported Software Virus Software as a Service Migration Star Wars Monitoring Cryptocurrency Data Warehousing Conferencing Telephony VoIP Sponsor Operations Asset Tracking Remote Worker Sync Touchscreen Techology Hacks Law Enforcement Social Engineering USB Computing Infrastructure MSP RMM Typing Public Cloud Consultation Lenovo Technology Assurance Group ’s 18 Recycling Cyberattacks Statistics Net Neutrality Development Zero-Day Threat Best Practice Botnet Address Mobile Data Technology Tips Chatbots Utility Computing Consulting Bitcoin Travel Microsoft Excel Modem Managing Stress Instant Messaging Virtual Desktop Digital Obstacle Multi-Factor Security Wearable Technology OneNote ROI Mobile Device Managment Software Tips Disaster Resistance Cameras Motion Sickness Notes CCTV Hard Disk Drive Administrator Printers Relocation Webcam Emergency CrashOverride IT Consultant Regulation Error Cybercrime Web Server