Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: Getting Back to Email Security Basics

Tip of the Week: Getting Back to Email Security Basics

Email is a particular favorite attack vector of many who would do wrong by your business, as it is easily one of the most used communications in most businesses today. Do your employees know how large of a responsibility they have to your business’ security just by using email? In order to prevent unfortunate security blunders, you need to make sure you and your employees know a few best practices when it comes to handling email securely.

For this week’s tip, we’ll review these best practices.

Passwords
Yes, it can be annoying to have to enter a password everywhere, and yes, it can be hard to remember a different one for every account. However, your employees need to know why they have to deal with these annoyances, too, and why they can’t just use their pet’s name with the year they graduated and call it a day.

The fact of the matter is, too many people want to do just that: significant personal detail, significant number, password done. Cybercriminals know this, and are more than willing to put in the time and effort to find out about one of your employees if it gets them access to a bigger prize. Using social engineering tactics and studying what they can of online activity, these criminals can gain a significant amount of information about your employees (or even you) with relatively little effort. Without better password practices put in place, they could then likely deduce the password of someone in your organization and from there, they’re in… especially if your email password is reused repeatedly to gain access to other facets of the business.

If remembering x-amount of different passwords is a concern, work with your team and implement a password manager, or a program specifically designed to protect passwords and reduce the number that have to be recalled.

Depending on how your company deals with email, for example, if you are using Outlook, your employees probably aren’t typing in their email passwords very often, if at all. This puts the email password even further from top of mind, but it’s important to remember that these passwords need to be changed regularly and kept secure.

2FA, or Two-Factor Authentication
What’s more secure than a password? Two passwords - or at least, a password and an additional code that is generated when an account is being accessed. This is how 2FA works - in addition to their usual password, an employee needs to provide a generated code (usually obtained via their mobile device) in order to access an account. As a result, a hacker who happened to steal some passwords from some database somewhere still wouldn’t have enough information to access your accounts--and because the second piece of authentication is delivered by some other means, like a number generated by an authentication app on the user’s mobile device, the hacker would have that much harder of a time obtaining that as well.

Clicking What Shouldn’t Be Clicked
There is an unfortunate tendency to automatically trust things that come in via our email, whether its an attachment or a link, as these are commonly used avenues for cyberthreats to come in by. This is probably because these attacks can be effective against any level of an organization - an intern could mistakenly let in a threat, as could the president or CEO and anyone in between.

These threats are often known as phishing scams, as the attacker simply casts out their net and waits for someone to take the bait. These scams often leverage emails that include links to quite convincing facsimiles of the site the link purports to direct to. Unfortunately, this only makes phishing a bigger threat.

Another favorite attack like this that cybercriminals like to use is to include a good, old-fashioned virus in an attachment. If you aren’t expecting an attachment in an email, don’t click it! In addition, it always helps to run a quick virus scan if you aren’t sure.

For help in running these scans and maintaining your security, or with any other IT questions you may have, you can always turn to the professionals at Central Technology Solutions. Reach out to us by calling 1-844-237-4300.

Which is Best for Your Server Needs, In-House or H...
WPA3 is Boosting Network Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, April 20 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Privacy Malware Hosted Solutions Hackers IT Services Productivity Internet Network Security Data Productivity Managed IT Services Outsourced IT Data Backup Software Business IT Support Innovation Mobile Devices Data Recovery Ransomware Computer Tech Term Hardware Microsoft Google Backup Cloud Computing Small Business Efficiency Internet of Things Business Continuity Managed Service Provider IT Support Smartphone Upgrade Business Management User Tips Android Disaster Recovery Remote Monitoring VoIP Encryption Data Management Social Media Paperless Office Windows 10 Phishing Smartphones Communication Artificial Intelligence Browser Workplace Tips Collaboration Managed IT Windows Facebook Server Cybersecurity BYOD Risk Management Windows 10 Save Money Managed IT Services communications Mobile Device Saving Money Holiday Passwords Mobile Device Management App Network Wi-Fi Firewall BDR Chrome Employer-Employee Relationship Robot Compliance Bandwidth Office 365 Bring Your Own Device Vendor Management Apps Government Applications Unified Threat Management Automation Recovery Document Management Gmail Analytics Big Data Tip of the week Quick Tips Scam Project Management Antivirus Telephone Systems Healthcare SaaS Money Infrastructure Data storage Hosted Solution Going Green Website Vulnerability Business Technology Microsoft Office Wireless Password Content Filtering Managed Service Information Virtualization IT Management Customer Service Apple Social Unified Communications Virtual Reality Training VPN Miscellaneous Customer Relationship Management Blockchain File Sharing Tablet Computing Regulations Data Security Office IT Service Data loss Files Computers Storage Printing Politics Work/Life Balance Remote Computing Settings Router Help Desk Two-factor Authentication Smart Technology Company Culture Maintenance Mobile Computing Net Neutrality Upgrades Hacker Users Spam Twitter Proactive YouTube Networking Internet Exlporer Machine Learning Mobility Wireless Technology Legal WiFi Patch Management Downtime HIPAA Virtual Private Network End of Support Health Access Control Remote Monitoring and Management Network Management Management Mobile Security Administration Assessment LiFi Monitors Budget Education How To Remote Workers Electronic Medical Records Information Technology Server Management Alert Private Cloud Operating System IT solutions Outlook Tech Support Mouse Uninterrupted Power Supply IoT How To Samsung Digital Payment Sports Google Drive Software as a Service Flexibility The Internet of Things Chromebook Websites Identity Theft Word Licensing Redundancy Avoiding Downtime Business Growth Employees Hard Drives Google Docs Spyware Course Asset Tracking Technology Assurance Group ’s 18 Law Enforcement Proactive IT Conferencing Computing Infrastructure Black Market Public Cloud MSP RMM Technology Tips Chatbots Wasting Time Travel Humor Recycling Cyberattacks Writing Emoji Botnet Shortcut Mobile Device Managment Software Tips Backups Firefox Utility Computing Consulting Microsoft Excel Modem Network Congestion Drones Development Zero-Day Threat Multi-Factor Security Wearable Technology ROI Automobile Computer Care Solid State Drive OneNote Distributed Denial of Service Annual Convention Computer Repair Gadget Deep Learning Heating/Cooling IT Consulting Managing Stress Instant Messaging Printer Alerts Tech Terms Comparison Identity Database Physical Security Current Events Time Management eWaste Read Only Retail Cortana WannaCry Notes 3D Printing Managed Services Provider Cookies Display GPS Alt Codes Hacking Cables Backup and Disaster Recovery Google Calendar Cryptocurrency Employee-Employer Relationship Managed IT Service San Diego Servers Data Breach Enterprise Content Management Finance Cooperation Processors Theft Specifications Voice over Internet Protocol Office Tips Crowdsourcing Meetings Supercomputer IT Technicians PowerPoint Unsupported Software Virus G Suite History Hacks Cost Management E-Commerce Permissions Nanotechnology Update Tracking Typing Disaster Trending Wires Human Error Legislation Google Maps Bitcoin Mail Merge Connectivity Break Fix Social Networking Taxes Best Practice Virtual Desktop Technology Laws Vulnerabilities Authentication SharePoint Staff WPA3 Financial Black Friday Roanoke — Central Technology Solutions Windows 7 Touchscreen Techology Enterprise Resource Planning Bookmarks Unified Threat Management Hotspot Social Engineering USB IT Budget VoIP Sponsor Mirgation Professional Services Mobile Data Cabling Consultation Lenovo Hard Drive Features Fraud Screen Reader Permission Windows 8 Save Time Address Dark Web Motherboard Statistics Geography Authorization Downloads Augmented Reality Security Cameras Digital Obstacle Fleet Tracking Procurement Cyber Monday technology services provider Transportation Dark Data Personal Information Point of Sale Disaster Resistance Mobile Favorites User Error Language Safety Identities Test Migration Virtual Assistant Superfish Cache Electronic Health Records Smart Tech Marketing Search Notifications Sync Buisness Star Wars Monitoring Data Warehousing Telephony Gadgets Google Wallet Bluetooth High-Speed Internet Operations Remote Worker Students Web Server Hard Disk Drive Teamwork Cameras Motion Sickness Emergency Administrator CrashOverride Shared resources CCTV Printers Relocation Webcam IT Consultant Error Cybercrime Regulation