Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: Getting Back to Email Security Basics

Tip of the Week: Getting Back to Email Security Basics

Email is a particular favorite attack vector of many who would do wrong by your business, as it is easily one of the most used communications in most businesses today. Do your employees know how large of a responsibility they have to your business’ security just by using email? In order to prevent unfortunate security blunders, you need to make sure you and your employees know a few best practices when it comes to handling email securely.

For this week’s tip, we’ll review these best practices.

Yes, it can be annoying to have to enter a password everywhere, and yes, it can be hard to remember a different one for every account. However, your employees need to know why they have to deal with these annoyances, too, and why they can’t just use their pet’s name with the year they graduated and call it a day.

The fact of the matter is, too many people want to do just that: significant personal detail, significant number, password done. Cybercriminals know this, and are more than willing to put in the time and effort to find out about one of your employees if it gets them access to a bigger prize. Using social engineering tactics and studying what they can of online activity, these criminals can gain a significant amount of information about your employees (or even you) with relatively little effort. Without better password practices put in place, they could then likely deduce the password of someone in your organization and from there, they’re in… especially if your email password is reused repeatedly to gain access to other facets of the business.

If remembering x-amount of different passwords is a concern, work with your team and implement a password manager, or a program specifically designed to protect passwords and reduce the number that have to be recalled.

Depending on how your company deals with email, for example, if you are using Outlook, your employees probably aren’t typing in their email passwords very often, if at all. This puts the email password even further from top of mind, but it’s important to remember that these passwords need to be changed regularly and kept secure.

2FA, or Two-Factor Authentication
What’s more secure than a password? Two passwords - or at least, a password and an additional code that is generated when an account is being accessed. This is how 2FA works - in addition to their usual password, an employee needs to provide a generated code (usually obtained via their mobile device) in order to access an account. As a result, a hacker who happened to steal some passwords from some database somewhere still wouldn’t have enough information to access your accounts--and because the second piece of authentication is delivered by some other means, like a number generated by an authentication app on the user’s mobile device, the hacker would have that much harder of a time obtaining that as well.

Clicking What Shouldn’t Be Clicked
There is an unfortunate tendency to automatically trust things that come in via our email, whether its an attachment or a link, as these are commonly used avenues for cyberthreats to come in by. This is probably because these attacks can be effective against any level of an organization - an intern could mistakenly let in a threat, as could the president or CEO and anyone in between.

These threats are often known as phishing scams, as the attacker simply casts out their net and waits for someone to take the bait. These scams often leverage emails that include links to quite convincing facsimiles of the site the link purports to direct to. Unfortunately, this only makes phishing a bigger threat.

Another favorite attack like this that cybercriminals like to use is to include a good, old-fashioned virus in an attachment. If you aren’t expecting an attachment in an email, don’t click it! In addition, it always helps to run a quick virus scan if you aren’t sure.

For help in running these scans and maintaining your security, or with any other IT questions you may have, you can always turn to the professionals at Central Technology Solutions. Reach out to us by calling 1-844-237-4300.

Which is Best for Your Server Needs, In-House or H...
WPA3 is Boosting Network Security


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, November 15 2018

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Technology Cloud Business Computing Privacy Email Malware Hosted Solutions Hackers IT Services Productivity Internet Managed IT Services Network Security Outsourced IT IT Support Data Data Backup Software Business Mobile Devices Tech Term Computer Microsoft Ransomware Backup Productivity Innovation Data Recovery Internet of Things Managed Service Provider Business Continuity Hardware Smartphone Google Cloud Computing Small Business Disaster Recovery Windows 10 Data Management Android Browser Efficiency Encryption Managed IT Social Media User Tips Communication Artificial Intelligence Remote Monitoring Facebook Paperless Office IT Support VoIP Windows BYOD Smartphones Cybersecurity Risk Management Save Money Business Management Mobile Device Phishing App Workplace Tips Network BDR Recovery Saving Money Upgrade Mobile Device Management Applications Government Firewall Unified Threat Management Gmail Collaboration Robot Server Going Green Infrastructure Big Data Chrome Vulnerability Vendor Management Password Virtualization Bandwidth Office 365 Hosted Solution Website Windows 10 Holiday Wi-Fi Apps Document Management Tip of the week Passwords Compliance Content Filtering SaaS Telephone Systems Project Management Money Bring Your Own Device Data storage Customer Relationship Management Training Computers Data Security Data loss Unified Communications Storage Automation Wireless Managed Service File Sharing Analytics Remote Computing Files Help Desk Customer Service IT Management Virtual Reality Apple Managed IT Services Politics Two-factor Authentication Router Work/Life Balance Miscellaneous Antivirus Regulations Employer-Employee Relationship Healthcare Office IT Service Computing Internet Exlporer Monitors Remote Monitoring and Management HIPAA Microsoft Office Alert Budget Virtual Private Network Blockchain Network Management Users Information Technology Remote Workers Mobile Security Printing Spam Machine Learning Mobility Assessment Business Technology Outlook Server Management WiFi How To Samsung Mouse How To YouTube IoT Information Tablet Chromebook Uninterrupted Power Supply Flexibility Google Drive Administration Settings Avoiding Downtime Education Business Growth LiFi Word Mobile Computing IT solutions Tech Support Upgrades Redundancy The Internet of Things Social Twitter Hacker Maintenance Smart Technology Digital Payment Quick Tips Scam Sports Websites Identity Theft Wireless Technology Legal VPN Licensing End of Support Health Patch Management communications Management Travel Update Hacking Botnet Comparison Identity Unsupported Software Virus Hacks Servers Data Breach Wires Human Error Google Calendar Typing Cost Management E-Commerce Mobile Device Managment Software Tips Cookies Electronic Medical Records Vulnerabilities Gadget Authentication Access Control Cooperation Social Engineering USB Best Practice Connectivity Automobile Managed IT Service Computer Care San Diego Bitcoin Enterprise Resource Planning Bookmarks Disaster Trending WPA3 Specifications Mobile Data Operating System Technology Laws Permission Legislation GPS IT Technicians Mail Merge Hard Drive Features Permissions Nanotechnology Save Time Touchscreen Techology Geography Authorization SharePoint Staff Safety VoIP Sponsor Downtime Break Fix Dark Data Social Networking Personal Information Windows 8 Mobile Crowdsourcing Favorites Unified Threat Management Meetings Hotspot Fleet Tracking Black Friday Supercomputer Roanoke — Central Technology Solutions Identities Consultation Lenovo Statistics Test Tracking Mirgation Notifications Address Cache Electronic Health Records G Suite Fraud History Screen Reader Disaster Resistance High-Speed Internet Employees Downloads Taxes Augmented Reality Black Market Google Wallet Digital Obstacle Star Wars Monitoring Dark Web Google Maps Motherboard Virtual Desktop Company Culture Conferencing User Error Language Writing Emoji Search Asset Tracking Private Cloud Cyber Monday IT Budget technology services provider Hard Drives Google Docs Superfish Network Congestion Smart Tech Humor Bluetooth MSP Software as a Service Migration Recycling Cyberattacks Cabling Backups Proactive IT Development Zero-Day Threat Operations Drones Spyware Course Utility Computing Consulting Data Warehousing Computer Repair Managing Stress Instant Messaging Point of Sale Computing Infrastructure Retail Cortana Deep Learning Shortcut OneNote Technology Assurance Group ’s 18 Physical Security Solid State Drive Net Neutrality Display Current Events Proactive Technology Tips Chatbots 3D Printing Firefox eWaste Read Only Heating/Cooling IT Consulting Marketing Cables Telephony Multi-Factor Security Wearable Technology Processors Alt Codes Managed Services Provider Sync Microsoft Excel Modem Networking Gadgets Enterprise Content Management Law Enforcement Finance Printer Alerts WannaCry Buisness Employee-Employer Relationship Public Cloud Distributed Denial of Service Office Tips Annual Convention Cryptocurrency Time Management Printers Emergency CrashOverride Cameras Motion Sickness CCTV Administrator Relocation Regulation Webcam IT Consultant Hard Disk Drive Error Cybercrime Backup and Disaster Recovery Web Server