Get Started Today!  321-259-5500

croom new

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, June 19 2018
If you'd like to register, please fill in the username, password and name fields.

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Best Practices Technology Cloud Privacy Malware Hackers Business Computing Business Email Hosted Solutions Productivity Internet Backup IT Services Mobile Devices Network Security Computer Microsoft Software Managed Service Provider Windows 10 Ransomware Smartphone Hardware User Tips Android Google Business Continuity Data Workplace Tips IT Support Data Management Disaster Recovery Innovation Efficiency Server App Small Business Social Media Communication Tech Term Encryption Browser Managed IT Services Smartphones Data Recovery Cloud Computing Network Business Management BYOD Facebook Gmail Windows Artificial Intelligence Big Data Internet of Things Office 365 Phishing Hosted Solution Employer-Employee Relationship Office Paperless Office Apps WiFi Office Tips Robot Passwords Wireless Technology Firewall Outsourced IT Vendor Management Productivity Alert Miscellaneous Save Money Remote Monitoring Mobile Device Management Spam Recovery Data Backup Government Risk Management Upgrade Word Budget Virtualization How To IT solutions Hacker Cybersecurity Saving Money Vulnerability Infrastructure Holiday Tip of the week Avoiding Downtime Money Wireless Content Filtering Wi-Fi Two-factor Authentication Work/Life Balance Microsoft Office Password Chrome Apple Going Green VoIP Website Twitter Bandwidth IT service Document Management Computing Hard Drives Education Windows 10 Automation Settings The Internet of Things Cybercrime Virtual Reality Data storage SaaS Analytics Unified Threat Management Customer Service IT Support VPN IT Management Legal Social Applications Managed IT Services Remote Computing Tech Support Antivirus Presentation Maintenance Regulations Telephone Systems Augmented Reality End of Support Virtual Desktop Politics Health Scam Network Management Business Owner Upgrades Printing Websites Patch Management Competition Solid State Drive Data loss User Botnet User Error Best Practice Search eWaste Google Drive Collaboration Monitors Data Security Machine Learning Identity Theft Heating/Cooling Virtual Private Network Administration File Sharing Samsung Safety Taxes IBM Downtime Cortana Cost Management Outlook communications Customer Relationship Management Router Lithium-ion battery Server Management Mobile Device Hacking YouTube Unified Communications Business Intelligence Automobile Physical Security Tablet Mouse HIPAA Computers Storage LiFi Running Cable Computer Care Sports BDR Business Technology Compliance Training Mobile Security Point of Sale Lenovo IT Technicians Downloads Deep Learning VoIP Break Fix Analyitcs Staffing Current Events Buisness Screen Reader Gadget Company Culture Hotspot Computer Repair Co-managed IT Web Server Superfish Mirgation Black Market Corporate Profile Multi-Factor Security Time Management Dark Web GPS Marketing Trending Smart Tech Managing Stress Application Shortcut Language Fun Identities Cameras Bring Your Own Device Chatbots WannaCry Google Calendar Network Congestion Net Neutrality Tracking CIO Connectivity Enterprise Content Management Computing Infrastructure Entrepreneur Electronic Medical Records Operating System Administrator CCTV Business Growth Mobile Computing Networking Identity Processors Legislation Display Touchscreen FCC 3D Printing IP Address IoT Alerts Managed IT Cabling Alt Codes Public Speaking Digital Comparison Title II Unsupported Software Information Technology Mobile Office Star Wars Refrigeration Licensing Environment Google Docs G Suite Typing Techology Social Networking Spyware Specifications Relocation Online Mobile Data Supercomputer Google Wallet Assessment Hiring/Firing Mail Merge Cooperation Disaster Travel Writing Cryptocurrency Laptop Unified Threat Management Motherboard Notifications Black Friday iPhone Private Cloud Servers Microsoft Excel IT Budget Drones Internet Exlporer Address Staff Uninterrupted Power Supply Troubleshooting Motion Sickness Retail IT Consultant Gadgets Bitcoin Halloween Printer Crowdsourcing How To Cyber Monday Error Blockchain Digital Payment Hard Drive Wearable Technology Update Hard Disk Drive Humor Social Engineering Cleaning Users Windows 8 Scary Stories Access Control Modem Firefox Smart Technology Law Statistics Permissions Cache Knowledge Undo Chromebook Meetings Hacks SharePoint Cookies Distributed Denial of Service Recycling Bluetooth Fraud Save Time 5G Experience Emoji Dark Data Webcam Quick Tips Managed IT Service Nanotechnology Law Enforcement Management Personal Information Google Maps Backups USB Domains Help Desk CrashOverride Flexibility Emergency

      Latest Blog Entry

      Communication is one of the most important parts of running an organization, and this is especially true for smaller organizations that need to work closely in order to make progress. Today’s collaborative workplace is dependent on people understanding a unified message and ...

      Account Login