Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 26 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Computer Repair Phishing Phone System PC Care Start Menu Nanotechnology Websites Best Practices VPN Scam Big Data Vulnerability Work Station Competition Mobile Devices Recycling Office Tips PowerPoint Bitcoin Training Undo Consumers Backup Backups Social Networking Save Time IT Consulting Entrepreneur Debate Taxes Macro Gmail Monitors Google Gaming Console Solid State Drive Statistics Shortcut Cyber Monday App CIO Google Docs Budget Knowledge Telephone Systems Break Fix Cameras Alerts The Internet of Things YouTube Hosted Solution Password File Sharing Halloween Document Management Supercomputer Social Risk Management Android Collaboration Sync Bluetooth IT Consultant Cache IT Support Data Backup Smartphones Cloud Computing Language Tutorials Proactive IT Best Practice Analyitcs Superfish Presentation BYOD Application Typing G Suite Maintenance Computer Accessories End of Support Service-based Business Server Redundancy Memory Crowdsourcing Environment Data Loss Tracking Outsourced IT Virtual Private Network Tech Support Computer Care Smart Technology Hiring/Firing Compliance Managed IT services Mobile Computing Humor Network Congestion iPhone Miscellaneous Tip of the Week Address User Tips Skype Information Technology Smart Tech People Alt Codes Storage Sports Remote Monitoring Battery Government Trainging Managed IT Webinar Apps Operating System Logs Data Recovery Consultation Company Culture Office 365 Hotspot Private Cloud Specifications Router Social Media Congratulations Productivity Co-managed IT Law Enforcement Best Available PDF Mobile Security Search Connectivity Virtualization Windows 10 eWaste Technology Tips Software as a Service Personal Information Secruity Alert Virtual Reality Healthcare Managed Service Provider Settings IT Management Data storage Writing How To Office Communication Mobility Business Computing Piracy Experience Modem Text Messaging 5G Blockchain Tablet Print Server Cabling Chromebook Technology Server Management IP Address History Identity Saving Time Chatbots Cortana Unified Threat Management Data Breach Drones Documents Wi-Fi Regulations Meetings Streaming Media Two-factor Authentication Wireless Technology Marketing Network Management Business Growth Microsoft Excel Windows 8.1 Update Uninterrupted Power Supply Customer Service Business Continuity Cooperation Hosted Solutions Webcam Tech Term Quick Tips Botnet Business Owner Identities CrashOverride Disaster Recovery Files Data Warehousing Bring Your Own Device Employer-Employee Relationship Recovery IT service Mobile Device eBay Bandwidth Cloud Utility Computing Computing Infrastructure Outlook Distributed Denial of Service Hacking Cost Management Domains Remote Computing Firewall Fax Server Work/Life Balance Tip of the Work Remote Support Hackers Inbound Marketing Internet of Things Buisness Digital Signature GPS Malware Google Calendar Mirgation Patch Management Project Management Staff Health Upgrades Education Permissions Small Business IT budget Intranet Business Management Error Flexibility Spyware LiFi Conferencing 3D Printing Unsupported Software Heating/Cooling Motion sickness Politics Website Business Intelligence Hardware Google Drive Efficiency Software Tips Processors Money Productivity Going Green BDR SharePoint Gadget Antivirus Black Market Passwords Licensing Email Mail Merge Administrator Web Server IT Services Scary Stories Time Management Electronic Medical Records Privacy Internet Hacker Google Analytics Assessment User Physical Security Help Desk Staffing Cleaning Mobile Data Wearable Technology Corporate Profile Browser Current Events Hacks Techology Social Engineering Motherboard CCTV Printing Touchscreen Smartphone Artificial Intelligence Value Star Wars Users Technology Laws Refrigeration Augmented Reality SaaS IBM Content Filtering Travel Safety Business Unified Communications Access Control Black Friday Trending Apple Emoji Tip of the week Software Digital Payment Google Maps Windows 10 Microsoft Saving Money Networking Legal Running Cable Workplace Tips Laptop Mobile Device Management Downtime Net Neutrality Samsung HIPAA Avoiding Downtime IT Solutions Public Cloud Screen Reader WiFi Deep Learning Administration VoIP Cybercrime Security Applications communications Facebook Microsoft Office Innovation Scheduling Automation Chrome Leadership Retail Computers Printer Fraud Excel Lenovo IoT Twitter Network Fun Troubleshooting Thank You Windows 8 Ransomware Online Currency Machine Learning Data Unified Threat Management Managed IT Services Disaster Resistance Legislation Food Hard Drives Computing Lithium-ion Battery Dark Web Comparison Vendor Management LinkedIn Cryptocurrency Mouse Infrastructure Network Security Operations Multi-Factor Security IT Technicians Word Law Firm IT Customer Relationship Management User Error Migration Telephony Firefox Notifications Gadgets Video Surveillance Save Money Wireless IT Support USB Digital Virus Disaster Business Technology Charger Data Management Mobile Technology Hard Disk Drive Programming Identity Theft Relocation Hard Drive Point of Sale Paperless Office Data Security Holiday Display Google Wallet Downloads Upgrade 3D Encryption Computer Spam Automobile Crowdfunding Managed IT Service Virtual Desktop Mobile Office Cybersecurity Windows Cookies Internet Exlporer Robot Servers Public Speaking

      Latest Blogs

      Nothing lasts forever - especially your business’ technology. However, you shouldn’t just get rid of your old technology willy-nilly. This is mostly for two reasons: one, many of t...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube