Network Synergy Blog

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

Varieties of Smart Tech to Consider
3 Industries that Smart Technology is Revolutioniz...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 20, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Virtualization MSP eWaste Bandwidth Robot Bluetooth Innovation Excel IT Support Hacking Virtual Reality Passwords Budget Running Cable Cabling Environment Tech Support Servers Intranet Business Owner Content Filtering SaaS Outsourced IT Cryptocurrency Drones Files Software as a Service Touchscreen Data Recovery Superfish Relocation Firewall Business Technology Backups Leadership Humor Work/Life Balance Remote Workers Unified Communications History Fun Read Only Alt Codes Scheduling Scam Infrastructure WiFi Remote Monitoring and Management Cyber Monday Quick Tips Service-based Business Personal Information IT Consultant Network Security Monitors Experience Travel Hardware Hotspot Law Firm IT Printers Patch Management Documents Asset Tracking Mobile Device Managed IT Cookies Mirgation Security Tech Term SharePoint Enterprise Resource Planning Inbound Marketing Licensing Lithium-ion Battery Gaming Console IT Management Managed IT Service Text Messaging Education End of Support Logs Blockchain Distributed Denial of Service Nanotechnology Telephony Retail Managed IT Services Going Green VoIP Google Drive Phone System Regulation Disaster Resistance Display Computing Buisness 5G Black Friday Hard Drives Microsoft Office Computer Best Practice Monitoring G Suite Operating System Storage Artificial Intelligence Email Troubleshooting Data Loss Information Technology Debate Social Managed Service Provider Project Management Competition BYOD Machine Learning Augmented Reality Network Facebook Windows 8 PC Care Comparison Cache Wi-Fi Browser Settings Holiday Vendor Management Windows 10 Productivity Money Outlook Scary Stories Employee-Employer Relationship Presentation PowerPoint Server IP Address Data Cybersecurity Cost Management Google WPA3 Solid State Drive Finance Law Enforcement Healthcare Taxes PDF Start Menu Two-factor Authentication Shortcut Safety Redundancy Favorites Mobile Technology Data Backup Hard Disk Drive Employer-Employee Relationship Tip of the Work Encryption Digital Signature Supercomputer Data Security People Disaster Recovery Users Tip of the week Video Surveillance Office Tips Firefox Data Warehousing Google Calendar Samsung Data Management Geography Recovery Cloud Computing Cooperation File Sharing Entrepreneur Upgrades Avoiding Downtime Technology Tips Mouse Miscellaneous User Crowdfunding Food Computing Infrastructure Piracy Mobile Data Enterprise Content Management Data Breach Refrigeration Google Maps Private Cloud Notifications Hacks Identity Theft User Tips Star Wars Proactive Knowledge Password Fax Server Android IBM Business Computing Company Culture Management Digital Online Currency Smartphone Network Management Physical Security Typing Unified Threat Management Applications Dark Web Wires Save Time Mobile Security Techology Mobile Device Management Social Networking Webinar Address Permissions Social Media Productivity Microsoft Router User Error CIO Computer Care Thank You Wireless Technology Vulnerability Consulting Current Events High-Speed Internet Document Management Meetings Bring Your Own Device IT service App Marketing Managed IT services Work Station Cameras Gmail Emoji Business Management Malware Maintenance Wireless Tablet Staffing Hosted Solutions Co-managed IT Google Wallet IT Consulting Connectivity Streaming Media Website Webcam Tracking Tip of the Week Bookmarks Smart Technology Specifications Sports 3D Printing Internet of Things Business Intelligence Hosted Solution Google Analytics E-Commerce Compliance Trending Lenovo Print Server Efficiency Spam Black Market Remote Support Battery Congratulations Microsoft Excel Sync Electronic Medical Records Bitcoin Hacker Internet Multi-Factor Security Motion sickness Halloween Administration Operations Upgrade Mobile Devices Help Desk Cortana Government Migration Smart Tech Mail Merge Business Continuity Office 365 Health Motherboard The Internet of Things Fraud Proactive IT Politics IT Solutions Phishing Disaster Features Regulations Virus Spyware Instant Messaging Backup Macro Windows 8.1 Update Risk Management Domains Word Legislation Saving Time Assessment CCTV Google Docs Laptop Gadget Vulnerabilities Automation Managing Stress Communication Printer Chromebook Computer Repair Conferencing Remote Monitoring 3D Ransomware Training Paperless Office Telephone Systems communications Digital Payment Mobile Data storage LiFi Workplace Tips VPN Virtual Private Network Administrator Screen Reader Technology Unsupported Software Deep Learning Processors Chatbots IT Support IT budget Twitter Gadgets Unified Threat Management Downtime Trainging Writing Legal Computers Programming BDR Hiring/Firing Break Fix Cleaning Automobile Customer Relationship Management Printing Error IT Services Software Cybercrime USB YouTube Crowdsourcing Technology Laws Windows Point of Sale Information Small Business Heating/Cooling Office Alerts Best Practices CrashOverride Virtual Desktop Cables Apps Public Speaking Time Management Corporate Profile Managed Services Provider Fleet Tracking Downloads Internet Exlporer Collaboration LinkedIn Utility Computing IoT Antivirus Search Business Growth Botnet Hard Drive Recycling Tutorials Windows 10 Hackers OneNote Statistics iPhone Software Tips Access Control Cloud Remote Computing Mobile Office Identity Best Available Managed Service Web Server Save Money Secruity Chrome eBay Alert Net Neutrality IT Technicians Mobility Value Big Data Cyberattacks Identities Modem Consumers GPS Network Congestion Memory Electronic Health Records Flexibility Smartphones Development HIPAA Analyitcs Skype Apple How To Charger Computer Accessories How To Public Cloud Social Engineering Language Uninterrupted Power Supply Staff Networking Wearable Technology Websites Server Management Undo Privacy Customer Service Consultation Business Application Mobile Computing Saving Money

      Latest Blogs

      The cloud is such an important part of today’s business environment that most organizations use it to some extent, even if it’s just for basic storage needs. However, the cloud nee...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube