Network Synergy Blog

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

Varieties of Smart Tech to Consider
3 Industries that Smart Technology is Revolutioniz...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, August 19, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Staffing Hiring/Firing Google Drive Budget SharePoint Access Control Windows 8 Break Fix Business Management Network Security Managed Service Provider HIPAA Business Growth Service-based Business Managed IT services Compliance Computing Chatbots Net Neutrality Corporate Profile Knowledge Public Speaking Software as a Service Bitcoin Privacy Infrastructure Redundancy Hacking Buisness Hard Drive Lithium-ion Battery Inbound Marketing Law Firm IT Piracy Email Experience YouTube Charger Mouse Company Culture Smart Tech Education Augmented Reality Microsoft Excel CCTV Time Management 3D Vendor Management Employee-Employer Relationship BDR Hosted Solution Save Money Point of Sale Dark Web Thank You Distributed Denial of Service Solid State Drive How To Remote Monitoring Identity Theft IT Technicians Windows Cooperation Refrigeration High-Speed Internet Undo Humor Regulations Politics Troubleshooting Wearable Technology Social Engineering Programming Bring Your Own Device Streaming Media Backups Management Spyware Efficiency Fax Server Drones Phishing Going Green Language Unified Communications Virtualization Legislation Cloud Computing Technology Retail Start Menu Data Physical Security Deep Learning Law Enforcement Unsupported Software Consumers Google Wallet Gmail eBay Virtual Private Network Wireless Technology 5G Leadership IT Support Computer Productivity Cameras VPN Government Internet Training Personal Information End of Support Monitors Data storage Motion sickness Upgrade Business Technology Big Data Internet of Things Firefox Hotspot Star Wars Mobile Device Patch Management Mobile Technology Tip of the week Software Tips Samsung Outsourced IT Small Business Operating System Healthcare Crowdfunding Tutorials eWaste Applications Smartphones Data Recovery WPA3 Firewall Asset Tracking OneNote Operations Memory Comparison Antivirus Webcam Spam Print Server Monitoring Best Practice Computing Infrastructure Best Available Safety CIO Phone System Data Management Information Servers Logs App Server Management Ransomware Telephony Information Technology Encryption IT service Specifications Online Currency VoIP Identities Lenovo Telephone Systems Mobile Device Management Connectivity Vulnerabilities Managing Stress USB Gadget Modem Cybersecurity Fun File Sharing Social Media Secruity Disaster Recovery Screen Reader Content Filtering Automobile Apple Marketing Debate Bluetooth Excel Downtime Printing Processors Battery IT Services Macro Mobile Computing Administrator Techology Smart Technology Money Work/Life Balance Browser History Proactive Scary Stories Remote Computing Alerts Cyber Monday Document Management Bandwidth Proactive IT IT Solutions Writing Social Networking Chromebook User Tips Networking PDF Facebook Text Messaging Network MSP Hardware Computer Accessories Sports Hacker Data Security Halloween Cookies Miscellaneous Technology Laws Blockchain WiFi Server Relocation Mobile Office IBM Statistics Communication Private Cloud Password Project Management Maintenance Taxes Tracking Enterprise Resource Planning Typing Outlook Virus Automation Smartphone Utility Computing Cache Cabling IT Management Cost Management Mail Merge Chrome Administration Running Cable Cortana Legal Websites Best Practices Paperless Office Fleet Tracking Business Flexibility Health Current Events SaaS Black Market Remote Monitoring and Management Development Display Tech Support Laptop IT Consultant Google Analytics communications Printer Travel Hackers Gadgets Windows 10 Address Recovery Tip of the Week Skype Wireless Digital Mirgation Trainging PC Care Hard Disk Drive Word Supercomputer Save Time The Internet of Things Multi-Factor Security Office Tips Customer Service Settings Digital Payment Workplace Tips iPhone IT Consulting CrashOverride Disaster Resistance Google Calendar Remote Support Artificial Intelligence Regulation Enterprise Content Management Unified Threat Management Video Surveillance Search Mobility Robot Vulnerability Hosted Solutions Twitter Wires IT Support Software BYOD Customer Relationship Management Business Continuity Managed IT Digital Signature Consultation Mobile Devices Managed Service Business Computing Application Managed IT Service Notifications People Avoiding Downtime Disaster Mobile Cables Cybercrime Office Saving Time Black Friday 3D Printing Data Warehousing Uninterrupted Power Supply Domains Identity Migration Congratulations Superfish Entrepreneur LinkedIn Intranet Network Management Data Breach Unified Threat Management Quick Tips Innovation Storage Machine Learning Social Android Data Loss Downloads Recycling Touchscreen Microsoft Office Virtual Reality Co-managed IT Mobile Security Windows 8.1 Update Website Scheduling Router User Error Assessment Tablet Value Alert IT budget Technology Tips Employer-Employee Relationship Productivity Emoji Internet Exlporer Google Docs Analyitcs Environment Virtual Desktop Computers Hacks IoT Error Trending Motherboard Alt Codes Sync Heating/Cooling PowerPoint Google Risk Management Conferencing Saving Money Network Congestion Crowdsourcing Upgrades Business Owner Geography Remote Workers Cloud Computer Care Tech Term Electronic Medical Records Cleaning Holiday Backup Windows 10 Data Backup Competition Documents Web Server How To IP Address Scam Apps Office 365 Mobile Data Food Collaboration Meetings Malware G Suite Staff Presentation Passwords Fraud Work Station Nanotechnology Licensing Google Maps Computer Repair Hard Drives Microsoft LiFi Users Security Help Desk Tip of the Work Two-factor Authentication GPS Managed IT Services Business Intelligence User Files Shortcut Wi-Fi Public Cloud Permissions Webinar Cryptocurrency Gaming Console Botnet

      Latest Blogs

      Every business has some sort of management tasks that requires foresight, and staying up on them can keep headache-inducing situations from constantly causing downtime and costing ...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube