Network Synergy Blog

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

Varieties of Smart Tech to Consider
3 Industries that Smart Technology is Revolutioniz...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, August 17, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Blockchain Recycling Flexibility Trainging Inbound Marketing WiFi Identities Users Identity Consultation Chromebook Training Work Station Cabling PDF Motherboard Paperless Office Disaster Online Currency Scheduling Twitter Technology Tips Cyber Monday Relocation IT Services Start Menu Alt Codes Regulations SaaS Permissions Apple Mobile Device Management Hard Disk Drive Data History File Sharing Avoiding Downtime Save Time LiFi Network Congestion Software Tips Chrome Cortana Distributed Denial of Service Alert Travel Phishing Hosted Solution Cybercrime Tip of the Week Workplace Tips Superfish Operating System Digital Payment Physical Security Application Tip of the Work Miscellaneous Security Shortcut Digital Signature IT budget Current Events Botnet Running Cable Hosted Solutions Data Management Managed Service Provider Passwords Patch Management Tracking Management Intranet IoT Technology Employee-Employer Relationship Cooperation Error Cryptocurrency Utility Computing Network Security Fun Webcam Spam Business Computing Legislation Files Ransomware Telephone Systems Safety Network How To Cables CCTV Analyitcs Uninterrupted Power Supply IT Consultant Mobile Device Vendor Management BDR Tech Term Word Mirgation 5G Risk Management Information Printing Processors PC Care Wireless Technology User Internet of Things Disaster Resistance Wearable Technology Law Enforcement Piracy Wires CIO IBM Secruity Tablet MSP Productivity Google Drive IT Solutions Save Money Windows 8.1 Update Best Available Artificial Intelligence Drones WPA3 Licensing Remote Monitoring and Management Google Calendar Migration Leadership Time Management Food Screen Reader Windows 8 Refrigeration Mobile Office Windows 10 Google Docs Printer Employer-Employee Relationship Gadgets Skype Customer Relationship Management Domains Web Server Entrepreneur IT Support Operations Hotspot Mobility Vulnerability Productivity VPN Automobile IT Management Battery Administrator Websites Supercomputer Connectivity Android Spyware Bandwidth Managed IT services Router VoIP Personal Information Scary Stories Programming Internet Social Video Surveillance Settings Healthcare SharePoint Point of Sale Documents Debate Corporate Profile Fleet Tracking Computing Development Bitcoin Firewall Remote Support Phone System Digital Email Cookies Wi-Fi Business Continuity eWaste Lithium-ion Battery Two-factor Authentication Hacker Break Fix Remote Computing Cleaning Access Control Sports Regulation Customer Service How To Facebook Geography Upgrade Retail Business Owner Office 365 Windows 10 Backup Company Culture Fraud Logs Smart Tech Virus Network Management Samsung Politics Scam High-Speed Internet Office Tips Cloud Computing Excel Buisness OneNote People Star Wars Vulnerabilities Efficiency Text Messaging Browser Business Intelligence Education IT service Holiday Cost Management Laptop Outsourced IT Password Nanotechnology Work/Life Balance Malware Alerts Unified Communications Crowdsourcing YouTube Computer Accessories Staff Unified Threat Management Chatbots Techology Electronic Medical Records Gaming Console Private Cloud PowerPoint Best Practice Computer Repair Collaboration Typing Sync Deep Learning Administration Mobile Technology Upgrades Microsoft Office Microsoft Mail Merge Compliance Business Growth Networking G Suite communications Computer Care Data Backup Address Government Maintenance Office Crowdfunding Telephony Apps Unified Threat Management Specifications Solid State Drive Technology Laws Remote Monitoring Notifications Legal Google Maps Privacy Downloads Mobile Microsoft Excel Software Value Hard Drives Hacking Managing Stress Machine Learning Tutorials Streaming Media Search Macro Gmail Taxes Tip of the week Document Management Virtual Reality Enterprise Content Management Language Cache Outlook Proactive IT Monitoring BYOD Managed IT Troubleshooting 3D Printing Windows Charger Unsupported Software Internet Exlporer Emoji Business Management Heating/Cooling Display Memory Bluetooth Money App Mobile Data Data Breach Server Management Bring Your Own Device Halloween Health Identity Theft Hiring/Firing Data Warehousing Website Hardware Recovery Marketing Data Recovery Help Desk Data Security User Tips HIPAA Quick Tips Monitors USB Remote Workers Saving Money The Internet of Things Law Firm IT Webinar IT Support 3D Computing Infrastructure Google Analytics Managed IT Services Service-based Business Business Mouse Wireless Trending Data Loss Thank You Assessment Information Technology Smartphones Firefox Lenovo Black Friday Social Media Conferencing Budget Virtual Desktop IT Consulting Storage Asset Tracking Fax Server Server Congratulations Smart Technology Small Business Innovation Cloud Writing Encryption Content Filtering Software as a Service Gadget IP Address Environment Going Green Net Neutrality Infrastructure Big Data eBay iPhone Cybersecurity End of Support Social Engineering Data storage Robot Comparison Cameras Tech Support Statistics Presentation Humor Competition Hackers Redundancy Enterprise Resource Planning Disaster Recovery Public Speaking Experience Computer Staffing Computers Communication Public Cloud Saving Time Touchscreen Knowledge Business Technology Servers Multi-Factor Security Mobile Computing Meetings Print Server User Error GPS Virtual Private Network Undo Consumers Augmented Reality IT Technicians Hacks Downtime Managed Service Dark Web LinkedIn Mobile Devices Smartphone Best Practices Black Market Project Management Proactive Applications Virtualization Google Wallet Managed IT Service Modem Mobile Security CrashOverride Social Networking Automation Hard Drive Backups Motion sickness Co-managed IT Antivirus Google

      Latest Blogs

      Every business has some sort of management tasks that requires foresight, and staying up on them can keep headache-inducing situations from constantly causing downtime and costing ...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube