Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Competition User Tips Notifications User Error Computer Care Technology Laws YouTube Windows 10 Assessment BYOD Electronic Medical Records Patch Management BDR Superfish Digital Signature Data Security Healthcare Halloween Government Solid State Drive Network Security Meetings Data Backup Hosted Solution Saving Time Star Wars Refrigeration Black Friday Data Warehousing Remote Support Intranet Storage Business Management IT Solutions Digital Upgrade Politics Samsung Law Enforcement Fun Chatbots Mobile Device Management Permissions Smartphones Streaming Media Business Growth Drones Virtual Reality Sync Small Business Cyber Monday Cloud Computing Holiday CCTV eBay Hiring/Firing Leadership Firefox Bitcoin Windows Gadget Fraud Data Bandwidth LinkedIn Current Events Motherboard Administrator Personal Information Innovation Domains Cooperation Machine Learning Data Breach IT Support Networking Webinar Knowledge Connectivity Hacks IT budget Hard Drive Cryptocurrency Passwords Presentation Troubleshooting Phishing Social Media Microsoft Mouse Address Mail Merge Apps Antivirus Inbound Marketing Tip of the Work Computer Repair Error Recovery iPhone Public Cloud Environment Computers Business Owner Webcam G Suite Document Management PowerPoint Relocation Mobile Technology Applications Telephony Mobile Security Microsoft Office Router Trainging Distributed Denial of Service Tech Term Business Computing Information Technology IT Services Collaboration Save Time Company Culture WiFi Law Firm IT Vulnerability Computing Lenovo Data Loss Communication Malware Identity Theft Telephone Systems Smart Technology Digital Payment Regulations Health Excel Writing Operating System The Internet of Things Artificial Intelligence Computing Infrastructure Automation Recycling Virus Lithium-ion Battery Entrepreneur Hacker Paperless Office Spyware Migration Wi-Fi Access Control Best Practices Managed IT Services Quick Tips Downloads Business Intelligence Budget IT Technicians 3D Printing IT Consulting Apple Licensing CrashOverride Data storage Private Cloud Alert Customer Relationship Management Modem Point of Sale Internet Exlporer Browser Business Vendor Management Best Available Break Fix Print Server Server Management Flexibility Help Desk Social Networking Hacking Two-factor Authentication Statistics Office Mobile Computing Avoiding Downtime Unified Threat Management Cameras Software Botnet Cache Smart Tech Video Surveillance Google Analytics Data Management Business Technology Taxes Outsourced IT Fax Server Technology Tips Monitors Big Data Google Computer Chromebook Co-managed IT SharePoint Tutorials Corporate Profile Risk Management Software as a Service Mobile Office Safety Firewall Outlook Cybercrime Encryption Data Recovery Virtual Private Network Phone System Supercomputer User Congratulations Website Search Workplace Tips Crowdsourcing Staffing Ransomware Application Utility Computing Managed IT Service Blockchain Alerts Automobile HIPAA Save Money Retail Managed IT services Work Station Users App Windows 8 Trending Heating/Cooling Spam Network Management Nanotechnology Backups Service-based Business Employer-Employee Relationship Saving Money Identities Smartphone Unified Communications Servers Network Congestion Identity communications Wireless Technology Motion sickness Typing Legal Debate End of Support Hard Drives Work/Life Balance Tip of the Week Charger Emoji Cortana Wearable Technology Memory Remote Monitoring Cybersecurity Internet Tip of the week Virtual Desktop Documents Disaster Resistance Social Engineering Scary Stories Hosted Solutions Chrome History Uninterrupted Power Supply Google Maps IP Address IT Consultant Consumers Multi-Factor Security Physical Security Backup Printer Mirgation Web Server Productivity Running Cable GPS Consultation Legislation Project Management Cabling Maintenance IT service IBM VPN Server Conferencing Robot SaaS IT Management Programming Unified Threat Management Privacy PDF Infrastructure Piracy 3D USB Black Market Efficiency Facebook Hardware Tech Support Techology Display Cookies Mobile Devices Text Messaging Hackers Office 365 People Food CIO Gmail Public Speaking Processors Bluetooth Going Green Mobility Content Filtering Augmented Reality Value Battery Money Mobile Data Comparison Start Menu Cleaning Social Unsupported Software Screen Reader Office Tips Password Online Currency 5G VoIP Customer Service Undo Staff Remote Computing Proactive IT Upgrades Google Docs Managed Service Provider Computer Accessories Specifications Virtualization How To Redundancy IoT Sports Windows 10 Email Security Compliance PC Care Dark Web Logs Disaster Recovery Cloud Wireless Shortcut Laptop Internet of Things Word Websites Files Marketing Humor Crowdfunding Secruity Administration Hotspot Thank You Google Calendar Downtime Tracking Bring Your Own Device Scheduling Analyitcs Experience Scam Travel Business Continuity Printing LiFi Hard Disk Drive Training Twitter Miscellaneous File Sharing Productivity Cost Management Buisness Gaming Console Network Google Drive Operations Windows 8.1 Update IT Support Technology Microsoft Excel Net Neutrality Settings Deep Learning Skype Disaster Education Touchscreen Tablet Gadgets Time Management Language Macro Managed IT Mobile Device Best Practice Alt Codes Google Wallet Android Software Tips eWaste

      Latest Blogs

      Wi-Fi has been one of the single most useful innovations for the modern office. Connecting to your Internet without having to be physically connected to it via an ethernet wire has...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube