Network Synergy Blog

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

Varieties of Smart Tech to Consider
3 Industries that Smart Technology is Revolutioniz...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, October 22, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Managed Service Provider Notifications Upgrade WiFi Mirgation Save Time Marketing Customer Service Entrepreneur Knowledge Work Station Wearable Technology Mobile Security Encryption Hacks Cabling Tracking Google Retail Apple Monitoring Cyberattacks Corporate Profile Electronic Medical Records Proactive IT Personal Information Budget Internet of Things Windows 10 Outlook Leadership Malware Utility Computing Digital Firewall Tablet IT budget Hosted Solution Politics Cost Management Redundancy Language SaaS Food Business Owner Unsupported Software Analyitcs Apps Applications Browser Risk Management User Competition Workplace Tips Saving Money Crowdfunding Video Surveillance Trainging Law Firm IT Shortcut Screen Reader Settings Black Friday Office Tips Specifications Technology Data Breach Data Security iPhone Public Speaking Nanotechnology Best Practice Augmented Reality Favorites Processors Operating System Web Server Mobile Device Hiring/Firing Motion sickness Gmail Google Analytics Chrome Twitter Computer Money Managing Stress Wireless Time Management Website Chatbots eWaste Private Cloud Microsoft Excel Upgrades Artificial Intelligence Document Management Windows Law Enforcement Presentation Mobile Big Data Hard Drives Public Cloud Bandwidth Macro Training Cloud 5G Remote Computing Mobile Device Management Work/Life Balance Social Engineering Fraud Access Control Solid State Drive Save Money Data Warehousing IT Technicians Recycling MSP Digital Payment Inbound Marketing Text Messaging Telephone Systems CIO Address Printer Windows 8 Downtime Cybersecurity Operations Bookmarks Managed IT services Typing IT Services Mobile Data Disaster Environment Finance Business IT Consulting Legal Cameras Users Printers Uninterrupted Power Supply Wires Logs Point of Sale BDR Deep Learning Consultation Data Backup Licensing IT Management Google Calendar Excel Humor Writing Botnet Proactive Memory Administrator Printing Infrastructure Alert High-Speed Internet Tutorials Smartphones User Tips Tech Support Internet Exlporer Vulnerability LinkedIn Networking G Suite Productivity Error Data Administration Gadget Mobile Office Congratulations Saving Time Small Business Business Management Servers Display Cyber Monday Scam Internet Scary Stories Alerts Fun Scheduling Computer Repair Outsourced IT The Internet of Things Employer-Employee Relationship Communication Net Neutrality Mobile Computing Remote Monitoring Cables Miscellaneous Computer Accessories Domains Technology Laws OneNote Touchscreen Social Company Culture Business Continuity Hosted Solutions Undo Machine Learning Google Maps Efficiency Features Bring Your Own Device Innovation HIPAA Hard Disk Drive Cortana PowerPoint Hacking File Sharing Mail Merge Hard Drive Business Intelligence IBM Office 365 Intranet Storage Business Growth Digital Signature Cleaning IoT Collaboration Supercomputer Identity Education 3D Enterprise Resource Planning Identities SharePoint Monitors App USB Customer Relationship Management Enterprise Content Management WPA3 Relocation Physical Security Distributed Denial of Service Tip of the Work Consumers Robot Smartphone Business Computing Identity Theft Webinar Multi-Factor Security Windows 8.1 Update Travel Staffing Connectivity Email Online Currency Compliance Data Loss Router Facebook Consulting Hacker Network Security Telephony Health Best Available Refrigeration IT Solutions Laptop Ransomware Mobile Devices Permissions Managed Service CrashOverride Hackers Search Bluetooth Content Filtering Smart Technology History Websites Remote Support Staff Data storage Security Mobile Technology Safety Spyware Automation Mobility Development Buisness Microsoft Office Geography Instant Messaging eBay Best Practices How To Avoiding Downtime Thank You Co-managed IT Phone System Information Technology GPS Remote Workers Cryptocurrency Start Menu Cookies Read Only Google Wallet Word IT Support BYOD Documents Network Congestion Computers Taxes Backups Maintenance Virtual Reality Webcam Vulnerabilities Print Server Data Management Productivity Cybercrime Legislation Unified Communications Crowdsourcing Comparison Unified Threat Management Emoji YouTube Sports Government Holiday Two-factor Authentication Meetings Social Media Quick Tips Patch Management Management Computing Assessment Streaming Media IP Address Service-based Business Android Virtualization PDF Programming Social Networking Google Drive IT Consultant Google Docs Information Managed Services Provider Computer Care VPN Data Recovery Dark Web Software Tips Spam Fax Server Recovery Disaster Resistance Gadgets Cloud Computing Passwords Going Green Blockchain Lenovo IT Support Hotspot Superfish Motherboard Modem Employee-Employer Relationship User Error Business Technology Skype Help Desk Electronic Health Records Technology Tips Windows 10 CCTV Regulation LiFi Mouse Star Wars Asset Tracking Network Management Downloads Bitcoin Files Disaster Recovery Managed IT Services Halloween End of Support Unified Threat Management Tech Term Debate Chromebook Running Cable Fleet Tracking Software as a Service Current Events Wireless Technology Hardware Microsoft Regulations PC Care Cooperation Tip of the Week Sync People Black Market communications Troubleshooting Alt Codes Server Management How To Managed IT Office Antivirus Automobile Samsung Trending Techology E-Commerce Conferencing Charger Network Smart Tech Phishing Firefox Flexibility Paperless Office Virtual Desktop IT service Vendor Management Heating/Cooling Drones Cache Healthcare Lithium-ion Battery Virus Managed IT Service Experience Wi-Fi Piracy Application VoIP Gaming Console Computing Infrastructure Backup Secruity Break Fix Battery Remote Monitoring and Management Migration 3D Printing Virtual Private Network Statistics Project Management Privacy Software Password Server Value Tip of the week

      Latest Blogs

      Once thought to just be a cool feature of the Internet--or the entirety of the Internet to your Great Aunt Maddie--instant messaging has a long history on the web. In fact, one cou...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube