Network Synergy Blog

Tip of the Week: Getting Back to Email Security Basics

Tip of the Week: Getting Back to Email Security Basics

Email is a particular favorite attack vector of many who would do wrong by your business, as it is easily one of the most used communications in most businesses today. Do your employees know how large of a responsibility they have to your business’ security just by using email? In order to prevent unfortunate security blunders, you need to make sure you and your employees know a few best practices when it comes to handling email securely.

For this week’s tip, we’ll review these best practices.

Passwords
Yes, it can be annoying to have to enter a password everywhere, and yes, it can be hard to remember a different one for every account. However, your employees need to know why they have to deal with these annoyances, too, and why they can’t just use their pet’s name with the year they graduated and call it a day.

The fact of the matter is, too many people want to do just that: significant personal detail, significant number, password done. Cybercriminals know this, and are more than willing to put in the time and effort to find out about one of your employees if it gets them access to a bigger prize. Using social engineering tactics and studying what they can of online activity, these criminals can gain a significant amount of information about your employees (or even you) with relatively little effort. Without better password practices put in place, they could then likely deduce the password of someone in your organization and from there, they’re in… especially if your email password is reused repeatedly to gain access to other facets of the business.

If remembering x-amount of different passwords is a concern, work with your team and implement a password manager, or a program specifically designed to protect passwords and reduce the number that have to be recalled.

Depending on how your company deals with email, for example, if you are using Outlook, your employees probably aren’t typing in their email passwords very often, if at all. This puts the email password even further from top of mind, but it’s important to remember that these passwords need to be changed regularly and kept secure.

2FA, or Two-Factor Authentication
What’s more secure than a password? Two passwords - or at least, a password and an additional code that is generated when an account is being accessed. This is how 2FA works - in addition to their usual password, an employee needs to provide a generated code (usually obtained via their mobile device) in order to access an account. As a result, a hacker who happened to steal some passwords from some database somewhere still wouldn’t have enough information to access your accounts--and because the second piece of authentication is delivered by some other means, like a number generated by an authentication app on the user’s mobile device, the hacker would have that much harder of a time obtaining that as well.

Clicking What Shouldn’t Be Clicked
There is an unfortunate tendency to automatically trust things that come in via our email, whether its an attachment or a link, as these are commonly used avenues for cyberthreats to come in by. This is probably because these attacks can be effective against any level of an organization - an intern could mistakenly let in a threat, as could the president or CEO and anyone in between.

These threats are often known as phishing scams, as the attacker simply casts out their net and waits for someone to take the bait. These scams often leverage emails that include links to quite convincing facsimiles of the site the link purports to direct to. Unfortunately, this only makes phishing a bigger threat.

Another favorite attack like this that cybercriminals like to use is to include a good, old-fashioned virus in an attachment. If you aren’t expecting an attachment in an email, don’t click it! In addition, it always helps to run a quick virus scan if you aren’t sure.

For help in running these scans and maintaining your security, or with any other IT questions you may have, you can always turn to the professionals at Network Synergy. Reach out to us by calling 203.261.2201.

Which is Best for Your Server Needs, In-House or H...
WPA3 is Boosting Network Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, November 18, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Outsourced IT Hiring/Firing Computer Repair Artificial Intelligence Tablet The Internet of Things Shortcut Wireless Regulations Retail MSP Business Computing Social Media Network Electronic Medical Records Running Cable Work/Life Balance Wires Piracy Statistics Relocation VoIP Applications Employer-Employee Relationship Black Friday Cookies Hosted Solutions Flexibility Licensing Test 5G IT Technicians Cryptocurrency Cybersecurity Marketing BYOD Hard Drive Data Loss Alt Codes Presentation Education Technology SaaS Document Management Writing Printers Online Currency Robot Mouse IT Consulting Google Drive Disaster Computer Care IoT Legal Office 365 CIO Saving Time Address eBay Data Warehousing Collaboration HIPAA Computing Infrastructure Big Data Business Intelligence Environment Tip of the Week Unified Communications Current Events Consultation IT Solutions Law Enforcement Save Money Printing Password Office Tips Scary Stories Wireless Technology Distributed Denial of Service Proactive IT Touchscreen Virtual Desktop Augmented Reality OneNote Hardware Google Analytics Mobile Work Station IT Management Unsupported Software Downtime Saving Money IT Support Best Practice Troubleshooting Cybercrime Scam Virtualization How To Politics Virtual Private Network Crowdfunding Webcam Access Control Business Growth Assessment Internet Compliance Going Green Computer User Smart Tech Food Instant Messaging Digital Payment Hacks Programming Deep Learning Blockchain Vulnerability Excel Processors Safety Productivity Application Miscellaneous Sports LiFi Bitcoin Internet Exlporer Disaster Recovery Phone System Smart Technology Data Security Firefox Memory Managed IT services Features Mail Merge PowerPoint Communication Customer Relationship Management Telephony App Fax Server Cameras RMM Project Management Public Cloud File Sharing Data Breach How To Remote Workers Domains Backup Inbound Marketing Router Employee-Employer Relationship Screen Reader Windows 8.1 Update Administrator CCTV Best Practices Cloud Computing Text Messaging Bring Your Own Device Business Management Quick Tips Private Cloud Company Culture Windows 8 Finance Motherboard Tip of the week Users Technology Laws Hotspot Holiday Operating System Vulnerabilities Health Cloud IP Address Mobile Technology Samsung Hard Disk Drive User Tips G Suite Vendor Management Virus Android Administration GPS Notifications Logs Managed Services Provider Time Management Experience Secruity Word Webinar Analyitcs Dark Web Upgrades Security Best Available Redundancy Servers Outlook Business Owner Lenovo Office 3D Humor Mobile Security Tech Support Automobile Website Geography Content Filtering Unified Threat Management Staffing Risk Management Laptop Corporate Profile Data Recovery Service-based Business Staff Mobile Computing Error Internet of Things Cyberattacks Disaster Resistance Congratulations Management Backup and Disaster Recovery Windows Hackers Budget Techology Information Technology Cooperation Paperless Office Gmail Documents Spam Avoiding Downtime Scheduling WiFi Public Speaking Display Help Desk Google Docs Gadgets Social Engineering Apple Managed Service Provider LinkedIn Migration Point of Sale People Sync Smartphones Phishing Encryption Buisness Recovery Social Networking Training Star Wars Privacy Computer Accessories Files IT Services SharePoint Heating/Cooling Business Permission Wearable Technology Cleaning CrashOverride Google Calendar Undo Healthcare Mobile Devices History Chrome Thank You Identity Theft Zero-Day Threat VPN Small Business Telephone Systems Virtual Reality Recycling Data storage Specifications WPA3 Tutorials communications Windows 10 Regulation Cost Management Macro Identities Chatbots Mobile Data Hard Drives Tip of the Work Consulting Co-managed IT Print Server Bluetooth Net Neutrality Software as a Service Botnet Google Wallet End of Support Human Error Travel Monitoring Favorites Cyber Monday Halloween Break Fix Knowledge Remote Monitoring and Management Digital Signature Mirgation Video Surveillance Network Management Electronic Health Records Permissions Cables Websites iPhone Email Enterprise Content Management Value IBM Alert Spyware E-Commerce Drones Business Continuity Bookmarks Supercomputer Gaming Console Motion sickness Efficiency Computing BDR Networking Two-factor Authentication Data Backup Information Social Read Only Printer USB Fleet Tracking Legislation Cache Government Comparison Google Maps Entrepreneur Crowdsourcing Alerts Cabling Uninterrupted Power Supply Ransomware IT budget Software Modem Remote Computing Typing Conferencing Money IT service Network Security Firewall Hacker Hacking Personal Information Windows 10 IT Consultant Law Firm IT Data Management Customer Service Black Market Machine Learning Smartphone Digital YouTube Infrastructure Maintenance Proactive Language Mobility Managing Stress Meetings Unified Threat Management Storage Upgrade Network Congestion Charger Twitter Server Management Tech Term Malware PC Care Remote Support Apps Workplace Tips Multi-Factor Security Superfish Fun Asset Tracking PDF Lithium-ion Battery Managed IT Development Operations Patch Management Physical Security eWaste Microsoft Excel Microsoft Passwords Technology Tips Automation Business Technology Facebook Fraud Cortana Mobile Device Management Enterprise Resource Planning Search Authentication Emoji Leadership High-Speed Internet Managed IT Services Hosted Solution Mobile Office Bandwidth Backups Managed IT Service Software Tips Battery Taxes Tracking Trending Productivity Web Server Solid State Drive Settings Start Menu Identity Debate Save Time Monitors Skype Server Microsoft Office Browser Wi-Fi Downloads Consumers IT Support Managed Service Chromebook 3D Printing Data Innovation Nanotechnology Gadget User Error Remote Monitoring Streaming Media Utility Computing Computers Trainging Authorization Employees Google Intranet Connectivity Antivirus Mobile Device Refrigeration Competition

      Latest Blogs

      With so many people depending on the Internet for a litany of reasons, there might not be the general acknowledgment of just how powerful the ubiquitous use of the Internet really ...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube