Network Synergy Blog

Tip of the Week: Getting Back to Email Security Basics

Tip of the Week: Getting Back to Email Security Basics

Email is a particular favorite attack vector of many who would do wrong by your business, as it is easily one of the most used communications in most businesses today. Do your employees know how large of a responsibility they have to your business’ security just by using email? In order to prevent unfortunate security blunders, you need to make sure you and your employees know a few best practices when it comes to handling email securely.

For this week’s tip, we’ll review these best practices.

Passwords
Yes, it can be annoying to have to enter a password everywhere, and yes, it can be hard to remember a different one for every account. However, your employees need to know why they have to deal with these annoyances, too, and why they can’t just use their pet’s name with the year they graduated and call it a day.

The fact of the matter is, too many people want to do just that: significant personal detail, significant number, password done. Cybercriminals know this, and are more than willing to put in the time and effort to find out about one of your employees if it gets them access to a bigger prize. Using social engineering tactics and studying what they can of online activity, these criminals can gain a significant amount of information about your employees (or even you) with relatively little effort. Without better password practices put in place, they could then likely deduce the password of someone in your organization and from there, they’re in… especially if your email password is reused repeatedly to gain access to other facets of the business.

If remembering x-amount of different passwords is a concern, work with your team and implement a password manager, or a program specifically designed to protect passwords and reduce the number that have to be recalled.

Depending on how your company deals with email, for example, if you are using Outlook, your employees probably aren’t typing in their email passwords very often, if at all. This puts the email password even further from top of mind, but it’s important to remember that these passwords need to be changed regularly and kept secure.

2FA, or Two-Factor Authentication
What’s more secure than a password? Two passwords - or at least, a password and an additional code that is generated when an account is being accessed. This is how 2FA works - in addition to their usual password, an employee needs to provide a generated code (usually obtained via their mobile device) in order to access an account. As a result, a hacker who happened to steal some passwords from some database somewhere still wouldn’t have enough information to access your accounts--and because the second piece of authentication is delivered by some other means, like a number generated by an authentication app on the user’s mobile device, the hacker would have that much harder of a time obtaining that as well.

Clicking What Shouldn’t Be Clicked
There is an unfortunate tendency to automatically trust things that come in via our email, whether its an attachment or a link, as these are commonly used avenues for cyberthreats to come in by. This is probably because these attacks can be effective against any level of an organization - an intern could mistakenly let in a threat, as could the president or CEO and anyone in between.

These threats are often known as phishing scams, as the attacker simply casts out their net and waits for someone to take the bait. These scams often leverage emails that include links to quite convincing facsimiles of the site the link purports to direct to. Unfortunately, this only makes phishing a bigger threat.

Another favorite attack like this that cybercriminals like to use is to include a good, old-fashioned virus in an attachment. If you aren’t expecting an attachment in an email, don’t click it! In addition, it always helps to run a quick virus scan if you aren’t sure.

For help in running these scans and maintaining your security, or with any other IT questions you may have, you can always turn to the professionals at Network Synergy. Reach out to us by calling 203.261.2201.

Which is Best for Your Server Needs, In-House or H...
WPA3 is Boosting Network Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 19, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Flexibility Crowdsourcing Ransomware CrashOverride Smart Technology Outsourced IT Social Media Presentation Customer Relationship Management Productivity Phone System Cyberattacks Google PowerPoint Bring Your Own Device Utility Computing Hacks Augmented Reality Virtual Reality MSP Streaming Media Wearable Technology IT Support Two-factor Authentication Spam Web Server Best Available Efficiency Business Owner Relocation Vulnerabilities Telephone Systems Food Google Wallet Files Programming Printers E-Commerce Remote Computing Education Training Work/Life Balance Data Security Logs Operating System Microsoft Excel User Star Wars Antivirus G Suite Money Smartphone Monitoring Regulations Enterprise Resource Planning Avoiding Downtime Government Electronic Medical Records Black Friday Gadget iPhone Miscellaneous Save Money Wireless Distributed Denial of Service Hiring/Firing Administration Point of Sale How To Cameras Technology Laws Humor Travel Tablet Hard Drive Laptop Piracy Windows 8.1 Update Retail Apple Apps Health Tip of the Week Private Cloud Customer Service Assessment Patch Management Network Security Identity Theft Network Management Tech Support IT budget Legal Best Practices Statistics Employee-Employer Relationship Mobile Data Information Technology History Business Growth Tutorials Security Law Firm IT Cortana Automobile Applications Migration Botnet Trending Holiday Virtual Desktop Taxes Fun 3D Printing Unsupported Software communications Webcam Unified Communications Website Managed IT services Features End of Support Hotspot Experience Digital Payment Hacking Computers YouTube Budget Vendor Management Mirgation Business Technology Outlook Cleaning Small Business Computer Care Passwords Redundancy Productivity Read Only Superfish Gadgets Search Mobile Technology Sync Data Breach Server Management WPA3 Social Engineering eBay Physical Security Undo Google Docs Saving Money Computer Repair Fax Server Mobile Device Software Value File Sharing Upgrades Co-managed IT Motion sickness Halloween Hardware Nanotechnology Disaster Resistance Video Surveillance Data Management Unified Threat Management Start Menu Hacker Software as a Service Mobile Computing Recovery Remote Workers Communication Paperless Office Document Management Alt Codes IT Consultant Personal Information Machine Learning Black Market Blockchain 5G Running Cable Supercomputer Dark Web Printing Proactive IT Touchscreen Websites Troubleshooting Remote Monitoring Bandwidth Tracking Drones PC Care Digital Signature Cabling Managing Stress Facebook Comparison Chromebook Disaster Wireless Technology Scam HIPAA Artificial Intelligence Safety Smartphones Identity Maintenance Healthcare Service-based Business IT Solutions Hosted Solutions Virtualization Tip of the Work Specifications Text Messaging Chrome Cables Environment Backups IT service Intranet Mobile Thank You Backup Data Techology Downloads Managed IT Services Servers Entrepreneur Company Culture VoIP CCTV Connectivity Users Cyber Monday Infrastructure Cost Management Conferencing Business Telephony Compliance Windows Business Computing Data Loss Tech Term IP Address Hard Disk Drive Employer-Employee Relationship Skype Application Lenovo Sports Cloud Computing Webinar Risk Management Mobility Network Bitcoin Smart Tech Router Collaboration Internet Exlporer PDF Corporate Profile The Internet of Things Windows 8 Robot Microsoft Internet Windows 10 Modem Politics Mobile Security Managed Service Mobile Devices Management Solid State Drive Google Calendar Access Control Virtual Private Network How To SharePoint Going Green Save Time IBM Twitter IT Technicians Computing Unified Threat Management Data Recovery Managed IT Service Spyware Scheduling Computing Infrastructure Office Internet of Things Wi-Fi Operations Processors Email Buisness Documents Uninterrupted Power Supply Address Debate GPS Mobile Device Management Error Remote Monitoring and Management Staff Tip of the week IT Management Development Social Networking Writing Technology IT Support Refrigeration Network Congestion Wires Display LinkedIn Password Motherboard Downtime Samsung Meetings Macro Competition Public Cloud Congratulations Business Management Battery Identities Crowdfunding Permissions Computer Fraud Knowledge Data Warehousing Mobile Office Proactive Work Station Legislation People Help Desk Trainging Storage Hard Drives Software Tips Hosted Solution Current Events Automation Notifications Office 365 BYOD Public Speaking Upgrade Cryptocurrency eWaste BDR Firefox Cooperation Memory Administrator Computer Accessories Licensing Information Charger Vulnerability Office Tips App Alerts Lithium-ion Battery Heating/Cooling Recycling Technology Tips IT Consulting Cybersecurity Quick Tips Data storage Online Currency Time Management Fleet Tracking Language Screen Reader Remote Support Saving Time Social 3D Mouse Excel SaaS Virus CIO Windows 10 Mail Merge Privacy Gmail Google Drive Break Fix User Tips Net Neutrality Server Business Continuity Regulation Deep Learning Data Backup High-Speed Internet Asset Tracking Networking Chatbots Geography Consumers Managed IT Project Management Multi-Factor Security Workplace Tips Cache Hackers Gaming Console Shortcut USB Printer Word Law Enforcement Enterprise Content Management User Error Encryption Alert Best Practice Secruity IT Services Google Analytics Monitors Emoji Disaster Recovery Bluetooth Malware Cookies Digital Marketing Scary Stories Cybercrime Microsoft Office Content Filtering LiFi OneNote Analyitcs Print Server Business Intelligence VPN Consulting Leadership Inbound Marketing Managed Service Provider Electronic Health Records Domains WiFi IoT Android Typing Staffing Innovation Big Data Phishing Google Maps Browser Managed Services Provider Consultation Cloud Settings Firewall

      Latest Blogs

      You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube