Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Symmetric Engineering Group Blogs

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

Varieties of Smart Tech to Consider
3 Industries that Smart Technology is Revolutioniz...


Already Registered? Login Here
No comments made yet. Be the first to submit a comment


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Best Practices Managed IT Services Cloud Technology IT Infrastructure Management Email Privacy IT Companies in Tampa Business Computing Business Continuity Malware Hackers Internet IT Support Services Business Mobility Hosted Solutions Business IT Solutions Microsoft I.T. Management IT Professional Services Productivity Software Managed Service Provider Business Custom Business Solutions Mobile Devices Outsourced IT IT Business Solutions Data Backup Computer Business Applications Data Network Security IT Management Ransomware Technology Consultants Tech Term Managed IT Service Business IT Support Managed IT Windows 10 Data Recovery Managed IT Service in Florida Android Internet of Things Windows Google I.T. Support Managed Services in Florida Communication IT Support Services in Tampa Backup Disaster Recovery Cloud Computing User Tips IT Risk Management I.T. Services Dynamic Solutions Browser Data Management Innovation IT Outsourcing in Tampa Smartphone IT Services in Florida Hardware Remote Monitoring IT Service IT Support Productivity IT Support in Tampa Gmail Encryption Managed Services Small Business Smartphones IT Managed Services Holiday Cybersecurity Workplace Tips Server Artificial Intelligence Network Microsoft Office Upgrade BYOD Managed Services in Tampa Bay App Social Media Office 365 Mobile Device Management Collaboration IT Services in Tampa Vendor Management Save Money Mobile Device Tech Companies in Tampa Paperless Office Applications Tampa IT Support Unified Threat Management Passwords Phishing Business Management Efficiency Firewall IT Service Management Data Computer Services Content Filtering IT Company Business Plan Customer Relationship Management Apple Bandwidth Facebook Compliance IT Vendor Management IT Outsourcing Business IT Support Services Risk Management VoIP Antivirus Website Chrome Small Business IT Solutions Operating System Infrastructure Word Two-factor Authentication Tip of the week Computer Networking Managed Service in Tampa BDR Bring Your Own Device IT Outsourcing in Florida IT solutions Document Management Telephone Systems Miscellaneous Data loss Data Security Unified Communications Project Management Managed Service Big Data Data storage Settings Vulnerability Router The Internet of Things Managed IT Services SaaS Saving Money Remote Computing Government Wireless Technology Employer-Employee Relationship Analytics Mobile Computing Storage Regulations Retail WiFi Windows 10 Wi-Fi IT Management Services IT Company Hosted Solution Money Computer Hardware Repair Automation Robot Redundancy Help Desk Spam End of Support I.T. Company Smart Technology Apps How To Patch Management Computer Networking Services Budget User Error Alert Business Application Digital Payment Server Management Virtual Reality Blockchain Flexibility Network Management Computing IT Companies in Florida Recovery Presentation Information Technology Solid State Drive Network Congestion VPN LiFi Tablet IBM Augmented Reality Laptop Wireless Assessment Monitors Virtual Private Network Managed IT Outsourcing IT Consulting Maintenance Business Technology Training Customer Service Administration Mobility Business Continuity Services IoT HIPAA Virtual Desktop IT Support Helpdesk File Sharing Scam Internet Exlporer Outlook Microsoft Virtual Server Hosting in Tampa and Florida Office Uninterrupted Power Supply IT Management Service Quick Tips Net Neutrality YouTube Virtualization Office Tips Licensing Google Drive Computer Support Mobile Security Search communications Computer Network Services Mouse Jobs Hard Disk Drive Microsoft Excel Wires Public Speaking Time Management Network Support in Florida Mobile Device Managment Disaster Downloads Healthcare Avoiding Downtime Mirgation Scary Stories IT Service in Tampa Google Docs Vulnerabilities Screen Reader Intranet Users Service IT Social IT Managed Service in Tampa Technology Laws Heating/Cooling Staff Remote Workers Identities Computers Business IT Solutions Software Tips IT Company in Tampa Healthcare IT Websites Hotspot WPA3 Save Time Tech Company in Tampa Black Friday Enterprise Resource Planning Motherboard Computer Repair Cryptocurrency Humor Politics Programming Identity Theft Gadgets Multi-Factor Security Hard Drive Migration USB Sports Distributed Denial of Service Geography Smart Tech Safety Marketing IT Solutions for Small Business Computer Care Firefox IT Tech Support Hacks Help Desk Support in Tampa Unified Threat Management Operations Display Full Service IT Cyber Monday Mobile Cost Management VoIP Managed Service in Florida Techology Language Fleet Tracking Cortana Statistics Backups Data Technology Bitcoin Lenovo Tech Support Permissions Education Touchscreen Google Wallet G Suite Google Calendar Cache Chatbots Server Hosting in Tampa Business Continuity Service Providers Health Break Fix High-Speed Internet Connectivity Microsoft Affiliate Program Technology Consulting Firms Current Events Help Desk Support Automobile Printer Wearable Technology Alt Codes Cabling Company Culture Modem Digital Machine Learning Disaster Resistance Password Computing Infrastructure Asset Tracking Knowledge Google Maps Bluetooth Information Technology Consulting Legal Buisness Writing Windows 8 Professional Service Superfish Fraud MSP Fun Server Hosting in Florida Drones Legislation Recycling Hacking Identity Mail Merge Dark Web Development Microsoft Business Solutions Consultation Going Green Access Control Star Wars Typing Software as a Service Managing Stress Undo Cookies Hacker Downtime Dark Data Spyware Top IT Outsourcing Company IT Support Companies in Tampa Proactive IT Alerts OneNote Experience Deep Learning IT Consulting Services Samsung Trending Social Engineering Corporate Profile Chromebook IT Managed Service Provider Proactive Tampa IT Services Managed it Services in Tampa Travel Comparison eWaste Address Server Hosting IT Consulting Service Data Warehousing Cables Domains Co-managed IT Printing IT Vendor Management in Tampa Sync History SharePoint Utility Computing User IT Technicians Halloween Careers Business Growth Technology Tips Enterprise Content Management Competition Nanotechnology Consulting Services IT Support and Solutions Data Breach Best Practice Cooperation Employee-Employer Relationship Health Care IT Services Shortcut Application CIO WannaCry Managed Services in Floirda Files Networking Remote Monitoring and Management Outsourced Computer Support Servers Managed Service Providers Digital Signature Specifications Management Hard Drives Social Networking Gadget Mobile Office 3D Printing Cleaning Error Hiring/Firing Meetings IT Consultant Refrigeration Electronic Medical Records Lithium-ion Battery Crowdsourcing Public Cloud Information Cameras Botnet Twitter Webcam Emergency Telephony Regulation Thank You Unsupported Software Staffing Cybercrime Saving Time CCTV Emoji Physical Security Processors Point of Sale Update Black Market Managed Servers Work/Life Balance Congratulations Mobile Data GPS Business Appplications Administrator Running Cable Personal Information Virus How To Taxes Relocation Web Server Supercomputer Law Enforcement 5G Tracking IP Address Upgrades CrashOverride I.T. Managament Private Cloud Notifications IT Budget Motion Sickness

Latest Blog Entry

Organizations that have a workforce outside of their normal office location are presented with a unique challenge. In the case of remote employees, businesses have to figure out how to keep them connected to the workplace, productive with their time, and part of the organiza...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login