Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Search

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Managed IT Services Best Practices Cloud IT Infrastructure Management Technology IT Companies in Tampa Business Continuity Email Business Computing Hackers Malware IT Support Services Business Mobility Privacy Business IT Solutions I.T. Management IT Professional Services Productivity Microsoft Hosted Solutions Internet Custom Business Solutions Managed Service Provider Business Outsourced IT IT Business Solutions Business Applications IT Management Ransomware Software Mobile Devices Data Backup Technology Consultants Network Security Computer Managed IT Service Business IT Support Managed IT Windows 10 Managed IT Service in Florida Android Windows Data Recovery Managed Services in Florida I.T. Support IT Support Services in Tampa IT Risk Management Backup User Tips Disaster Recovery Internet of Things Data Cloud Computing Dynamic Solutions I.T. Services Google IT Outsourcing in Tampa IT Services in Florida Smartphone Browser Data Management Remote Monitoring Communication Hardware IT Support in Tampa Managed Services Small Business IT Service Upgrade App Holiday IT Managed Services Workplace Tips Smartphones Server Cybersecurity Microsoft Office Managed Services in Tampa Bay Innovation Artificial Intelligence Encryption Social Media Gmail Phishing Business Management Mobile Device Management BYOD IT Services in Tampa Mobile Device Office 365 Tech Term Firewall Tampa IT Support Network Vendor Management Tech Companies in Tampa Applications Unified Threat Management IT Service Management Website Data Computer Services IT Company Business Plan Word Apple IT Vendor Management Collaboration IT Outsourcing Business IT Support Services Antivirus Operating System Save Money Productivity Small Business IT Solutions Infrastructure Managed Service in Tampa Efficiency Risk Management Computer Networking Tip of the week IT Outsourcing in Florida Passwords Content Filtering Hosted Solution Customer Relationship Management Two-factor Authentication Data loss Compliance IT solutions Data storage IT Support Project Management The Internet of Things Vulnerability Paperless Office Saving Money Remote Computing Regulations Bandwidth Managed IT Services Analytics Mobile Computing Miscellaneous IT Management Services Settings Telephone Systems Big Data Windows 10 IT Company Data Security Facebook Robot Money Automation Computer Hardware Repair Wireless Technology SaaS Chrome Bring Your Own Device Government Retail WiFi BDR Business Application Training I.T. Company Alert Computer Networking Services Redundancy Virtual Desktop Document Management Flexibility Office Office Tips YouTube HIPAA Digital Payment Server Management Search communications Computing Scam Network Congestion Internet Exlporer Virtualization Network Management Monitors Tablet Unified Communications Spam Storage Budget User Error Apps IT Consulting Mobile Security Help Desk Virtual Private Network Solid State Drive Managed IT Outsourcing Assessment Recovery IT Support Helpdesk LiFi Smart Technology Microsoft Virtual Server Hosting in Tampa and Florida Augmented Reality IT Companies in Florida Business Continuity Services Presentation Maintenance Business Technology Virtual Reality Information Technology Mobility Outlook VPN IT Management Service Wireless Laptop Net Neutrality IBM VoIP Administration Employer-Employee Relationship Google Drive Uninterrupted Power Supply End of Support Computer Network Services Mouse Licensing Computer Support Customer Service Servers Modem WannaCry Trending Disaster Resistance Intranet Computing Infrastructure Co-managed IT Legislation Identity Google Docs Undo Hard Disk Drive Halloween Superfish Fraud Social Time Management IT Support Companies in Tampa Save Time Software Tips Patch Management Display Full Service IT USB Dark Web IoT Samsung Healthcare IT Cache How To IT Solutions for Small Business Access Control History User Software as a Service Cookies Managed it Services in Tampa Travel Cryptocurrency Humor Domains CIO Proactive IT Alerts File Sharing Comparison IT Vendor Management in Tampa Sync Business Growth Competition Data Technology Scary Stories Server Hosting IT Tech Support Hacks Best Practice Identity Theft IT Technicians IT Support and Solutions Backups Digital Signature Hard Drives Identities Data Warehousing Computer Care Firefox Microsoft Affiliate Program Users SharePoint Disaster Avoiding Downtime Statistics Technology Tips Nanotechnology Managed Service Providers Bitcoin Star Wars Public Speaking VoIP Data Breach Cooperation Managed Services in Floirda Files Google Wallet Server Hosting in Florida Specifications Social Networking Network Support in Florida Mobile Device Managment Business Continuity Service Providers Writing Sports Computer Repair Networking Technology Consulting Firms Current Events Heating/Cooling Touchscreen Downloads Mirgation IT Managed Service in Tampa Information Technology Consulting Legal Cabling Microsoft Excel Microsoft Business Solutions Safety Marketing Drones Gadgets Google Maps Bluetooth Cortana Screen Reader Tech Company in Tampa Windows 8 Professional Service Utility Computing Programming Digital Dark Data Technology Laws Staff IT Company in Tampa Websites Tampa IT Services Education Black Friday Motherboard Social Engineering Hotspot Politics Going Green Multi-Factor Security Migration Help Desk Support in Tampa IT Consulting Services Cost Management Mail Merge Careers Alt Codes Blockchain Top IT Outsourcing Company Consultation Health Care IT Services Knowledge Distributed Denial of Service Smart Tech IT Managed Service Provider Healthcare Tech Support Spyware Consulting Services Unified Threat Management Operations Managed Service in Florida Outsourced Computer Support Fun Cyber Monday Router IT Consulting Service Health Corporate Profile Buisness Techology Language Printing Google Calendar Chatbots Help Desk Support Automobile Address IT Service in Tampa Jobs Typing Lenovo Permissions Application Server Hosting in Tampa Password Quick Tips Wi-Fi Machine Learning Hacking Shortcut Computers Business IT Solutions Experience Deep Learning Break Fix Connectivity Hard Drive Service IT Hacker Downtime Printer Wearable Technology IT Budget Black Market Update 5G Business Appplications Administrator Electronic Medical Records Managed Servers Work/Life Balance Relocation Lithium-ion Battery Web Server Cleaning IP Address Chromebook Law Enforcement Private Cloud Notifications Recycling Unsupported Software Mobile Office Physical Security Hiring/Firing Motion Sickness Cameras Thank You Emergency Gadget Error IT Consultant Refrigeration Personal Information eWaste Staffing Mobile Data Meetings CCTV How To Congratulations Virus Public Cloud Cybercrime Crowdsourcing GPS Twitter Webcam Taxes Upgrades Botnet Supercomputer G Suite Telephony Saving Time Running Cable I.T. Managament Tracking Processors Point of Sale CrashOverride 3D Printing Emoji

Latest Blog Entry

Artificial intelligence is perhaps most commonly known as a malevolent force, thanks to popular culture. HAL 9000, Ultron, and many others have reinforced that A.I. will be the downfall of humanity. In reality, however, A.I. holds more potential utility as a key implementati...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login