Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Symmetric Engineering Group Blogs

Tip of the Week: Getting Back to Email Security Basics

Tip of the Week: Getting Back to Email Security Basics

Email is a particular favorite attack vector of many who would do wrong by your business, as it is easily one of the most used communications in most businesses today. Do your employees know how large of a responsibility they have to your business’ security just by using email? In order to prevent unfortunate security blunders, you need to make sure you and your employees know a few best practices when it comes to handling email securely.

For this week’s tip, we’ll review these best practices.

Passwords
Yes, it can be annoying to have to enter a password everywhere, and yes, it can be hard to remember a different one for every account. However, your employees need to know why they have to deal with these annoyances, too, and why they can’t just use their pet’s name with the year they graduated and call it a day.

The fact of the matter is, too many people want to do just that: significant personal detail, significant number, password done. Cybercriminals know this, and are more than willing to put in the time and effort to find out about one of your employees if it gets them access to a bigger prize. Using social engineering tactics and studying what they can of online activity, these criminals can gain a significant amount of information about your employees (or even you) with relatively little effort. Without better password practices put in place, they could then likely deduce the password of someone in your organization and from there, they’re in… especially if your email password is reused repeatedly to gain access to other facets of the business.

If remembering x-amount of different passwords is a concern, work with your team and implement a password manager, or a program specifically designed to protect passwords and reduce the number that have to be recalled.

Depending on how your company deals with email, for example, if you are using Outlook, your employees probably aren’t typing in their email passwords very often, if at all. This puts the email password even further from top of mind, but it’s important to remember that these passwords need to be changed regularly and kept secure.

2FA, or Two-Factor Authentication
What’s more secure than a password? Two passwords - or at least, a password and an additional code that is generated when an account is being accessed. This is how 2FA works - in addition to their usual password, an employee needs to provide a generated code (usually obtained via their mobile device) in order to access an account. As a result, a hacker who happened to steal some passwords from some database somewhere still wouldn’t have enough information to access your accounts--and because the second piece of authentication is delivered by some other means, like a number generated by an authentication app on the user’s mobile device, the hacker would have that much harder of a time obtaining that as well.

Clicking What Shouldn’t Be Clicked
There is an unfortunate tendency to automatically trust things that come in via our email, whether its an attachment or a link, as these are commonly used avenues for cyberthreats to come in by. This is probably because these attacks can be effective against any level of an organization - an intern could mistakenly let in a threat, as could the president or CEO and anyone in between.

These threats are often known as phishing scams, as the attacker simply casts out their net and waits for someone to take the bait. These scams often leverage emails that include links to quite convincing facsimiles of the site the link purports to direct to. Unfortunately, this only makes phishing a bigger threat.

Another favorite attack like this that cybercriminals like to use is to include a good, old-fashioned virus in an attachment. If you aren’t expecting an attachment in an email, don’t click it! In addition, it always helps to run a quick virus scan if you aren’t sure.

For help in running these scans and maintaining your security, or with any other IT questions you may have, you can always turn to the professionals at Symmetric Engineering Group. Reach out to us by calling (813) 749-0895.

Which is Best for Your Server Needs, In-House or H...
WPA3 is Boosting Network Security
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Search

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Best Practices Managed IT Services Technology Cloud Business Computing Email Privacy IT Infrastructure Management Malware Business Continuity Hackers IT Companies in Tampa Hosted Solutions Internet Business IT Support Services Business Mobility Data Backup Business IT Solutions Outsourced IT Microsoft I.T. Management Software Data Managed Service Provider Productivity IT Professional Services Custom Business Solutions Network Security Computer Mobile Devices IT Business Solutions Tech Term Business Applications Productivity IT Management Ransomware Data Recovery Technology Consultants Android Innovation Windows 10 Managed IT Service in Florida Managed IT Service Business IT Support Managed IT User Tips Internet of Things Windows Disaster Recovery Cloud Computing Managed Services in Florida I.T. Support Google Communication Browser Backup Workplace Tips I.T. Services Dynamic Solutions IT Support Services in Tampa IT Risk Management Remote Monitoring IT Outsourcing in Tampa IT Support IT Services in Florida Data Management Collaboration Encryption Smartphone Hardware Small Business IT Support in Tampa Managed Services Artificial Intelligence Server Gmail Network IT Service App Social Media IT Managed Services Mobile Device Cybersecurity Smartphones Save Money Managed Services in Tampa Bay Holiday Microsoft Office Upgrade Phishing Business Management Efficiency BYOD IT Services in Tampa Office 365 Paperless Office Firewall Customer Relationship Management Mobile Device Management Tampa IT Support Bandwidth Vendor Management VoIP Tech Companies in Tampa BDR Passwords Unified Threat Management Website Applications Word Two-factor Authentication Compliance IT Vendor Management Project Management Bring Your Own Device Vulnerability Content Filtering IT Outsourcing Business IT Support Services Managed IT Services Apple Small Business IT Solutions Facebook Windows 10 Infrastructure Managed Service in Tampa Risk Management Computer Networking Tip of the week IT Outsourcing in Florida Government Wi-Fi Chrome Antivirus Operating System IT Service Management Data Computer Services IT Company Business Plan Automation Office Data loss communications Data storage IT solutions Storage Regulations Unified Communications Help Desk Miscellaneous IT Management Services Settings Telephone Systems Big Data Maintenance IT Company Data Security The Internet of Things Saving Money Remote Computing Robot Wireless Healthcare Money Computer Hardware Repair Wireless Technology SaaS Analytics Mobile Computing Employer-Employee Relationship Router Retail WiFi Customer Service Managed Service Hosted Solution Document Management Office Tips IoT Net Neutrality How To YouTube HIPAA Patch Management File Sharing Computing Digital Payment Server Management Search Scam Internet Exlporer Virtualization Network Management Monitors Users Spam Budget User Error Files Tablet Alert Apps IT Consulting Mobile Security Virtual Private Network Solid State Drive Managed IT Outsourcing Assessment LiFi Smart Technology Recovery IT Support Helpdesk Business Continuity Services Presentation Business Technology Virtual Reality Politics Network Congestion Information Technology Mobility Microsoft Virtual Server Hosting in Tampa and Florida Augmented Reality IT Companies in Florida Blockchain VPN IT Management Service Remote Monitoring and Management IBM Laptop Remote Workers Administration Uninterrupted Power Supply Quick Tips End of Support Google Drive Computer Support Machine Learning Computer Network Services Mouse Licensing Information Training I.T. Company Business Application Outlook Redundancy Virtual Desktop Flexibility Computer Networking Services Display Full Service IT Dark Web Samsung Healthcare IT Cache Electronic Health Records IT Solutions for Small Business Access Control IT Support Companies in Tampa Save Time Test Software Tips Software as a Service Cookies Managed it Services in Tampa Travel Cryptocurrency Humor Monitoring Domains CIO Proactive IT Alerts Chromebook History High-Speed Internet User Employees Business Growth Asset Tracking Competition Data Technology Scary Stories Server Hosting IT Tech Support Hacks Application Company Culture Best Practice Conferencing Identity Theft Comparison IT Vendor Management in Tampa Sync Identities Data Warehousing Recycling Cyberattacks Computer Care Firefox Microsoft Affiliate Program SharePoint IT Technicians IT Support and Solutions Backups Digital Signature MSP Hard Drives Technology Tips Nanotechnology Managed Service Providers Bitcoin Star Wars Consulting Public Speaking VoIP Data Breach Cooperation Managed Services in Floirda Google Wallet Intranet Disaster Development Avoiding Downtime Zero-Day Threat Statistics Business Continuity Service Providers OneNote Writing Sports Computer Repair Networking Technology Consulting Firms Current Events Managing Stress Heating/Cooling Instant Messaging Touchscreen Server Hosting in Florida Specifications Social Networking Network Support in Florida Mobile Device Managment Cabling Microsoft Excel USB eWaste Read Only Microsoft Business Solutions Safety Marketing Downloads Mirgation IT Managed Service in Tampa Information Technology Consulting Legal Proactive Cortana Screen Reader Tech Company in Tampa Meetings Windows 8 Professional Service Utility Computing Programming Managed Services Provider Digital Dark Data Technology Laws Staff IT Company in Tampa Websites Drones Gadgets Cables Backup and Disaster Recovery Google Maps Bluetooth Employee-Employer Relationship Social Engineering Hotspot Going Green Enterprise Content Management Finance Tampa IT Services Education Black Friday Motherboard Cost Management Mail Merge Careers Alt Codes Top IT Outsourcing Company Management Consultation Multi-Factor Security Migration Help Desk Support in Tampa IT Consulting Services Knowledge Distributed Denial of Service Smart Tech IT Managed Service Provider Tech Support E-Commerce Spyware Consulting Services Unified Threat Management Operations Managed Service in Florida Wires Human Error Health Care IT Services G Suite IT Consulting Service Health Corporate Profile Buisness Techology Language Printing Vulnerabilities Authentication Outsourced Computer Support Fun Cyber Monday WPA3 Address IT Service in Tampa Jobs Typing Lenovo Permissions Server Hosting in Tampa Enterprise Resource Planning Password Bookmarks Google Calendar Chatbots Help Desk Support Automobile Business IT Solutions Experience Deep Learning Break Fix Connectivity Point of Sale Hard Drive Features Service IT Hacker Downtime Printer Wearable Technology Hacking Permission Shortcut Computers Modem WannaCry Trending Disaster Resistance Computing Infrastructure Geography Authorization Servers Fleet Tracking Undo Hard Disk Drive Halloween Superfish Fraud Social Mobile Favorites Time Management Co-managed IT Legislation Identity Google Docs Web Server Cleaning IP Address Relocation Regulation Law Enforcement Notifications Unsupported Software Mobile Office Private Cloud RMM Motion Sickness Cameras Physical Security Hiring/Firing Emergency Gadget Personal Information Lithium-ion Battery Staffing Mobile Data Error IT Consultant Refrigeration CCTV How To Cybercrime Crowdsourcing Printers GPS Public Cloud Twitter Webcam Taxes Upgrades Botnet Thank You Telephony Supercomputer Saving Time Running Cable I.T. Managament Tracking Processors CrashOverride 3D Printing Emoji Congratulations Black Market Update Virus IT Budget Electronic Medical Records Managed Servers Work/Life Balance 5G Business Appplications Administrator

Latest Blog Entry

Wireless Internet access for a user’s devices isn’t just a luxury these days--it’s expected. If the Wi-Fi drops out for any reason at all, chaos strikes, rendering any ability to stream content or access the Internet a moot point. This is particularly the case for businesses...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login