Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Symmetric Engineering Group Blogs

Tip of the Week: Getting Back to Email Security Basics

Tip of the Week: Getting Back to Email Security Basics

Email is a particular favorite attack vector of many who would do wrong by your business, as it is easily one of the most used communications in most businesses today. Do your employees know how large of a responsibility they have to your business’ security just by using email? In order to prevent unfortunate security blunders, you need to make sure you and your employees know a few best practices when it comes to handling email securely.

For this week’s tip, we’ll review these best practices.

Yes, it can be annoying to have to enter a password everywhere, and yes, it can be hard to remember a different one for every account. However, your employees need to know why they have to deal with these annoyances, too, and why they can’t just use their pet’s name with the year they graduated and call it a day.

The fact of the matter is, too many people want to do just that: significant personal detail, significant number, password done. Cybercriminals know this, and are more than willing to put in the time and effort to find out about one of your employees if it gets them access to a bigger prize. Using social engineering tactics and studying what they can of online activity, these criminals can gain a significant amount of information about your employees (or even you) with relatively little effort. Without better password practices put in place, they could then likely deduce the password of someone in your organization and from there, they’re in… especially if your email password is reused repeatedly to gain access to other facets of the business.

If remembering x-amount of different passwords is a concern, work with your team and implement a password manager, or a program specifically designed to protect passwords and reduce the number that have to be recalled.

Depending on how your company deals with email, for example, if you are using Outlook, your employees probably aren’t typing in their email passwords very often, if at all. This puts the email password even further from top of mind, but it’s important to remember that these passwords need to be changed regularly and kept secure.

2FA, or Two-Factor Authentication
What’s more secure than a password? Two passwords - or at least, a password and an additional code that is generated when an account is being accessed. This is how 2FA works - in addition to their usual password, an employee needs to provide a generated code (usually obtained via their mobile device) in order to access an account. As a result, a hacker who happened to steal some passwords from some database somewhere still wouldn’t have enough information to access your accounts--and because the second piece of authentication is delivered by some other means, like a number generated by an authentication app on the user’s mobile device, the hacker would have that much harder of a time obtaining that as well.

Clicking What Shouldn’t Be Clicked
There is an unfortunate tendency to automatically trust things that come in via our email, whether its an attachment or a link, as these are commonly used avenues for cyberthreats to come in by. This is probably because these attacks can be effective against any level of an organization - an intern could mistakenly let in a threat, as could the president or CEO and anyone in between.

These threats are often known as phishing scams, as the attacker simply casts out their net and waits for someone to take the bait. These scams often leverage emails that include links to quite convincing facsimiles of the site the link purports to direct to. Unfortunately, this only makes phishing a bigger threat.

Another favorite attack like this that cybercriminals like to use is to include a good, old-fashioned virus in an attachment. If you aren’t expecting an attachment in an email, don’t click it! In addition, it always helps to run a quick virus scan if you aren’t sure.

For help in running these scans and maintaining your security, or with any other IT questions you may have, you can always turn to the professionals at Symmetric Engineering Group. Reach out to us by calling (813) 749-0895.

Which is Best for Your Server Needs, In-House or H...
WPA3 is Boosting Network Security


Already Registered? Login Here
No comments made yet. Be the first to submit a comment


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Best Practices Managed IT Services Cloud Technology Privacy IT Infrastructure Management Email Business Computing Business Continuity Malware IT Companies in Tampa Hackers Hosted Solutions Internet IT Support Services Business Mobility Business IT Solutions I.T. Management Microsoft Business Productivity Software IT Professional Services Data Custom Business Solutions Managed Service Provider Mobile Devices Computer Outsourced IT Data Backup IT Management Business Applications IT Business Solutions Tech Term Network Security Ransomware Technology Consultants Managed IT Service Managed IT Service in Florida Data Recovery Business IT Support Windows 10 Managed IT Android I.T. Support User Tips Windows Internet of Things Managed Services in Florida Cloud Computing Google Dynamic Solutions Workplace Tips I.T. Services Disaster Recovery Innovation IT Support Services in Tampa Communication IT Risk Management Backup Smartphone Browser Data Management Remote Monitoring IT Outsourcing in Tampa IT Services in Florida Hardware Network IT Service Encryption Small Business Gmail IT Support in Tampa Managed Services Productivity IT Support Managed Services in Tampa Bay Smartphones Save Money Server Cybersecurity Microsoft Office Artificial Intelligence IT Managed Services Social Media Upgrade BYOD App Holiday Firewall Tech Companies in Tampa Unified Threat Management VoIP Efficiency Vendor Management IT Services in Tampa Applications Mobile Device Mobile Device Management Passwords Paperless Office Phishing Office 365 Website Collaboration Tampa IT Support Business Management Bandwidth Managed Service in Tampa Data Computer Services IT Service Management Antivirus IT Outsourcing in Florida Risk Management IT Company Business Plan Operating System Infrastructure Facebook Chrome IT Outsourcing Tip of the week Bring Your Own Device Business IT Support Services Content Filtering Compliance BDR IT Vendor Management Customer Relationship Management Small Business IT Solutions Apple Word Two-factor Authentication Computer Networking Saving Money Remote Computing Vulnerability Computer Hardware Repair IT Company Settings Analytics Mobile Computing Managed IT Services Robot SaaS Government Managed Service Miscellaneous Data Security Windows 10 Big Data Router Data storage Automation Wi-Fi Hosted Solution Employer-Employee Relationship Wireless Technology Retail WiFi Document Management Storage Regulations Telephone Systems IT solutions Data loss Money The Internet of Things Project Management IT Management Services Unified Communications IT Support Helpdesk Solid State Drive Virtualization Google Drive Healthcare Microsoft Virtual Server Hosting in Tampa and Florida Mobile Security Tablet Computer Network Services Mouse IT Management Service Computer Support LiFi I.T. Company Virtual Private Network Smart Technology Assessment Augmented Reality Spam Computer Networking Services Wireless Apps Maintenance Business Technology Information End of Support Training Blockchain Mobility Computing Recovery Outlook Administration Information Technology Business Application Presentation Net Neutrality VPN Flexibility File Sharing IBM Uninterrupted Power Supply Laptop Quick Tips Licensing Office Tips YouTube Files Managed IT Outsourcing Customer Service HIPAA Redundancy Help Desk IoT Alert Monitors Search communications Patch Management Business Continuity Services How To IT Consulting Virtual Desktop Scam Internet Exlporer Digital Payment Server Management IT Companies in Florida Network Congestion Budget User Error Virtual Reality Office Network Management Printing Remote Monitoring and Management Dark Data Sports Computer Repair History User Technology Tips Nanotechnology IT Consulting Service Computer Care Firefox Management Help Desk Support in Tampa Domains Data Breach Cooperation Social Engineering Best Practice Specifications Social Networking VoIP E-Commerce Tampa IT Services Safety Marketing Business Growth Managed Service in Florida Competition Networking Statistics Wires G Suite Downloads Mirgation Remote Workers Digital Signature Hard Drives Microsoft Excel Touchscreen Vulnerabilities Careers Cortana Staff Cabling WPA3 Consulting Services Disaster Server Hosting in Tampa Avoiding Downtime Screen Reader Enterprise Resource Planning Health Care IT Services Education Help Desk Support Public Speaking Automobile Technology Laws Bluetooth Alt Codes Heating/Cooling Point of Sale Black Friday Motherboard Google Docs Digital Hard Drive Features Outsourced Computer Support Machine Learning Hotspot Social Google Maps Multi-Factor Security Migration Save Time Healthcare IT Geography IT Service in Tampa Jobs Knowledge Unified Threat Management Operations Mail Merge Fleet Tracking Service IT Buisness Gadgets Distributed Denial of Service Smart Tech Cryptocurrency Humor Consultation Mobile Computers Business IT Solutions Fun Programming Typing Samsung Cyber Monday Spyware Cache Electronic Health Records IT Support Companies in Tampa Techology Language IT Tech Support Hacks Deep Learning Managed it Services in Tampa Travel Google Calendar Chatbots Backups Corporate Profile Monitoring Hacker Downtime Chromebook Cost Management Lenovo Permissions High-Speed Internet Experience Sync Printer Wearable Technology Google Wallet Application Address Asset Tracking IT Solutions for Small Business Trending Server Hosting Break Fix Connectivity Bitcoin Company Culture Display Full Service IT Tech Support IT Vendor Management in Tampa Current Events Shortcut MSP Halloween Modem Business Continuity Service Providers Recycling Co-managed IT Health IT Support and Solutions Disaster Resistance Computing Infrastructure Technology Consulting Firms Password Managed Service Providers Legislation Identity Information Technology Consulting Legal Intranet WannaCry Star Wars Consulting Managed Services in Floirda Superfish Fraud Servers Development Data Technology Network Support in Florida Mobile Device Managment Access Control Drones Hard Disk Drive OneNote Microsoft Affiliate Program CIO Hacking Dark Web Windows 8 Professional Service Time Management Managing Stress Going Green USB Software Tips Proactive Scary Stories Software as a Service Cookies eWaste Read Only IT Managed Service in Tampa Proactive IT Alerts Writing Identities Tech Company in Tampa Comparison IT Consulting Services Utility Computing Managed Services Provider Server Hosting in Florida Users IT Company in Tampa Undo Websites Top IT Outsourcing Company Cables SharePoint IT Technicians Employee-Employer Relationship Microsoft Business Solutions Politics Data Warehousing IT Managed Service Provider Identity Theft Enterprise Content Management How To Crowdsourcing Printers Public Cloud Twitter Webcam Thank You Cameras Botnet I.T. Managament Emergency Telephony Upgrades Staffing Cybercrime Processors Congratulations CCTV Emoji Black Market Virus IT Consultant Update Refrigeration 3D Printing Managed Servers Work/Life Balance GPS Business Appplications Administrator Regulation Running Cable Web Server Taxes Relocation Supercomputer Electronic Medical Records Law Enforcement Tracking Notifications CrashOverride Cyberattacks 5G Private Cloud Motion Sickness IP Address Saving Time IT Budget Unsupported Software Gadget Lithium-ion Battery Cleaning Physical Security Error Meetings Mobile Office Mobile Data Personal Information Hiring/Firing

Latest Blog Entry

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s ...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login