crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 17 August 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Microsoft Best Practices Business Computing Saving Money Productivity IT Services Workplace Tips Backup Hosted Solutions Hackers Email Malware Mobile Devices Software Business IT Support Data Hardware Small Business Network Communication Server Smartphones Upgrade VoIP Business Continuity Google Windows Computer Mobile Device Management Efficiency Disaster Recovery Virtualization Microsoft Office Innovation Miscellaneous Mobile Office Vendor Management Holiday Gadgets Social Media BYOD Data Backup Tech Term Quick Tips Outsourced IT Passwords Mobile Computing Network Security Android Smartphone User Tips Browser Managed IT services WiFi Bring Your Own Device Windows 10 Internet of Things The Internet of Things Ransomware Spam Best Practice Remote Monitoring Trending Operating System Apple Remote Computing Users Data Recovery Alert Data Management Wireless Technology Content Filtering Going Green Artificial Intelligence History Gmail Firewall Unified Threat Management Save Money Facebook IT Consultant Router Encryption Printer Tech Support Information Technology Current Events Managed IT App Customer Relationship Management Big Data Office Analytics IT Solutions Lithium-ion Battery Humor Antivirus Document Management Saving Time Cloud Computing Paperless Office Avoiding Downtime Maintenance Employer-Employee Relationship Productivity Applications Hard Drives IT Support Collaboration Windows 8 Two-factor Authentication Marketing Excel Compliance Automation Cybersecurity Office Tips Retail Phishing Bandwidth IT service Digital Payment Mobile Device Apps Application Chrome Virus Business Growth VPN Wi-Fi Risk Management Fax Server Website Customer Service Hacking Computers Outlook Health Managed IT Services Phone System Budget Inbound Marketing Project Management Computer Repair Proactive IT Regulations Recovery Mouse Money Social Net Neutrality Running Cable Licensing Data Security File Sharing Training PowerPoint Social Networking Unified Communications Infrastructure Tablet User Error Co-Managed IT Office 365 Password iPhone Managed Service Administration Government Presentation Augmented Reality Search Virtual Desktop USB Piracy Redundancy Scam Business Owner Sports Files Hacker Point of Sale Programming Internet Exlporer User Storage Mobility Smart Technology Company Culture Analyitcs Twitter Education Mobile Security Safety Specifications IoT IBM Settings Flexibility Hosted Solution Cost Management Wireless Data storage Save Time Tip of the week Cybercrime Wearable Technology Robot Hiring/Firing Help Desk Printing Display Alerts End of Support LiFi Computing Statistics Intranet Business Intelligence Competition Network Congestion Vulnerability Recycling Downtime Data loss Blockchain eWaste HIPAA BDR Enterprise Resource Planning How To Permissions Knowledge Environment CIO Solid State Drive Bluetooth MSP IT Technicians Telephony Unified Threat Management Identity Theft Black Friday Legal Online Currency Samsung Screen Reader Debate Mobile Assessment Fraud Experience Troubleshooting Heating/Cooling Alt Codes Proactive Computer Accessories Mirgation Scheduling Access Control Cyber Monday Consumers Crowdfunding Smart Tech Managing Stress IT Management YouTube Typing Remote Monitoring and Management Business Technology Machine Learning SharePoint IP Address Google Drive Connectivity Enterprise Content Management Network Management How To Refrigeration Cryptocurrency Disaster WPA3 Touchscreen Networking Migration Private Cloud Downloads Distributed Denial of Service Google Docs Vulnerabilities Windows 10 Hotspot Bitcoin Digital Signature Fleet Tracking Chatbots Public Cloud Multi-Factor Security Software Tips Managed IT Service Memory Star Wars Geography Language Macro Laptop communications Hacks Asset Tracking Identity Sync Google Calendar Utility Computing Break Fix Documents Conferencing High-Speed Internet Server Management Computing Infrastructure Halloween Techology Entrepreneur Mobile Device Managment Legislation Undo OneNote PC Care Healthcare Gaming Console Dark Web 5G PDF Value People Development eBay Cooperation Scary Stories Virtual Reality Disaster Resistance Employee-Employer Relationship Remote Support Motherboard Leadership Hard Drive New Additions Data Warehousing Monitors Skype Streaming Media Deep Learning Print Server Cables Text Messaging Patch Management Staff SaaS IT Consulting G Suite Software as a Service Domains Google Wallet Remote Workers Work Station Modem Cache Congratulations Microsoft Excel Fun Writing LinkedIn Word Law Firm IT Wires Video Surveillance Operations Chromebook Data Breach Adminstration Travel Technology Tips Public Speaking Drones Windows 8.1 Update Information Cookies Management 3D Cortana Social Engineering Best Available Buisness Identities Virtual Private Network Technology Laws Comparison Backups Nanotechnology

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code