crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 22 October 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Microsoft Business Computing Best Practices Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Email Backup Malware Business Software Mobile Devices Data IT Support Small Business Network Hardware Communication Server Smartphones Computer VoIP Upgrade Windows Efficiency Business Continuity Google Disaster Recovery Mobile Device Management Innovation Virtualization Microsoft Office Mobile Office Vendor Management Data Backup Tech Term Outsourced IT Miscellaneous Holiday Gadgets Social Media Network Security Quick Tips Passwords BYOD User Tips Mobile Computing Android Smartphone Browser WiFi Bring Your Own Device Windows 10 Productivity Internet of Things Managed IT services Best Practice Ransomware Spam Remote Monitoring Data Recovery The Internet of Things Trending Operating System Apple Users Remote Computing Artificial Intelligence Wireless Technology Alert Data Management Save Money Encryption Firewall Content Filtering Customer Relationship Management History Gmail Unified Threat Management Office Collaboration Going Green Current Events IT Consultant Information Technology App Cloud Computing Managed IT Router Big Data Printer Tech Support Analytics IT Support IT Solutions Lithium-ion Battery Facebook Avoiding Downtime Antivirus Phishing Document Management Maintenance Hard Drives Mobile Device Paperless Office Employer-Employee Relationship Windows 8 Website Applications Humor Two-factor Authentication Saving Time Apps Compliance Automation Application Virus Office Tips Retail Bandwidth Project Management Fax Server Cybersecurity IT service Digital Payment Outlook Chrome Health Business Growth VPN Wi-Fi Risk Management Marketing Customer Service Excel Hacking Computers Phone System Government Managed IT Services Budget Managed Service Computer Repair Proactive IT Training Point of Sale Regulations Recovery Mouse Files Money Help Desk Social User Error Net Neutrality Running Cable Licensing Co-Managed IT File Sharing PowerPoint Social Networking Unified Communications Tablet Data Security Office 365 iPhone Password Inbound Marketing Healthcare Infrastructure Administration Presentation Augmented Reality Business Owner Information Data loss Blockchain Sports HIPAA BDR Hacker Programming User Redundancy Company Culture Analyitcs Twitter Education Machine Learning Safety Specifications Hosted Solution IBM Internet Exlporer Settings Flexibility Cost Management Storage Mobility Smart Technology Wireless Data storage Cybercrime Save Time Mobile Security Wearable Technology Conferencing IoT Robot Hiring/Firing Windows 10 Printing Display Alerts End of Support LiFi Tip of the week Computing Statistics Scam Intranet Business Intelligence Competition Network Congestion Recycling Downtime eWaste Remote Workers Search Virtual Desktop USB Piracy Vulnerability Favorites Meetings Technology Tips Legal Online Currency Samsung Cookies Debate Management Experience Troubleshooting Heating/Cooling Alt Codes Computer Accessories Virtual Private Network Telephony Technology Laws Nanotechnology Instant Messaging Macro Comparison Consumers Monitoring Crowdfunding Enterprise Resource Planning How To Permissions YouTube Unified Threat Management Typing MSP IT Technicians Screen Reader Identity Theft Black Friday IP Address Google Drive Mobile Assessment Fraud How To Access Control Refrigeration Cryptocurrency Disaster Proactive Gaming Console Touchscreen Mirgation Consulting Smart Tech Cyber Monday Google Docs Managing Stress IT Management Private Cloud SharePoint Bitcoin Digital Signature Remote Monitoring and Management Business Technology Managed Services Provider Memory Connectivity communications Enterprise Content Management Network Management Laptop Public Cloud Downloads Hacks WPA3 Migration E-Commerce Distributed Denial of Service Documents Entrepreneur Vulnerabilities Adminstration Hotspot Halloween Networking PC Care Sync Multi-Factor Security Undo Fleet Tracking 3D Chatbots Features Value People Star Wars Software Tips Managed IT Service 5G PDF Geography eBay Language Scary Stories Virtual Reality Leadership Mobile Device Managment Google Calendar Asset Tracking Remote Support Identity Electronic Health Records Streaming Media Utility Computing New Additions Break Fix Monitors Skype Deep Learning Print Server High-Speed Internet Text Messaging Server Management Computing Infrastructure SaaS Techology Legislation Domains Google Wallet OneNote Work Station Cyberattacks Scheduling Congratulations Dark Web Fun Writing LinkedIn Word Law Firm IT Development Video Surveillance Cooperation Chromebook Disaster Resistance G Suite Public Speaking Drones Windows 8.1 Update Employee-Employer Relationship Motherboard Read Only Hard Drive Data Warehousing Cortana Social Engineering Best Available Buisness Identities Cables Patch Management Staff IT Consulting Travel Software as a Service Backups Modem Bookmarks Cache Microsoft Excel Knowledge Environment CIO Solid State Drive Bluetooth Wires Operations Politics Data Breach

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code