crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 20 June 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Microsoft Saving Money Business Computing Productivity Best Practices Workplace Tips IT Services Hosted Solutions Backup Hackers Email Mobile Devices Malware Software IT Support Business Small Business Hardware Network Data Communication Server Smartphones Upgrade VoIP Windows Business Continuity Mobile Device Management Google Virtualization Computer Efficiency Microsoft Office Disaster Recovery Miscellaneous Innovation Mobile Office Vendor Management Gadgets Social Media Holiday Outsourced IT BYOD Android Smartphone User Tips Quick Tips Passwords Mobile Computing WiFi Data Backup Windows 10 Browser Network Security Ransomware Bring Your Own Device Spam Best Practice Internet of Things Managed IT services The Internet of Things Remote Monitoring Apple Tech Term Remote Computing Alert Users Data Management Trending Operating System Wireless Technology Content Filtering Data Recovery Going Green Artificial Intelligence History Gmail Firewall Save Money Printer Tech Support Information Technology Current Events Managed IT App Big Data Office Analytics Customer Relationship Management IT Solutions Unified Threat Management Lithium-ion Battery IT Consultant Encryption Router Antivirus Document Management Humor Applications Saving Time Paperless Office Avoiding Downtime Employer-Employee Relationship Maintenance Hard Drives Facebook Windows 8 Cloud Computing Office Tips Retail Phishing IT service Digital Payment Mobile Device Chrome Business Growth VPN Risk Management Apps Application Virus Managed IT Services Customer Service Website Hacking Computers Fax Server Phone System Outlook Health Collaboration Two-factor Authentication Cybersecurity Compliance Automation Marketing Excel Regulations Inbound Marketing Mouse Recovery Money Bandwidth Net Neutrality Running Cable Social Licensing Infrastructure PowerPoint Wi-Fi Social Networking Unified Communications Training Tablet Office 365 Password iPhone User Error Project Management Co-Managed IT Government Administration Presentation Augmented Reality Budget Data Security Proactive IT Computer Repair Tip of the week Scam User Point of Sale Programming Company Culture Analyitcs Twitter Education Safety Specifications IBM Settings Flexibility Hosted Solution Cost Management Wireless Data storage Cybercrime File Sharing Save Time Wearable Technology Robot Vulnerability Hiring/Firing Display Alerts Productivity Printing End of Support HIPAA LiFi Computing Data loss Help Desk Statistics Redundancy Intranet Competition Business Intelligence Network Congestion Recycling Internet Exlporer eWaste Downtime Smart Technology Mobile Security Search USB Piracy Files Virtual Desktop Business Owner Mobility Sports Hacker Language YouTube Techology Identity Private Cloud Google Calendar Typing IP Address Google Drive Utility Computing Scheduling Software Tips Break Fix Server Management Computing Infrastructure How To Disaster Touchscreen Disaster Resistance Public Cloud Legislation Refrigeration Cryptocurrency Google Docs Healthcare Dark Web Cooperation Digital Signature IT Consulting Motherboard Sync Bitcoin Memory Hard Drive Data Warehousing Patch Management Staff Laptop communications Modem Mobile Device Managment Software as a Service Hacks Documents Conferencing Cache IT Support Microsoft Excel Operations Halloween Data Breach Entrepreneur Cookies Macro PC Care Technology Tips Undo 5G PDF Value People Management Blockchain eBay Virtual Private Network Scary Stories Virtual Reality Technology Laws Remote Support Nanotechnology Leadership Travel Comparison Permissions Monitors Skype Streaming Media Enterprise Resource Planning New Additions Gaming Console Text Messaging IT Technicians SaaS Unified Threat Management Deep Learning Print Server Google Wallet Work Station Screen Reader BDR Black Friday Domains Assessment Fraud Fun Writing LinkedIn Mobile Congratulations Video Surveillance Mirgation Access Control Word Law Firm IT Public Speaking Drones Windows 8.1 Update Smart Tech Identity Theft Cyber Monday IT Management Cortana Social Engineering Best Available Buisness Managing Stress Business Technology Storage Telephony SharePoint Identities Backups Connectivity Network Management Knowledge Environment CIO Enterprise Content Management Adminstration Bluetooth 3D Networking Migration Downloads Solid State Drive Legal Online Currency Samsung IoT Distributed Denial of Service Windows 10 Hotspot Experience Troubleshooting Debate Computer Accessories Chatbots Machine Learning Multi-Factor Security Heating/Cooling Alt Codes Consumers Crowdfunding Star Wars Managed IT Service

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code