crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Getting Back to Email Security Basics

Email is a particular favorite attack vector of many who would do wrong by your business, as it is easily one of the most used communications in most businesses today. Do your employees know how large of a responsibility they have to your business’ security just by using email? In order to prevent unfortunate security blunders, you need to make sure you and your employees know a few best practices when it comes to handling email securely.

For this week’s tip, we’ll review these best practices.

Passwords
Yes, it can be annoying to have to enter a password everywhere, and yes, it can be hard to remember a different one for every account. However, your employees need to know why they have to deal with these annoyances, too, and why they can’t just use their pet’s name with the year they graduated and call it a day.

The fact of the matter is, too many people want to do just that: significant personal detail, significant number, password done. Cybercriminals know this, and are more than willing to put in the time and effort to find out about one of your employees if it gets them access to a bigger prize. Using social engineering tactics and studying what they can of online activity, these criminals can gain a significant amount of information about your employees (or even you) with relatively little effort. Without better password practices put in place, they could then likely deduce the password of someone in your organization and from there, they’re in… especially if your email password is reused repeatedly to gain access to other facets of the business.

If remembering x-amount of different passwords is a concern, work with your team and implement a password manager, or a program specifically designed to protect passwords and reduce the number that have to be recalled.

Depending on how your company deals with email, for example, if you are using Outlook, your employees probably aren’t typing in their email passwords very often, if at all. This puts the email password even further from top of mind, but it’s important to remember that these passwords need to be changed regularly and kept secure.

2FA, or Two-Factor Authentication
What’s more secure than a password? Two passwords - or at least, a password and an additional code that is generated when an account is being accessed. This is how 2FA works - in addition to their usual password, an employee needs to provide a generated code (usually obtained via their mobile device) in order to access an account. As a result, a hacker who happened to steal some passwords from some database somewhere still wouldn’t have enough information to access your accounts--and because the second piece of authentication is delivered by some other means, like a number generated by an authentication app on the user’s mobile device, the hacker would have that much harder of a time obtaining that as well.

Clicking What Shouldn’t Be Clicked
There is an unfortunate tendency to automatically trust things that come in via our email, whether its an attachment or a link, as these are commonly used avenues for cyberthreats to come in by. This is probably because these attacks can be effective against any level of an organization - an intern could mistakenly let in a threat, as could the president or CEO and anyone in between.

These threats are often known as phishing scams, as the attacker simply casts out their net and waits for someone to take the bait. These scams often leverage emails that include links to quite convincing facsimiles of the site the link purports to direct to. Unfortunately, this only makes phishing a bigger threat.

Another favorite attack like this that cybercriminals like to use is to include a good, old-fashioned virus in an attachment. If you aren’t expecting an attachment in an email, don’t click it! In addition, it always helps to run a quick virus scan if you aren’t sure.

For help in running these scans and maintaining your security, or with any other IT questions you may have, you can always turn to the professionals at Integrated Business Technologies. Reach out to us by calling (918) 770-8738.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 19 September 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Internet Cloud Microsoft Best Practices Business Computing Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Software Business Mobile Devices Data IT Support Network Hardware Small Business Communication Server Smartphones VoIP Computer Upgrade Business Continuity Google Windows Mobile Device Management Efficiency Microsoft Office Disaster Recovery Innovation Virtualization Miscellaneous Mobile Office Vendor Management Tech Term Holiday Gadgets Social Media Quick Tips Data Backup Passwords BYOD Outsourced IT User Tips Android Smartphone Mobile Computing Network Security Windows 10 Browser Internet of Things Managed IT services WiFi Bring Your Own Device Remote Monitoring The Internet of Things Ransomware Best Practice Spam Wireless Technology Data Recovery Alert Data Management Save Money Trending Operating System Apple Users Remote Computing Artificial Intelligence History Unified Threat Management Gmail Going Green Firewall Content Filtering Customer Relationship Management Managed IT Router Big Data Printer Office Tech Support Analytics IT Solutions Lithium-ion Battery Facebook Information Technology Current Events IT Consultant Encryption Cloud Computing App Paperless Office Windows 8 Employer-Employee Relationship Productivity Applications Website IT Support Humor Collaboration Two-factor Authentication Saving Time Avoiding Downtime Antivirus Document Management Maintenance Hard Drives Outlook Chrome Health Business Growth VPN Wi-Fi Risk Management Customer Service Marketing Excel Hacking Computers Managed IT Services Phone System Compliance Apps Application Automation Cybersecurity Virus Office Tips Retail Phishing Bandwidth Fax Server IT service Digital Payment Mobile Device File Sharing PowerPoint Social Networking Unified Communications Tablet Infrastructure Office 365 Password Inbound Marketing iPhone Managed Service Administration Government Presentation Augmented Reality Budget Project Management Proactive IT Training Computer Repair Regulations Point of Sale Mouse Recovery Money Net Neutrality Running Cable Social User Error Licensing Data Security Co-Managed IT Wireless Data storage Tip of the week Cybercrime Save Time Wearable Technology Robot Hiring/Firing Display Alerts Printing End of Support Healthcare LiFi Computing Statistics Scam Intranet Competition Business Intelligence Vulnerability Network Congestion Information Recycling eWaste Downtime Data loss Blockchain HIPAA BDR Search Piracy Redundancy Virtual Desktop USB Business Owner Files Sports Hacker Internet Exlporer User Programming Storage Company Culture Analyitcs Twitter Mobility Smart Technology Mobile Security Help Desk Education Safety Specifications IoT IBM Settings Flexibility Hosted Solution Cost Management Memory Star Wars Software Tips Managed IT Service Language Laptop communications Geography Asset Tracking Identity Electronic Health Records Sync Google Calendar Hacks Documents Conferencing Utility Computing Break Fix Adminstration Server Management Computing Infrastructure Halloween Techology Entrepreneur High-Speed Internet OneNote 3D PC Care Mobile Device Managment Legislation Undo 5G PDF Value People Dark Web eBay Cooperation Scary Stories Virtual Reality Disaster Resistance Development Employee-Employer Relationship Remote Support Motherboard Leadership Monitors Skype Streaming Media Hard Drive New Additions Data Warehousing Text Messaging Patch Management Staff SaaS IT Consulting Deep Learning Print Server Cables Remote Workers Work Station Modem G Suite Software as a Service Domains Google Wallet Fun Writing LinkedIn Cache Scheduling Congratulations Microsoft Excel Video Surveillance Operations Chromebook Data Breach Word Law Firm IT Wires Windows 8.1 Update Cookies Travel Technology Tips Public Speaking Drones Cortana Social Engineering Best Available Buisness Management Virtual Private Network Technology Laws Identities Monitoring Nanotechnology Comparison Backups How To Permissions Knowledge Environment CIO Enterprise Resource Planning MSP IT Technicians Telephony Unified Threat Management Solid State Drive Bluetooth Legal Online Currency Consulting Samsung Screen Reader Identity Theft Black Friday Assessment Fraud Experience Troubleshooting Debate Mobile Proactive Computer Accessories Mirgation Access Control Heating/Cooling Alt Codes Consumers Managed Services Provider Crowdfunding Smart Tech Macro Cyber Monday IT Management YouTube Managing Stress Remote Monitoring and Management Business Technology Machine Learning SharePoint Typing IP Address Google Drive Connectivity Network Management How To Enterprise Content Management Disaster WPA3 Gaming Console Touchscreen Networking Migration E-Commerce Private Cloud Downloads Refrigeration Cryptocurrency Google Docs Distributed Denial of Service Windows 10 Hotspot Vulnerabilities Digital Signature Fleet Tracking Chatbots Features Public Cloud Multi-Factor Security Bitcoin

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code