Email Security Tips

It’s been a crazy year for data breaches, with so many high profile hacks, employees should take extra precautions to not become a victim. Sony Pictures was one example of this high profile breach, with sensitive emails being leaked to the public. Once these emails are out they can have severe consequences that are hard to mend. Employees cannot only look to the enterprise to keep these sensitive emails secure, they need to take matters into their own hands as well because everyone is accountable when it comes to a data breach.

5 Steps you can take to secure your emails:

  1. Create a unique password of 8-12 characters in random order. 
  2. Do not use public wifi. There are programs out there that monitor data flowing over computer network links, ands copy the data. This program goes by the names of “network sniffer”, and is used by many hackers. 
  3. Do not open unsolicited attachments. If you do not know who the sender is do not open it, unless you want a potential virus on your hands. 
  4. Be very wary of phishing scams. Never give out personal information over the web, no matter what the reason is. Many hackers try to get at you by stating they are having issues with one of your accounts and they need to troubleshoot the problem and need your credentials. Do not fall for these tricks. 
  5. Create separate email accounts. Do not store all your various account information in one email. Many of us use one email account for all our online banking, social media, and other personal accounts. If your one email account gets hacked, the hacker will have access to all your other accounts.

 

So let’s take a lesson from 2014, and be smart in the New Year. Protect yourself with these 5 simple steps.

Previous Post
Using a Botnet to “Crack” AES Encryption Keys?
Next Post
Security Mistakes To Avoid in the Office

Related Posts

“Extracting BitLocker keys from a TPM”

(Pre-Boot Authentication: Wisdom in Security – Part 3) In my September 2018 blog “Pre-Boot Authentication. Wisdom in Security Part 2”  I concluded that: “Bottom Line: ‘No PBA’ is not a wise choice for enterprises Microsoft’s reasoning that you don’t need…

The Dark Side of Encryption

I know it’s very tedious these days to use a Star Wars metaphor, but as everyone’s doing it so will I. Encryption techniques have been used for some time to secure communications and protect personal or intellectual property. (more…)

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu