facebook linkedin twitter

Tip of the Week: Options to Secure Your Email Messages

Tip of the Week: Options to Secure Your Email Messages

Due to the popularity of email in the business world, it’s an extremely popular method of attack for hackers. They can easily send countless messages to targets all over the world with the click of a mouse. Therefore, you have to take email security very seriously. The repercussions of not doing so could be swift and severe. This week’s tip is dedicated to informing your employees of email best practices for the office environment.

Password Security
Passwords might not be the most convenient way to keep accounts secure, but it’s certainly one of the most popular. It’s a best practice to keep different passwords for each of your different accounts, but your employees won’t see it that way. They’ll see it as an inconvenience at best, and it takes more than just simple passwords that are easy to remember to keep your organization’s data safe.

Too many users simply enter in some personal details about themselves, a significant number, and click done, thinking it’s an appropriate password for them. Hackers and cybercriminals know this, and they try to take advantage of it any way they can. This includes looking up sensitive information about the target that they might find on an employee’s personal Facebook page. These kinds of social engineering tactics can be used to dig up dirt on just about anyone in your organization, providing hackers with just enough information to make targeted attempts at guessing passwords.

So… if your password is based on your dog’s name and the year you were born (and both of these can be found on your page), it’s likely that a hacker can use common tools at their disposal to hack your account. This issue compounds when the password is used for multiple accounts.

This issue can be resolved easily enough through the use of a password manager. These applications can store passwords in a secure, encrypted vault and call them only when they are needed. Depending on the email application used, employees might not even really think about their email passwords because the app doesn’t always ask for it, making it difficult to keep passwords top of mind.

Two-Factor Authentication
2FA is a method used to augment password security by requiring a secondary code to access accounts or information. 2FA works by automatically generating a new passcode that is sent to a secondary email address or phone number each time you try to log into an account. These types of solutions make it so that a hacker needs much more than just your original password. They need access to all of your mobile devices and other accounts, too, making the effort to access your account more trouble than it’s worth.

Stop Clicking on Links and Attachments
If you receive an email and it has a link or attachment, your first instinct might be to click on it. Unfortunately, this habit can lead to a hacking attack, as scammers understand that the need to click on a link or attachment can be somewhat compulsive. An intern and CEO alike could make such an easy mistake, making this an effective method of spreading viruses and malware across systems. These phishing attacks can be tricky to identify, but there are certain giveaways that can make it easier. Links to external sites that are unrelated to the subject matter, poor spelling and grammar, and suspicious email domains are a few examples. Always make sure you trust the sender before downloading an attachment or clicking on a link.

Computerware can help your organization secure its network. To learn more, reach out to us at (703) 821-8200.

Are Medical Practices Taking Advantage of Cloud-Ba...
Backup and Disaster Recovery Gives Businesses Anot...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 13, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Business Computing Software Hackers Microsoft Backup Workplace Tips Managed Service Provider Productivity Data Hardware Saving Money Business Email Malware Network Security IT Services Efficiency IT Support Hosted Solutions Google Small Business Computer Smartphones User Tips Mobile Devices Quick Tips Gadgets Business Continuity Disaster Recovery Innovation Android Microsoft Office Mobile Office Virtualization Network Social Media VoIP Mobile Device Management Server Data Backup Collaboration Smartphone Communication Miscellaneous Ransomware Windows 10 Upgrade Unified Threat Management IT Support Data Recovery Windows Tech Term Operating System Remote Monitoring Passwords Productivity Holiday BYOD Remote Computing Mobile Computing Managed IT services Vendor Management communications Cybersecurity WiFi BDR Apps Facebook Users The Internet of Things Analytics Marketing Phishing Apple Automation Mobile Device Firewall History Outsourced IT Data Management Alert Internet of Things Managed IT Services Artificial Intelligence App Big data IT Consultant Browser Save Money Maintenance Office Bandwidth Health Content Filtering Gmail Encryption Going Green Spam Bring Your Own Device Antivirus Printer Office 365 Tech Support Virus Budget Managed IT Two-factor Authentication Information Technology Lithium-ion Battery Best Practice Cybercrime Hiring/Firing Hard Drives Windows 8 Help Desk Outlook Wireless Technology Cost Management Search Travel Training Update Phone System IBM Cloud Computing Money Business Technology Recovery Employer-Employee Relationship Document Management Saving Time Hacking Computers VPN Humor Intranet Education Law Enforcement Risk Management Compliance Customer Service Hard Drive Data storage Access Control Save Time Website It Management Government Networking Legal Regulations Running Cable Proactive IT Administration SaaS Windows 10 End of Support Twitter Telephone Systems Hosted Solution Project Management Websites Robot Avoiding Downtime Securty User Information iPhone Solid State Drive File Sharing Google Maps Flexibility Business Intelligence Wireless Black Market Digital Payment DDoS Excel Mobility Current Events Downtime Social Engineering Laptop Data Security Customer Relationship Management Business Growth Comparison Tablet Patch Management Blockchain Augmented Reality PowerPoint Word Company Culture Applications Data Loss Computer Repair Managed Service Social Networking Password Cortana Paperless Office Fax Server Data Breach Sports Hacker Machine Learning Computing Disaster Digital Processors Distributed Denial of Service Monitoring USB Presentation Inbound Marketing Public Cloud IT service Streaming Media Start Menu Tech Terms Mobile Technology Specifications Safety Identity Theft Management Software as a Service Virtual Desktop Net Neutrality Bluetooth Social Pain Points Uninterrupted Power Supply Documents Vulnerabilities Chrome Entertainment Virtual Reality Cryptocurrency Healthcare Bitcoin Heating/Cooling Politics Storage Automobile Router Vendor Emails Google Docs Data Protection Co-managed IT Chromebook Experience User Error Computer Accessories Monitors Computing Infrastructure Hack Cleaning Trending Retail How To Gaming Console Office Tips Private Cloud eWaste Download Scam Mouse YouTube Webcam Redundancy Lifestyle Value Text Messaging Statistics Unified Communications Settings Conferencing Programming Telephony Network Congestion Microchip Taxes Reading Samsung Devices Technology Tips Electronic Payment Thin CLient Fraud Tactics Virtual Assistant Competition Fileless Malware 3D Ebay UTM Content Audit Business Owner Smart Phones G Suite Permissions Language Fake News Microserver Proxy Server Employer Employee Relationship Recycling IP Address Licensing Legislation Error Data Warehousing Analytic Electronic Medical Records Hacks Physical Security IT Plan Enterprise Resource Planning Relocation Tablets switches Writing Accountants Access A.I. Product Reviews Human Resources Leadership Banking Botnet Music email scam Addiction Emergency Hard Drive Disposal Get More Done Application Directions Adminstration Pirating Information Multi-factor Authentication Computer Care Printer Server Sync Microsoft Excel Turn Key Read Dark Web Upgrades LiFi Wireless Headphones Google Drive Telephone Windows Server 2008 Health IT Notifications CCTV Migration Connected Devices Trojan Reliable Computing Equifax Spyware Fleet Tracking Mobile Payment Organize Business Metrics Computer Malfunction Network Management Vulnerability Device Management Digital Signature Deep Learning Device security Electricity MSP Printing Business Managemenet In Internet of Things Work/Life Balance Teamwork Content Management Bookmark Visible Light Communication Memory Nanotechnology Social Network Windows 7 Upselling Desktop Finance Video Surveillance Scalability IT consulting Startup cache Asset Tracking Television PDF Motion Sickness Business Cards Service Level Agreement online Currency Processor WannaCry Username Downloads Webinar Saving ZTime Unified Threat Management Backup and Disaster Recovery Best Available Keyboard Browsers Messenger Tracking LinkedIn Domains Advertising Flash Screen Reader Time Management Customer Resource management Freedom of Information User Tip Rental Service Meetings CIO Corporate Profile Gamification Debate Cabling Windows XP Smart Tech Assessment Distribution SharePoint Harddrive Web Server Staffing Google Wallet Piracy Upload Public Speaking Displays HTML Google Calendar Skype Wi-Fi Administrator Society Fiber-Optic Database Tip of the week Archive Shortcut Data Analysis GPS Books Workers VoIP Troubleshooting External Harddrive Touchscreen Telephone System News Entrepreneur Supercomputer Micrsooft Mobile Security Worker Multi-Factor Security Consultation Cost Evernote Point of Contact Environment Drones Software License Trends Knowledge Best Practives HIPAA Regulation Capital Productuvuty Managed IT Service 3D Printing Navigation CrashOverride Managing Stress Printers

toner1