8 Email Security Tips You NEED to know.
In 2015, the number of emails sent and received per day was over 205 billion. By comparison, WhatsApp handles a meagre 65 billion message per day.
This figure of emails was then expected to grow at an average annual rate of 3% over the next four years, reaching over 246 billion by the end of 2019 (the equivalent of everyone on Earth sending 32 emails per day!).
Email is the primary method of communication in business, and is also a gateway for viruses and cyber-criminals to gain access to personal, sensitive or confidential information. It is due to this, that email security should not be taken lightly.
Interested in finding out about cyber security best practices? Download our FREE White Paper>>
-
Use strong passwords and keep them safe
As long as cyber-security tips have been around, having a strong, unique password has always been one of them. This applies more than ever for email security.
People often forget about the importance of creating a strong password and use easily guessable passwords out of convenience. These weak passwords are never going to protect your business from cyber-criminals with the tools available today. The tools used run millions of combinations until they hit yours, therefore, the more complex a password you use, the longer it will take the software to guess it.
On a basic level, passwords should be over eight characters, include a mixture of lower and upper case letters, a number and a symbol. If you’re ready to break apart from old ways and learn some new ways of creating a password that works, our recent blog post goes through how to make a password that doesn’t SUCK.
Additionally, ensure that you keep your passwords safe and to yourself. Avoid sharing them with colleagues or writing them down. Password managers are great for logging your passwords so you don’t have to worry about remembering them. All you need to remember is the master password to get into the app. LastPass and Dashlane are two popular examples of password manager’s people use.
-
Add an ‘extra’ layer
Cyber-criminals are advancing exponential rate and passwords are now not enough to keep your account out of some hacker’s hands.
Email is the primary route for cyber-criminals to gain access and compromise your business’ data. Therefore, adding an ‘extra’ layer such as two-factor authentication is one of the most effective ways of protecting your email account and your business’ data.
Two-factor authentication is straight forward and most common email providers such as Microsoft and Google offer it as a standard. It works by sending a randomly generated code to your phone via text or a code generator app. You will then be prompted to fill this code in to gain access to your account. Two-factor authentication is often referred to as something you ‘know’ and ‘have’.
-
Use SPAM filters
There is no doubt that spam emails are annoying, but they can be dangerous as well. Spam filters will remove these unwanted and potentially dangerous emails from your inbox so you don’t have too. The result of this? Employees won’t be able to click on potentially harmful links or attachments, and an increase in productivity! Here at entrustIT spam filters are built into our Hosted Desktops.
-
Avoid using public Wi-Fi
Public Wi-Fi is everywhere and while it may be tempting to connect to check your emails if you’re sat at the airport waiting for that flight that’s been delayed, or if you’re enjoying a coffee at Starbucks, you shouldn’t. Public Wi-Fi is never secure and where the data passing through the network is unencrypted and unsecured, cyber-criminals love it.
Cyber criminals are often referred to as black hat hackers violate computer security for personal gain where as someone who hacks for ethical reasons to protect systems and people is referred to as a white hat hacker.
Both types of hackers use ‘network sniffers’, however, black hat hacker’s use it to hack public Wi-Fi. The network sniffer works by analysing the data flowing through the network to find important information such as your username and password.
If you are unable to connect to a secure Wi-Fi to log into your email, use your mobile internet which is much more secure than any public Wi-Fi connection.
-
Watch out for phishing emails
Phishing has become a popular form of attack for cyber-criminals. To do this they use deceptive emails to trick victims into clicking on links, downloading attachments or sending personal information. Below are some key tips when detecting a phishing email:
- Check the email address, not just who it is from. Cyber-criminals like to spoof the display name to appear as the email is coming from someone you know.
- Check for any grammatical errors as well as spelling mistakes. If an email is legitimate, it won’t have poor grammar or spelling mistakes.
- Don’t give up any personal information. Most companies do not ask for this over email.
- Beware of urgent or threatening language in the subject line. Attackers do this in phishing emails to create a sense of urgency or panic, hoping it will get you to respond.
- Avoid clicking on links unless you are sure of who it is sent from. Links in phishing emails can take you to sites that can be harmful to your computer.
Be wary. Hackers are becoming increasingly sophisticated, so it is becoming increasingly difficult to detect phishing scams unless you pay attention to detail.
-
Don’t open unexpected attachments
Attachments can be a tricky element when it comes to email. If you are expecting something from a colleague in the accounts department, then the chances of it being dangerous are low. However, if something unexpected comes through it always pays to be watchful. Most computer viruses are spread by email attachments, so if you are unsure give the person a call to confirm that they sent it.
File names can be spoofed and then easily infect your computer with viruses or malware. If you right-click the name of the attachment and look at the properties, you will be able to see what file extension it has. Files with .exe, .bat, and .com should not be opened.
-
Scan emails for viruses and malware
Keeping your computer from widespread malware and email viruses can be difficult when cyber-crime is on such a steep rise. Therefore, a strong defence is needed to keep your computer and business safe. A good anti-virus scanning software will have tools in place that allow you to schedule a time for an automatic regular scan as well as scanning emails as they come in.
Whilst not every email that comes in is going to contain viruses or malware, it’s better to be safe than sorry. If you are suspicious of an email, take the time to scan it for viruses and malware.
-
Always log out
Whether you are popping to get something at lunch or leaving for the day, ensure you always log out of your emails. You never know who could walk past and have free access if you aren’t there.
Cyber-criminals are everywhere, and although email is the prime target for them, you and your employees can significantly reduce the risk of this by following the tips above. Remember - You are only as strong as your least informed employee.
Want to find out about cyber security in general? Download our FREE White Paper >>
Subscribe here!
Recent Posts
Posts by tag
- technology (124)
- Security (97)
- cyber security (85)
- IT Security (81)
- Cloud (65)
- Microsoft 365 (63)
- modern technology (62)
- Managed Service (60)
- business (60)
- cloud computing (59)
- cyber attack (54)
- workplace (54)
- IT support (53)
- cloud it (53)
- Microsoft Teams (52)
- microsoft (51)
- Working from home (50)
- productivity (47)
- office (46)
- cybersecurity (44)
- office 365 (44)
- IT (41)
- Uncategorised (38)
- employees (38)
- entrustit (38)
- flexible work (36)
- Password Security (34)
- Remote (33)
- efficiency (31)
- Hosted Workspace (30)
- hosted desktop (30)
- schools (29)
- independent schools (28)
- school ict (27)
- collaboration (26)
- 2023 (25)
- Cyber (24)
- cyber privacy (22)
- public cloud (22)
- computing (21)
- email security (20)
- password (20)
- it support bournemouth (19)
- passwords (19)
- entrust (18)
- hosted applications (18)
- VoIP (17)
- cloud voip (17)
- covid19 (17)
- hacking (17)
- private cloud (17)
- data (16)
- it support dorset (16)
- teamwork (16)
- Coronavirus (15)
- GDPR (14)
- hackers (14)
- office 365 support (14)
- ransomware (14)
- IT audit (13)
- Protection (13)
- cloud cctv (13)
- covid-19 (13)
- hack (13)
- it support hampshire (13)
- management (13)
- network (13)
- Hosted Desktop and Applications (12)
- Windows Virtual Desktop (12)
- cctv (12)
- hardware (12)
- internet (12)
- it consultancy (12)
- 2020 (11)
- 2022 (11)
- hybrid cloud (11)
- internet safety (11)
- IT costs (10)
- Microsoft Planner (10)
- data breach (10)
- it consultancy bournemouth (10)
- it support southampton (10)
- it support winchester (10)
- phishing (10)
- vulnerabilities (10)
- windows (10)
- windows 10 (10)
- Backup (9)
- bitwarden (9)
- digital (9)
- it consultancy hampshire (9)
- telephony (9)
- attack (8)
- communication (8)
- desk phone (8)
- education (8)
- eu (8)
- it consultancy dorset (8)
- it consultancy southampton (8)
- msp (8)
- planning (8)
- software (8)
- staff (8)
- uk (8)
- Google (7)
- OneDrive (7)
- infrastructure (7)
- mobile (7)
- offsite backup (7)
- outsource (7)
- partnership (7)
- 2019 (6)
- Apple (6)
- Hampshire (6)
- IT Director (6)
- Skype for Business (6)
- apps (6)
- architect (6)
- child protection (6)
- cloud storage (6)
- european union (6)
- hacks (6)
- legal (6)
- legal it (6)
- mobile phones (6)
- onsite backup (6)
- password manager (6)
- remote desktop service (6)
- usecure (6)
- virus (6)
- 3d design desktop (5)
- Azure (5)
- Bournemouth (5)
- Desktop (5)
- ISO (5)
- News (5)
- Risk assessment (5)
- Windows 7 (5)
- awards (5)
- brexit (5)
- designer (5)
- personal data (5)
- resources (5)
- smartphone (5)
- website (5)
- Access Management (4)
- BYOD (4)
- Dorset (4)
- Facebook (4)
- Government (4)
- SharePoint (4)
- VPN (4)
- WannaCry (4)
- ios (4)
- law (4)
- legacy (4)
- proactive (4)
- remote learning (4)
- 2021 (3)
- 2024 (3)
- Attacks (3)
- Case Studies (3)
- General (3)
- Google Drive (3)
- Help (3)
- IP (3)
- Microsoft Forms (3)
- NHS (3)
- New Forest (3)
- Zoom (3)
- big switch off (3)
- budgets (3)
- citrix (3)
- closed cloud (3)
- ddos (3)
- digital hub (3)
- disaster recovery (3)
- guide (3)
- instagram (3)
- internet of things (3)
- meetings (3)
- sme (3)
- storage (3)
- surrey (3)
- teaching (3)
- trump (3)
- twitter (3)
- 2016 (2)
- 2018 (2)
- CAD (2)
- DR (2)
- DR planning (2)
- Environment (2)
- Firewall (2)
- Gen Z (2)
- ISBA (2)
- Local (2)
- Macs (2)
- Microsoft Copilot (2)
- PaaS (2)
- Tiva (2)
- android (2)
- artificial intelligence (2)
- award winning (2)
- bcs (2)
- broadband (2)
- camcloud (2)
- computer performance (2)
- digital transformation (2)
- downtime (2)
- dropbox (2)
- exhibition (2)
- finalist (2)
- innovation (2)
- legalex (2)
- london (2)
- macos (2)
- online meetings (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- strategy (2)
- united kingdom (2)
- us (2)
- video conferencing tools (2)
- 1998 (1)
- 5G (1)
- AI (1)
- AMD (1)
- ARM (1)
- Abbey Hill (1)
- Aldwickbury Park (1)
- BBC (1)
- BUNKERS! (1)
- Birchwood Park (1)
- Burhill (1)
- Burhill Group (1)
- Burnout (1)
- CEO (1)
- ChatGPT (1)
- Cloudtango (1)
- GPT-4 (1)
- Go Integrator (1)
- Hoebridge (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Leaders (1)
- Loop (1)
- MFA (1)
- MSP Select 2024 (1)
- Market (1)
- May (1)
- Mr Mulligans (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- Ninja Warrior UK (1)
- PBX (1)
- PM (1)
- Power BI (1)
- Privacy Shield (1)
- Ramsdale Park (1)
- Redbourn (1)
- Regulation (1)
- Surrey Business Awards (1)
- Sydenhams (1)
- Tech Company of the Year (1)
- The Business Magazine (1)
- Thornbury (1)
- WCry (1)
- WannaCrypt (1)
- Wifi (1)
- Wycombe Heights (1)
- acquisition (1)
- afc bournemouth (1)
- afcb (1)
- ashley madison (1)
- b2b (1)
- bandwidth (1)
- battersea (1)
- beach (1)
- big data (1)
- bloatware (1)
- blockchain (1)
- builders merchant (1)
- cambridge analytica (1)
- canada (1)
- cia (1)
- clinton (1)
- cnn (1)
- copilot (1)
- copilot pro (1)
- copyright (1)
- cryptocurrency (1)
- dark web (1)
- dns (1)
- donald (1)
- dyn (1)
- east grinstead (1)
- election (1)
- equality (1)
- executive order (1)
- farnham (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- intel (1)
- intelligence (1)
- josh widdicombe (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- machine learning (1)
- meltdown (1)
- millennials (1)
- mirai (1)
- no-deal (1)
- onsite (1)
- paper (1)
- patisserie valerie (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- procrastination (1)
- recruitment (1)
- research (1)
- serval systems (1)
- sharefile (1)
- smishing (1)
- snowden (1)
- solent (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- sterling (1)
- storm (1)
- talktalk (1)
- trumppresident (1)
- ukitawards (1)
- united states (1)
- usa (1)
- vault 7 (1)
- vitality stadium (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- wireless internet bournemouth (1)
- wireless internet southampton (1)
- women in business (1)
- xiongmai (1)
- year (1)