Tip of the Month: Using Email While Prioritizing Safety and Security

Tip of the Month: Using Email While Prioritizing Safety and Security

You probably use your email every day without even thinking about it. Email is, however, one of the main places hackers go when they want to steal personal information. Here are three easy steps you can take to keep your email secure.

Use Strong, Unique Passwords

A strong password is like a firm lock on your front door: it should be tough to crack. Here’s how to make one:

  • Mix it up -Use a combination of letters (uppercase and lowercase), numbers, and symbols.
  • Be unique – Don’t use the same password for multiple accounts. If a hacker gets one password, they can get into everything.
  • Don’t use obvious info – Avoid using your name, birthday, or anything easily guessed. For the most secure password, try a random phrase that incorporates the above tips. 

Enable Two-Factor Authentication

Two-factor authentication (or 2FA) is like adding an extra lock to your door. When you turn on 2FA, you’ll need a code (often sent to your phone) each time you log in, along with your password. Even if someone gets your password, they can’t get in without that code. Here’s how to set it up:

  • Go to your email settings.
  • Look for security settings, and find two-factor authentication (sometimes called multi-factor authentication or verification)
  • Follow the steps, and you’ll be much safer from hackers.

Be Careful with Links and Attachments

Cybercriminals often use emails to try and trick you. If you get an email with a weird link or an unexpected attachment, that’s a red flag. Signs it could be fake include:

  • It’s from an unknown sender.
  • The email says urgent action is needed, like “reset your password now” or “claim your prize!”
  • There are spelling errors, strange phrases, or it just seems off.

If you’re unsure, don’t click on anything. Instead, try checking directly with the person or company who supposedly sent it, or just delete the email if it looks fishy. If you can’t verify the authenticity of the email, you should move on and report it to your IT administrator.

Email is an important part of doing business, and these three tips will help you keep your account and your organization’s data secure. For more great tips and tricks, check out our blog.

Related Posts

Knowing, and Planning For, Your Organization’s Compliance Burden

Despite what detractors say, regulations are in place for good reason. They typically protect individuals from organizational malfeasance. Many of these regulations are actual laws passed by a governing body and cover the entire spectrum of the issue, not just the data involved. The ones that have data protection regulations written into them mostly deal with the handling and protection of sensiti...

This Guy Scams the Scammers for a Living

When you think of a scammer, you probably think of someone looking to take advantage of someone for their own gain. While this isn’t wholly inaccurate, another variety exists to acknowledge… those who aim to scam the scammers. Let’s consider one such white-hat scammer, or “scam baiter,” a content creator who uses the alias “Kitboga,” Kit for short. Kitboga’s story is an interesting one: After ...

Have You Ever Considered What a Ransomware Attack Would Do to Your Customers?

It can be too easy to look at ransomware as a business problem. After all, it attacks businesses, locking down their data for ransom, often selling it or spreading it, and sometimes altering it for the business if returning it at all. It can be too easy to overlook another impacted target in all the mess. What happens to the people whose data a business has collected and uses? The Impact of Ra...

Apple Users Hit with Rare Cyberattack: What Can We Learn?

On Wednesday, April 10, 2024, Apple deemed it necessary to send a rare alert to certain users via email, spread out across 92 nations. As Apple’s website states, these threat notifications “are designed to inform and assist users who may have been individually targeted by mercenary spyware attacks.” Let’s review these attacks so we all understand this threat better. What are Mercenary Attacks? ...