301-571-5040    Get SUPPORT

Washington Works Blog

Tip of the Week: Getting Back to Email Security Basics

Tip of the Week: Getting Back to Email Security Basics

Email is a particular favorite attack vector of many who would do wrong by your business, as it is easily one of the most used communications in most businesses today. Do your employees know how large of a responsibility they have to your business’ security just by using email? In order to prevent unfortunate security blunders, you need to make sure you and your employees know a few best practices when it comes to handling email securely.

For this week’s tip, we’ll review these best practices.

Passwords
Yes, it can be annoying to have to enter a password everywhere, and yes, it can be hard to remember a different one for every account. However, your employees need to know why they have to deal with these annoyances, too, and why they can’t just use their pet’s name with the year they graduated and call it a day.

The fact of the matter is, too many people want to do just that: significant personal detail, significant number, password done. Cybercriminals know this, and are more than willing to put in the time and effort to find out about one of your employees if it gets them access to a bigger prize. Using social engineering tactics and studying what they can of online activity, these criminals can gain a significant amount of information about your employees (or even you) with relatively little effort. Without better password practices put in place, they could then likely deduce the password of someone in your organization and from there, they’re in… especially if your email password is reused repeatedly to gain access to other facets of the business.

If remembering x-amount of different passwords is a concern, work with your team and implement a password manager, or a program specifically designed to protect passwords and reduce the number that have to be recalled.

Depending on how your company deals with email, for example, if you are using Outlook, your employees probably aren’t typing in their email passwords very often, if at all. This puts the email password even further from top of mind, but it’s important to remember that these passwords need to be changed regularly and kept secure.

2FA, or Two-Factor Authentication
What’s more secure than a password? Two passwords - or at least, a password and an additional code that is generated when an account is being accessed. This is how 2FA works - in addition to their usual password, an employee needs to provide a generated code (usually obtained via their mobile device) in order to access an account. As a result, a hacker who happened to steal some passwords from some database somewhere still wouldn’t have enough information to access your accounts--and because the second piece of authentication is delivered by some other means, like a number generated by an authentication app on the user’s mobile device, the hacker would have that much harder of a time obtaining that as well.

Clicking What Shouldn’t Be Clicked
There is an unfortunate tendency to automatically trust things that come in via our email, whether its an attachment or a link, as these are commonly used avenues for cyberthreats to come in by. This is probably because these attacks can be effective against any level of an organization - an intern could mistakenly let in a threat, as could the president or CEO and anyone in between.

These threats are often known as phishing scams, as the attacker simply casts out their net and waits for someone to take the bait. These scams often leverage emails that include links to quite convincing facsimiles of the site the link purports to direct to. Unfortunately, this only makes phishing a bigger threat.

Another favorite attack like this that cybercriminals like to use is to include a good, old-fashioned virus in an attachment. If you aren’t expecting an attachment in an email, don’t click it! In addition, it always helps to run a quick virus scan if you aren’t sure.

For help in running these scans and maintaining your security, or with any other IT questions you may have, you can always turn to the professionals at Washington Works. Reach out to us by calling 301-571-5040.

Which is Best for Your Server Needs, In-House or H...
WPA3 is Boosting Network Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 25 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Privacy Business Computing Malware Email Hackers Software Tech Term Network Security Business Internet Computer Hosted Solutions Backup Managed IT Services Mobile Devices Microsoft Data IT Support User Tips Ransomware Productivity Google Productivity Data Backup Data Recovery IT Services Smartphone Workplace Tips Android Efficiency Managed Service Provider Cloud Computing Outsourced IT Business Continuity Communication Small Business Paperless Office Encryption Office 365 Innovation Data Management Social Media Windows 10 Hardware Disaster Recovery Browser Remote Monitoring Save Money Business Management Work/Life Balance App Cybersecurity Facebook Server Infrastructure Tip of the week Bandwidth Unified Threat Management Phishing Government Smartphones BYOD Artificial Intelligence Wi-Fi Money Windows 10 Two-factor Authentication Chromebook Virtual Reality Collaboration Passwords Holiday Risk Management Apps Applications How To Antivirus BDR Managed Service Vulnerability SaaS IT Management Big Data File Sharing Internet of Things Managed IT Services Document Management Compliance Healthcare Hosted Solution Saving Money Word Password Network Employer-Employee Relationship Windows Chrome VoIP Point of Sale Telephone Systems HIPAA G Suite Automation Tech Support Computer Care Firewall Mobile Security Patch Management Vendor Management Scam Alert Politics Hacker Taxes Health Smart Technology Training Customer Relationship Management Data loss Information Samsung Websites How To Website Router Physical Security Twitter Computing VPN Quick Tips Data Security Blockchain Maintenance Botnet Business Technology Office Robot Server Management Gmail Virtual Private Network Automobile Regulations Storage Recovery Mobile Device IoT Machine Learning Identity Theft Remote Computing Computer Repair Digital Mail Merge WiFi Black Friday Social Networking Enterprise Resource Planning Files Virtualization Cabling Alerts Proactive Cleaning Legislation Chatbots Dongle Managed Services Provider VoIP Techology Travel Fraud Star Wars Cables WannaCry Shortcut Relocation Access Control Employee-Employer Relationship Search Firefox Superfish Augmented Reality Supercomputer Dark Web Nanotechnology Bring Your Own Device Upgrades Hard Disk Drive Processors Bluetooth Spyware Address GPS Cyber Monday Motherboard Mobile Read Only Licensing Remote Monitoring and Management Private Cloud Mouse Identity Service Level Agreement E-Commerce Avoiding Downtime IBM Motion Sickness Cost Management Wires Monitors SharePoint Remote Workers The Internet of Things Downtime IT Budget Microsoft Excel Screen Reader Vulnerabilities WPA3 Office Tips Microsoft Office Tracking Company Culture Cortana Disaster Black Market Heating/Cooling Gadgets Budget Web Server Cooperation Error Tablet Utility Computing Features Emoji Time Management Hotspot Assessment Crowdsourcing Downloads IT Technicians Networking Digital Payment Smart Tech Geography IT Consultant Fleet Tracking Electronic Medical Records Distributed Denial of Service Managing Stress Help Desk Uninterrupted Power Supply Servers Cameras Unified Threat Management Staff Communications Staffing Comparison Electronic Health Records Network Management Meetings Language Internet Exlporer Personal Information YouTube Multi-Factor Security Mirgation Professional Services Monitoring Update Upgrade Cybercrime Connectivity High-Speed Internet Managed IT Asset Tracking Legal Analytics Administrator Managed IT Service Modem Enterprise Content Management Law Enforcement CCTV User Error Settings Wireless Specifications Management Cyberattacks IT Support Touchscreen Spam Webcam Computing Infrastructure Value MSP Google Calendar USB Consulting Google Drive Permissions Development Social Corporate Profile Notifications Outlook Mobile Device Management Education Wearable Technology OneNote Sports Lenovo Break Fix Cookies Unified Communications IT Solutions Solid State Drive Statistics Gadget Printer Presentation Hard Drives Lithium-ion battery Wireless Technology 5G Safety Marketing CrashOverride Printers Competition IP Address Emergency Users Miscellaneous Hiring/Firing Customer Service Regulation Mobile Office Fun Domains Public Speaking