Email Security Tips

It’s been a crazy year for data breaches, with so many high profile hacks, employees should take extra precautions to not become a victim. Sony Pictures was one example of this high profile breach, with sensitive emails being leaked to the public. Once these emails are out they can have severe consequences that are hard to mend. Employees cannot only look to the enterprise to keep these sensitive emails secure, they need to take matters into their own hands as well because everyone is accountable when it comes to a data breach.

5 Steps you can take to secure your emails:

  1. Create a unique password of 8-12 characters in random order. 
  2. Do not use public wifi. There are programs out there that monitor data flowing over computer network links, ands copy the data. This program goes by the names of “network sniffer”, and is used by many hackers. 
  3. Do not open unsolicited attachments. If you do not know who the sender is do not open it, unless you want a potential virus on your hands. 
  4. Be very wary of phishing scams. Never give out personal information over the web, no matter what the reason is. Many hackers try to get at you by stating they are having issues with one of your accounts and they need to troubleshoot the problem and need your credentials. Do not fall for these tricks. 
  5. Create separate email accounts. Do not store all your various account information in one email. Many of us use one email account for all our online banking, social media, and other personal accounts. If your one email account gets hacked, the hacker will have access to all your other accounts.


So let’s take a lesson from 2014, and be smart in the New Year. Protect yourself with these 5 simple steps.

Previous Post
Using a Botnet to “Crack” AES Encryption Keys?
Next Post
Security Mistakes To Avoid in the Office

Related Posts

SecTor 2014 – What We Learned

Last week, thousands of IT security professionals gathered in Toronto for the annual SecTor Security Conference to share compelling research and new techniques. From malware attacks to unencrypted stolen devices, data theft is rampant in the enterprise, and security solutions…
Read more

6 Best Practices for Secure Health Information

Holistic, comprehensive security strategies, centered on protecting data, not devices, are easier than ever thanks to current encryption technology. According to a recent Ponemon Institute study, over the last five years healthcare organizations have slowly increased their investment in data…
Read more

Identity and Access Management

At WinMagic data protection is our strong suit and we often talk about it on this blog. At the same time it’s good to remember that ensuring security of data at rest using encryption and strong key management are just…

The 5 Best ‘Tis the Season Security Posts

‘Tis the season to be jolly! We wanted to share the 5 best seasonal posts about security to help everyone stay safe because this is, unfortunately, also the season where Cyber criminals take advantage of unsuspecting people. So let’s make…
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.