Skip to main content

Tech Tips - Email Security

Security tips for email users
Email has become an inevitable part of many of us. For day to day communications, people are now resorting to email more than the traditional snail mail. This is because of the advantages and flexibility offered by Email. At the same time, many are not aware of the lack of security of an Email. Hacking attempts, Phishing attacks, Spam mails, Identity theft etc are increasing day by day. So it is high time that you are aware of these threats and know how to protect yourselves.

The following are some important security tips that e-mail users should be aware off
·         1. One of the best tips to protect your email account is to create a strong password and keeping it confidential. Users often create passwords based on their names, date of births etc so as to remember them easily. This makes your email accounts more vulnerable. Virus or worms have the capability of guessing weak passwords.
2. Do not save the username and password of your email account on any system. Virus or worms make use of such saved username and password to propagate them.
3. Be careful when you open an email attachment. Any executable type of attachment has the potential to do much harm to your PC. An executable type attachment (a file with ‘exe’ extension) should not be opened unless it was specifically requested or is expected by you.
4. Make sure that you have installed good antivirus software before you access the email. Since email worms can multiply themselves and automatically sent to addresses found in the infected machines address list. Hence, knowing the sender of an email is not enough, the mail can still be infected. Use of good antivirus software could potentially reduce the risks.
5. Do not open email received in your mailbox without a ‘To’ address. Most of the spam mails are send as a bulk mail which will not have a ‘To’ address.
6. Avoid sending credit card numbers, account numbers etc via e-mail. Also do not send user names and passwords over email if you don't want to see your accounts compromised.
7. Avoid accessing your e-mail from an unsecured network or potentially compromised computers. This includes accessing from an Internet cafe. There can be key loggers running in those machines. Key loggers are software or hardware modules primarily meant to steal passwords and other sensitive inputs as they are typed into a terminal.
8. Install and configure a firewall program on your system. If you do not know, get the help of an authorized technician. This is especially true, if you are making use of the machine to access Internet Banking
9. Use email monitoring program. It will check the headers, attachments, source IP address and other necessary information before the email is delivered into your inbox. This way you can get rid of the unsolicited mass (spam) emails. Email monitoring program acts as a spam filter. 
10. Don’t open phishing emails. Phishing emails are legitimate looking emails that appear to come from the big companies like banks, eBay, Microsoft, American Online, Paypal etc. They generally inform that you have won the prizes / lottery, are selected for dream jobs, should give your user id / password / personal data for security reasons etc. All these types of emails are an attempt to steal your personal information. So never reply to these mails or click on links provided there.

Comments

Popular posts from this blog

Tech Tips - Turn on Delegate Access

Turn on Delegate Access A delegate automatically receives Send on Behalf permissions. This means your delegate can do the following: ·          Respond to a meeting request sent to you, the manager. ·          Receive meeting request responses sent to you, the manager. ·          Compose and send an e-mail message that, when received, will have Delegate Name   on behalf of   Manager Name   next to   From . By default, the delegate can read only the meeting requests and responses sent to the manager. The delegate does not have access to read any other messages in your   Inbox . 1.      On the   Tools   menu, click   Options . 2.      Click the   Delegates   tab, and then click   Add . If the   Delegates   tab or the   Add   button is mi...

How do I choose my password?

How do I choose my password? Your password is more than just a key to your online account. If your password falls into the wrong hands, someone can easily impersonate you while online, sign your name to online service agreements or contracts, engage in transactions, or change your account information. So, choose your password carefully and then keep it safe from others. A password is like a toothbrush: Choose a good one and don't share it. A Yahoo! password can be any length, and can contain spaces, symbols, or numbers. With so many options, you should be able to come up with a password that's easy for you to remember but impossible for someone else to figure out. A password is a secret that only you should know. Here are some tips for choosing a strong password - one that is difficult to guess. . Choose a password you'll remember. It should be memorable for you (so that you don't have to write it down or leave it in the open), but difficult for others to guess....

Tech Tip - How to Search Like a Pro

Technology Tip - How to Search Like a Pro The internet is big, really, really big.  And it keeps growing bigger every day.  If you want to search it effectively you’re going to need to develop a couple of tricks to help you narrow the search.  Here’s a few real easy ones to integrate into your next search: Using +, - and “ “ (quotes) to narrow your searches: Lets say you were looking up apples on   Google.com .  If you just type in “apples” you get 22 million returns.  A few more sites than you can check in an afternoon so lets narrow the search down.  Let's say that what you're really interested in is   green apples .  To see all the apple websites that also have the word “green” on them type this: Now you will only see those apple sites that also have the word green on them.  Unfortunately we are still getting almost 6 million returned websites: To narrow the search even more lets elimina...