631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

How to More Securely Utilize Your Email

How to More Securely Utilize Your Email

Studies have shown that email still has a safe place in the business world, with an estimated 124.5 billion business emails sent and received each day. However, are the emails that your business is actually receiving safe? If you aren’t adopting the following practices in your daily business operations, they probably aren’t.

With the right precautions, you and the rest of your team can keep your systems safer than the average business is from the threats that use email to propagate. Here, we’ve assembled some tips and practices to help you avoid email-based threats during your workday.

Filters Are Your Friend
Your employees have a job to do, one that (most likely) doesn’t include them prospecting their email accounts to determine if an email is safe to open or not all day long. In order to ensure that they at least have a chance of accomplishing things that are actually on their schedule, you should implement spam-blocking filters and antivirus software. These options are highly effective at blocking email-based threats, cutting back on the amount your employees need to worry about (but by no means eliminating the concerns).

Smarter Email Practices
In order to avoid the threats that remain, you need to ensure that your staff is using its email intelligently. While the filters we just discussed will help immensely, you also need to impress upon your staff the importance they have in your security equation.

As the backbone of your operations, your employees hold significant influence over how effective your IT security is. This is why cybercriminals so often turn to them as the way into your network. To keep your business safe, you need to make sure that your staff members are capable of spotting something “phishy,” and understand the procedures you have in place to avoid threats like these.

A few important tips to remember:

  • Avoid sending sensitive information over unencrypted email, and even then, send it only if absolutely necessary.
  • Disregard and delete unexpected emails from unknown contacts. Bonus “ignore” points if their messages are misspelled or they have an unsolicited attachment.
  • Avoid giving out your email if you can help it, or keep separate accounts going to avoid a threat sneaking into your actual, company-provided professional email.
  • Every user needs to utilize sufficiently secure passwords that they keep to themselves and change fairly frequently. This will help prevent unauthorized access to the account if an old password were to be leaked. Two-factor authentication is important here too.

Log Out When You’re Done!
If you ever find yourself in the position where you absolutely HAVE to use a publicly-accessible device to do work with your email, you need to do a few things. First, ask yourself if the task is really so important that it can’t wait until you have access to your own device on a secured Internet connection. If it really can’t wait, make sure you log out of everything you accessed on the public device, ideally wiping the history and the cache before fully restarting the machine.

For the sake of user convenience, computers and programs are now inclined to remember credentials and passwords, which is a dangerous thing to happen on a public device. Make sure that the device isn’t retaining any of your information before you leave; or, ideally don’t use a public device at all.

Suffolk Computer Consultants can offer you the solutions you need to keep your company email secure. To learn more, reach out to us at 631-905-9617.

Augmented Reality is Promising for Small Businesse...
Tip of the Week: Embrace the Right Software for Yo...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Cloud Privacy Productivity Network Security User Tips Cybersecurity Malware Communications Smartphones Tech Term Microsoft Managed IT Services Backup Hardware Efficiency Passwords Business Internet Google Email Communication Software Hackers Innovation Business Management Android Small Business Outsourced IT Hosted Solutions Ransomware Browser Collaboration VoIP Wi-Fi Mobile Device Data Data Backup Windows 10 Data Recovery Cloud Computing Smartphone IT Services Applications Social Media Alert Mobile Devices Holiday IT Support Internet of Things Microsoft Office Save Money Network Users Miscellaneous Business Intelligence Saving Money Bandwidth Employer-Employee Relationship Wireless Managed IT Services Computer Router Access Control Apps Password Twitter Automation Office 365 Workplace Tips Government Analytics Patch Management VoIP Settings BDR Vulnerability Data Management Business Continuity Blockchain Data Breach Phishing Virtualization Information Word Marketing Excel Gadgets Office Networking Wireless Charging Managed Service Website Hacking Company Culture G Suite Managed IT Service Politics Data Protection Physical Security Tech Terms Connectivity Paperless Office Gmail IT Support Compliance Cost Management Windows Spam Virtual Assistant Remote Monitoring Mobile Device Management Dark Web Law Enforcement Facebook Chrome WiFi Tip of the week Cybercrime Remote Computing Virus Retail Computers Scam Remote Monitoring and Management Artificial Intelligence Workers Battery Medical IT VPN Productivity Cortana Data Security How To BYOD Mobility App Profitability Travel Edge Threat Tablet Dongle Processors Value E-Commerce Hiring/Firing Telecommute Movies Authorization SaaS Lead Generation Mobile Security Training Storage Upgrade Bring Your Own Device Eliminating Downtime Live Streaming Staffing Laptop Printing Work/Life Balance Knowledge Files Telephony Spyware Plug-In Payment Telephone Systems Managed IT File Sharing Data loss Unified Communications Operating System Cables Security Cameras Botnet Remote Support Gadget Network Attached Storage Streaming Media Error Office Tips Information Technology Automobile User Tip Technology Tips Hybrid Cloud Wireless Internet WhatsApp Paper Google Drive Comparison Two-factor Authentication Printer Server Voice over IP HP Database Proactive IT instant Messaging Remote Control User Security Staff RAM Troubleshooting WannaCry Environment Voice over Internet Protocol Wearables Hard Drives Hosted Solution Shortcut Server Management Downloads Touchscreen Entertainment Biometrics Backup and Disaster Recovery Help Desk Recovery Ink Reporting Disaster Recovery Specifications Update Tech Support Cleaning Printers eCommerce Document Management Tactics Vulnerabilities Server Spam Blocking Maintenance Business Technology Websites Microsoft Teams HIPAA e-waste Healthcare Safety Copy Apple CrashOverride Trends Microsoft Office 365 Google Maps Access Telecommuting SSD Certification News IT budget PowerPoint Multi-Factor Security Conferencing Outlook Licensing Online Shopping Digital Internet Explorer Analysis Antivirus Email Management Sales Managing Stress Hard Drive disposal Amazon Paste iPhone Machine Learning A.I. Authentication Personal Information Millennials Inventory Telephone System Phone System IT Management Sports GDPR Big Data Education Spotify Smart Technology Content Filtering Gaming Console DDoS Instagram Money Customer Service Mobile Office Scalability Employer Employee Relationship Fun Video Games Domains Synergy IaaS Freedom of Information Worker Quick Tips Credit Cards Windows 10 Television Regulation Public Speaking Emoji HaaS Yahoo Presentation Printer Encryption Lithium-ion battery Search Unified Threat Management Augmented Reality Emergency Wireless Technology 5G Vendor Management Current Events Autocorrect IBM Leadership Hacker The Internet of Things Avoiding Downtime Budget Computer Care Dark Data Cryptocurrency Scheduling Competition Net Neutrality Customer Relationship Management Samsung Managed Service Provider IP Address

Newsletter Sign Up