{"id":310,"date":"2022-06-03T13:01:08","date_gmt":"2022-06-03T13:01:08","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2022\/06\/03\/secure-your-email-in-2022\/"},"modified":"2022-06-03T13:01:08","modified_gmt":"2022-06-03T13:01:08","slug":"secure-your-email-in-2022","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2022\/06\/03\/secure-your-email-in-2022\/","title":{"rendered":"Secure Your Email in 2022"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-279860 img-responsive alignright\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/06\/01165224\/Cloud-Email-Security-Tips.jpg\" alt=\"Blue background with a wooden lock and aroba\" width=\"250\" height=\"250\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/06\/01165224\/Cloud-Email-Security-Tips.jpg 250w, https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/06\/01165224\/Cloud-Email-Security-Tips-150x150.jpg 150w, https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/06\/01165224\/Cloud-Email-Security-Tips-100x100.jpg 100w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\"\/>Unfortunately, phishing is a widespread practice on the internet, with hackers attempting to access private files and utilize them against their owners. Whether this occurs in a business setting or directly to an individual\u2019s files, the perpetrator can gain access to valuable financial or private information.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Over 96% of phishing attacks arrive by email, making this the most pressing method to be aware of when staying safe online. Due to this majority, it\u2019s essential to understand how to manage your email security to reduce the possibility of falling prey to one of these threats.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Especially when running an enterprise, where users log onto a cloud email account associated with your business, it\u2019s essential that they don\u2019t accidentally expose company information. In this article, we\u2019ll be exploring the best three practices for cloud email security, helping keep you and your staff safe when using cloud email services.<\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<p style=\"text-align: center; color: #ff6600;\"><strong>Want More Tech News? Subscribe to <i>ComputingEdge<\/i> Newsletter Today!<\/strong><\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Passwords and the creation of strong passwords<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">A hacker can use the easiest method to gain entry to a cloud email account by simply guessing the password. While someone unfamiliar with security may think it strange that someone could guess a password, they fail to realize that this is typically an automatic process rather than a manual one.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Some hackers will have software that will actively enter password after password into the system, testing them out in a brute force attack method. One of the best ways of ensuring that this brute force method will not penetrate your account is to create a solid and complex password. While most of the time, these forms of passwords are recommended, it\u2019s always good to remind your employees that they should include:<\/p>\n<ul style=\"padding-left: 5%; color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 22px;\">\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">Non-sequential passwords (qwerty or abcd is a bad idea)<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">Use numbers<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">Use capitals<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">Use punctuation marks or additional signs<\/li>\n<\/ul>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">As the password becomes more complicated, even by adding one more character, it because much more difficult to guess. Equally, you should always be sure to use a different password for different accounts. This means that if one password is breached, it doesn\u2019t lead to the corruption of your whole account.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Multifactor Authentication<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Another surefire way to decrease the chances of a hacker gaining entry into your email account is to set up a multifactor authentication connected to the account. Services like Gmail offer this as a default setting, sending a notification to the user\u2019s mobile phone that asks them to confirm their identity before logging on.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">This two-step factor dramatically increases the potential of an employee to retain ownership of their account. Even if someone were to gain access to their password, they still wouldn\u2019t be able to get onto the account without hacking the user\u2019s mobile phone. Hacking both a laptop and a phone is very unlikely, making it harder to gain access.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The majority of cloud email security services now recommend incorporating MFA as a core pillar of security.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Employee Education<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">While this is the broadest tip, it is also perhaps the most important of all of them. When attempting to stay safe online, an individual needs to know precisely what acts as a danger and what is safe. Without this fundamental knowledge, they cannot effectively make decisions that will keep them safe.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Instilling a few core values and ideas with an individual can go a long way in helping them stay safe and recognize a threat before falling for it. First, when they receive an email from an email address they\u2019ve never had contact with, the best practice is to never open any links or attachments in that email.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Even if they seem correct, links can carry a user to a fake website where they\u2019ll enter their details and accidentally give away all of their login information. This is especially true when someone receives an email that seems to be from a service that they regularly use, like a bank. While the email address may seem similar, it could be slightly different, with a hacker emulating the email for nefarious purposes.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Equally, by educating people on what a typical phishing scam looks like, an individual will be more aware of any potential attacks that are being launched on them. It only takes a few minutes to email someone and double-checks if they\u2019re the person behind the email.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Additionally, it\u2019s always a good idea to avoid links over email. Instead of tapping on links, users should navigate from a blank homepage to the site they\u2019re directed to, ensuring they end up where they were meant to go.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">From email attachments to dodgy links, staying safe online is often more about common sense and recognizing the signs than anything else. By educating people on cybersecurity, your business won\u2019t be one of the 86% of organizations that experienced a phishing attack due to an employee clicking on a link they shouldn\u2019t have.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Final Thoughts<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">An email account is a treasure trove of information containing associated accounts, private files, and documents meant for the user\u2019s eyes only. Suppose a hacker can gain access to an email account. In that case, they have the potential to wreak havoc on the user, exposing their information, changing their passwords to other services, and holding their whole digital attack surface at ransom.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">To combat this, it\u2019s essential to take a holistic approach to email security. Not only should you educate people on the best internet safety practices, but also use the best email security tools. From investing in designated cloud email security programs to multifactor authentication channels, you can never be too careful about your personal information.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">If you\u2019re looking to stay safe online, incorporate these tips into your daily life. Together, they will significantly reduce the chance of your accounts falling into the wrong hands.<\/p>\n<\/p><\/div>\n<p><script>\n  !function(f,b,e,v,n,t,s)\n  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?\n    n.callMethod.apply(n,arguments):n.queue.push(arguments)};\n    if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';\n    n.queue=[];t=b.createElement(e);t.async=!0;\n    t.src=v;s=b.getElementsByTagName(e)[0];\n    s.parentNode.insertBefore(t,s)}(window,document,'script',\n    'https:\/\/connect.facebook.net\/en_US\/fbevents.js');\n  fbq('init', '2406379906149876');\n  fbq('track', 'PageView');\n<\/script><script>\n  !function(f,b,e,v,n,t,s)\n  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?\n    n.callMethod.apply(n,arguments):n.queue.push(arguments)};\n    if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';\n    n.queue=[];t=b.createElement(e);t.async=!0;\n    t.src=v;s=b.getElementsByTagName(e)[0];\n    s.parentNode.insertBefore(t,s)}(window,document,'script',\n    'https:\/\/connect.facebook.net\/en_US\/fbevents.js');\n  fbq('init', '721875948349197');\n  fbq('track', 'PageView');\n<\/script><br \/>\n<br \/>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/publications\/tech-news\/trends\/cloud-email-security-best-practices\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Unfortunately, phishing is a widespread practice on the internet, with hackers attempting to access private files and utilize them&hellip;<\/p>\n","protected":false},"author":1,"featured_media":311,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[66,252,19,2],"tags":[],"class_list":["post-310","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-email","category-security","category-tech-news-post"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=310"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/310\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/311"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}