Tip of the Month: Using Email While Prioritizing Safety and Security

Tip of the Month: Using Email While Prioritizing Safety and Security

You probably use your email every day without even thinking about it. Email is, however, one of the main places hackers go when they want to steal personal information. Here are three easy steps you can take to keep your email secure.

Use Strong, Unique Passwords

A strong password is like a firm lock on your front door: it should be tough to crack. Here’s how to make one:

  • Mix it up -Use a combination of letters (uppercase and lowercase), numbers, and symbols.
  • Be unique – Don’t use the same password for multiple accounts. If a hacker gets one password, they can get into everything.
  • Don’t use obvious info – Avoid using your name, birthday, or anything easily guessed. For the most secure password, try a random phrase that incorporates the above tips. 

Enable Two-Factor Authentication

Two-factor authentication (or 2FA) is like adding an extra lock to your door. When you turn on 2FA, you’ll need a code (often sent to your phone) each time you log in, along with your password. Even if someone gets your password, they can’t get in without that code. Here’s how to set it up:

  • Go to your email settings.
  • Look for security settings, and find two-factor authentication (sometimes called multi-factor authentication or verification)
  • Follow the steps, and you’ll be much safer from hackers.

Be Careful with Links and Attachments

Cybercriminals often use emails to try and trick you. If you get an email with a weird link or an unexpected attachment, that’s a red flag. Signs it could be fake include:

  • It’s from an unknown sender.
  • The email says urgent action is needed, like “reset your password now” or “claim your prize!”
  • There are spelling errors, strange phrases, or it just seems off.

If you’re unsure, don’t click on anything. Instead, try checking directly with the person or company who supposedly sent it, or just delete the email if it looks fishy. If you can’t verify the authenticity of the email, you should move on and report it to your IT administrator.

Email is an important part of doing business, and these three tips will help you keep your account and your organization’s data secure. For more great tips and tricks, check out our blog.

Related Posts

Tip of the Week: Zip and Unzip Compressed Files

Have you ever seen the file types that look like normal folders, but they have a zipper on the icon? These are ZIP files, and they are helpful for a variety of reasons. We’re sure you have encountered zipped files throughout your time using technology, and today, we want to demystify them a little bit and show you how to use them effectively. What are Zipped Files? The easy way to explain a ZI...

Five Password Best Practices You Must Keep in Mind for 2024

Passwords have long been one of the central pillars of account security on the Internet. Combined with a username, they make up the foundation of most login systems. Because of this, they are a hot commodity for hackers who want to steal credentials and infiltrate accounts or networks. In recent years, however, other security measures have exposed the weakness of poor passwords for security, leadi...

Update Your Computers’ OS to Keep Your Business Humming Along

An operating system is the main program on any device, like a computer, phone, or tablet, that helps it work. It's what lets you open apps, go online, and get stuff done! For businesses, keeping their OS updated is super important. Here’s why: Security Comes First Hackers are always finding new ways to sneak into computers and steal data. If a business has important information, like customer ...

Why (and How) SMBs Should Strategically Adopt Technology

There is no question that a small business can benefit from technology, as has been proven time and time again. However, an issue can arise if a business bites off more than it can chew, so to speak, and ultimately creates a spike in costs. A responsible business owner will resist this temptation and prioritize the solutions they need over the ones they want - building profitability and generating...