Most Popular
1. Banking Crisis is Stocks Bull Market Buying Opportunity - Nadeem_Walayat
2.The Crypto Signal for the Precious Metals Market - P_Radomski_CFA
3. One Possible Outcome to a New World Order - Raymond_Matison
4.Nvidia Blow Off Top - Flying High like the Phoenix too Close to the Sun - Nadeem_Walayat
5. Apple AAPL Stock Trend and Earnings Analysis - Nadeem_Walayat
6.AI, Stocks, and Gold Stocks – Connected After All - P_Radomski_CFA
7.Stock Market CHEAT SHEET - - Nadeem_Walayat
8.US Debt Ceiling Crisis Smoke and Mirrors Circus - Nadeem_Walayat
9.Silver Price May Explode - Avi_Gilburt
10.More US Banks Could Collapse -- A Lot More- EWI
Last 7 days
US Presidential Election Cycle and Recessions - 18th Mar 24
US Recession Already Happened in 2022! - 18th Mar 24
AI can now remember everything you say - 18th Mar 24
Bitcoin Crypto Mania 2024 - MicroStrategy MSTR Blow off Top! - 14th Mar 24
Bitcoin Gravy Train Trend Forecast 2024 - 11th Mar 24
Gold and the Long-Term Inflation Cycle - 11th Mar 24
Fed’s Next Intertest Rate Move might not align with popular consensus - 11th Mar 24
Two Reasons The Fed Manipulates Interest Rates - 11th Mar 24
US Dollar Trend 2024 - 9th Mar 2024
The Bond Trade and Interest Rates - 9th Mar 2024
Investors Don’t Believe the Gold Rally, Still Prefer General Stocks - 9th Mar 2024
Paper Gold Vs. Real Gold: It's Important to Know the Difference - 9th Mar 2024
Stocks: What This "Record Extreme" Indicator May Be Signaling - 9th Mar 2024
My 3 Favorite Trade Setups - Elliott Wave Course - 9th Mar 2024
Bitcoin Crypto Bubble Mania! - 4th Mar 2024
US Interest Rates - When WIll the Fed Pivot - 1st Mar 2024
S&P Stock Market Real Earnings Yield - 29th Feb 2024
US Unemployment is a Fake Statistic - 29th Feb 2024
U.S. financial market’s “Weimar phase” impact to your fiat and digital assets - 29th Feb 2024
What a Breakdown in Silver Mining Stocks! What an Opportunity! - 29th Feb 2024
Why AI will Soon become SA - Synthetic Intelligence - The Machine Learning Megatrend - 29th Feb 2024
Keep Calm and Carry on Buying Quantum AI Tech Stocks - 19th Feb 24

Market Oracle FREE Newsletter

How to Protect your Wealth by Investing in AI Tech Stocks

5 basic tips to help mitigate the vulnerability inherent in email communications

Personal_Finance / Cyber Crime Jun 24, 2019 - 03:09 PM GMT

By: Travis_Bard

Personal_Finance

Email is one of the most vulnerable areas in any network infrastructure. Why? Because any time you send an email, it leaves one network and moves into another.

While on transit, a sniffer can read the email, or, one of the servers between sender and receiver can intercept and save the email.




As such, no email-communication can ever be 100% secure. A recent survey confirmed how undefended emails were when it noted that 91% of all cyber-attacks are traceable to a phishing email. However, there are basic steps one can take to mitigate the vulnerability.

1. Filter spam mail

Filtering spam mail is essentially your first line of defense. Spam or junk mail comprises unsolicited messages that are sent in bulk to your email address. Often, these messages contain harmful or deceptive links that once you click will either lead you to a harmful site or download malware to your computer.



Note that even if you are extremely careful with who you disclose your email address to, at some point, someone will include you in a mass email and your email address will be out there.

A spam filter either dumps all the spam emails into a junk folder or ensures they never get into the network in the first place. That way, a lot of front-line risks are eliminated. With regards to filtering, you can either use the inbuilt spam filter that comes with the service, e.g., the Gmail spam filter or find a spam filtering software and incorporate it into your email service.

2. Use anti-phishing best practices

As noted above, phishing is a huge concern. While it is impossible to fine one foolproof method of protecting oneself against phishing, there are things you can do to reduce the chances of being a victim.

  • Avoid opening attachments and links from unknown sources.
  • To verify a link, go to the official website and find out if they are offering what the link says they are.
  • Never enter any personal or sensitive information in a pop-up screen. Even if you think the email is legitimate, go to the official website and log in from there. Also, keep in mind that legitimate organizations never ask for personal details via popups.
  • Use a phishing filter. A phishing filter is a software you can use with your email service, and it helps in filtering out any suspicious emails. A phishing filter can either place the email in a special inbox or strip the email of all links and attachments.

3. Opt for plain text over full XTHML or HTML

Depending on a particular setting or the email provider you are using; you can view your emails either in plain-text format or HTML.  The plain-text format is pretty much regular text which lacks formatting such as bold, italics, or any other special layout option.

HyperText Markup Language or HTML describes how an email template or website is coded to allow special formats and images.

By choosing to plain text over HTML, you reduce the chances of malicious people targeting you via a phishing attack or any other kind of attack because you will not be able to see the images that might entice you to click on a suspicious link.

4. Encrypt your email traffic using a VPN

Encryption is probably one of the most essential tips when it comes to email security basics. By default, most email providers secure email communications using the Secure Socket Layer (SSL) protocol and Transport Security Layer (TSL) protocol.

These two protocols encrypt the email traffic between your computer and the email server, for instance, between your computer and the Gmail server. However, as soon as the email leaves the server and it is on transit to the recipient, it is unencrypted. That is where VPN encryption comes in. 

A Virtual Private Network creates a secure connection over any network, including the public internet. It encrypts any outgoing data before transmission and only allows decryption at the authorized destination.

Consequently, malicious persons who wait for emails to be in transit to intercept them are unable to do so. Keep in mind that aside from a VPN, you can use a dedicated email encryption software such as PGP, although it will not be as comprehensive as a VPN.

5. Use strong passwords and multi-factor authentication

Strong passwords protect your email account from hackers. Normally, hackers will utilize brute force to try and crack passwords. Brute force involves trying or guessing different passwords until one lands at the right one.

The more intricate the password, the harder it is to guess. Go for long, random, and unique passwords for all your accounts.

Multi-factor authentication involves using more than one method to authenticate the user. That means in addition to a regular password; a one-time code is sent to a device, e.g., a phone. One must then submit this code before access is allowed. 

Final word

Other basic tips that you can keep in mind include attachment scanning software and switching to secure email providers instead of free ones. However, the five discussed are the most essential.

By Travis Bard

This is a paid advertorial.

© 2019 Copyright Travis Bard - All Rights Reserved Disclaimer: The above is a matter of opinion provided for general information purposes only and is not intended as investment advice. Information and analysis above are derived from sources and utilising methods believed to be reliable, but we cannot accept responsibility for any losses you may incur as a result of this analysis. Individuals should consult with their personal financial advisors.


© 2005-2022 http://www.MarketOracle.co.uk - The Market Oracle is a FREE Daily Financial Markets Analysis & Forecasting online publication.


Post Comment

Only logged in users are allowed to post comments. Register/ Log in