Best of the Week
Most Popular
1. Stock Markets and the History Chart of the End of the World (With Presidential Cycles) - 28th Aug 20
2.Google, Apple, Amazon, Facebook... AI Tech Stocks Buying Levels and Valuations Q3 2020 - 31st Aug 20
3.The Inflation Mega-trend is Going Hyper! - 11th Sep 20
4.Is this the End of Capitalism? - 13th Sep 20
5.What's Driving Gold, Silver and What's Next? - 3rd Sep 20
6.QE4EVER! - 9th Sep 20
7.Gold Price Trend Forecast Analysis - Part1 - 7th Sep 20
8.The Fed May “Cause” The Next Stock Market Crash - 3rd Sep 20
9.Bitcoin Price Crash - You Will be Suprised What Happens Next - 7th Sep 20
10.NVIDIA Stock Price Soars on RTX 3000 Cornering the GPU Market for next 2 years! - 3rd Sep 20
Last 7 days
Gold Predictive Modeling Suggests A New Rally Targeting $2300+, But When Will it Start? - 8th Mar 21
Gold: Crisis or Opportunity? - 8th Mar 21
US Bitter Cold Snap is a sign of the times - 8th Mar 21
How Scan Computers Builds Your Custom Built PC - Scan.co.uk Review (2) - 8th Mar 21
US Economy, GDP, Unemployment, Inflation Impact on House Prices Trend 2021 - 8th Mar 21
BACK TO SCHOOL - UK Coronavirus Lockdown Ending - Summer Holidays & Booming Economy Ahead - 8th Mar 21
So, Where Is Gold's Corrective Upswing? - 7th Mar 21
US Treasury Yields Rally May Trigger Stock Market Crazy Ivan Event - 7th Mar 21
The Great Reset Is Coming for the Currency - 7th Mar 21
Gold Continues Declines on Bond Yield Jitters - 7th Mar 21
The Case for Inflation - 7th Mar 21
Dow Short-term Stock Market Trend Analysis - 6th Mar 21
Intel Rocket Lake EXPLODE on Launch - 11th Gen CPU's RUN VERY HOT Bad Cinebench R20 Scores - 6th Mar 21
US & UK Head for Post Coronavirus Pandemic Lockdown Inflationary Economic BOOM - 6th Mar 21
FED Balance Sheet Current State - 5th Mar 21
The Global Vaccine Race Against Time and Variants - 5th Mar 21
US Treasury Yields Rally May Trigger A Crazy Ivan Event (Again) In Stock Market - 5th Mar 21
After Gold’s Slide, What Happens to Miners? - 5th Mar 21
Racism Pandemic Why UK Black and Asians NOT Getting Vaccinated - NHS Covid-19 BAME - 5th Mar 21
Get Ready for Inflation Mega-trend to Surge 2021 - 4th Mar 21
Stocks, Gold – Rebound or Dead Cat Bounce? - 4th Mar 21
The Top Technologies That Are Transforming the Casino Industry - 4th Mar 21
How to Get RICH Crypto Mining Bitcoin, Ethereum With NiceHash - 4th Mar 21
Coronavirus Pandemic Vaccines Indicator Current State - 3rd Mar 21
AI Tech Stocks Investing 2021 Buy Ratings, Levels and Valuations Explained - 3rd Mar 21
Stock Market Bull Trend in Jeopardy - 3rd Mar 21
New Global Reserve Currency? - 3rd Mar 21
Gold To Monetary Base Ratio Says No Hyperinflation - 3rd Mar 21
US Fed Grilled about Its Unsound Currency, Digital Currency Schemes - 3rd Mar 21
The Case Against Inflation - 3rd Mar 21
How to Start Crypto Mining Bitcoins, Ethereum with Your Desktop PC, Laptop with NiceHash - 3rd Mar 21
AI Tech Stocks Investing Portfolio Buying Levels and Valuations 2021 Explained - 2nd Mar 21
There’s A “Chip” Shortage: And TSMC Holds All The Cards - 2nd Mar 21
Why now might be a good time to buy gold and gold juniors - 2nd Mar 21
Silver Is Close To Something Big - 2nd Mar 21
Bitcoin: Let's Put 2 Heart-Pounding Price Drops into Perspective - 2nd Mar 21
Gold Stocks Spring Rally 2021 - 2nd Mar 21
US Housing Market Trend Forecast 2021 - 2nd Mar 21
Covid-19 Vaccinations US House Prices Trend Indicator 2021 - 2nd Mar 21
How blockchain technology will change the online casino - 2nd Mar 21
How Much PC RAM Memory is Good in 2021, 16gb, 32gb or 64gb? - 2nd Mar 21
US Housing Market House Prices Momentum Analysis - 26th Feb 21
FOMC Minutes Disappoint Gold Bulls - 26th Feb 21
Kiss of Life for Gold - 26th Feb 21
Congress May Increase The Moral Hazard Building In The Stock Market - 26th Feb 21
The “Oil Of The Future” Is Set To Soar In 2021 - 26th Feb 21

Market Oracle FREE Newsletter

FIRST ACCESS to Nadeem Walayat’s Analysis and Trend Forecasts

5 basic tips to help mitigate the vulnerability inherent in email communications

Personal_Finance / Cyber Crime Jun 24, 2019 - 03:09 PM GMT

By: Travis_Bard

Personal_Finance

Email is one of the most vulnerable areas in any network infrastructure. Why? Because any time you send an email, it leaves one network and moves into another.

While on transit, a sniffer can read the email, or, one of the servers between sender and receiver can intercept and save the email.




As such, no email-communication can ever be 100% secure. A recent survey confirmed how undefended emails were when it noted that 91% of all cyber-attacks are traceable to a phishing email. However, there are basic steps one can take to mitigate the vulnerability.

1. Filter spam mail

Filtering spam mail is essentially your first line of defense. Spam or junk mail comprises unsolicited messages that are sent in bulk to your email address. Often, these messages contain harmful or deceptive links that once you click will either lead you to a harmful site or download malware to your computer.



Note that even if you are extremely careful with who you disclose your email address to, at some point, someone will include you in a mass email and your email address will be out there.

A spam filter either dumps all the spam emails into a junk folder or ensures they never get into the network in the first place. That way, a lot of front-line risks are eliminated. With regards to filtering, you can either use the inbuilt spam filter that comes with the service, e.g., the Gmail spam filter or find a spam filtering software and incorporate it into your email service.

2. Use anti-phishing best practices

As noted above, phishing is a huge concern. While it is impossible to fine one foolproof method of protecting oneself against phishing, there are things you can do to reduce the chances of being a victim.

  • Avoid opening attachments and links from unknown sources.
  • To verify a link, go to the official website and find out if they are offering what the link says they are.
  • Never enter any personal or sensitive information in a pop-up screen. Even if you think the email is legitimate, go to the official website and log in from there. Also, keep in mind that legitimate organizations never ask for personal details via popups.
  • Use a phishing filter. A phishing filter is a software you can use with your email service, and it helps in filtering out any suspicious emails. A phishing filter can either place the email in a special inbox or strip the email of all links and attachments.

3. Opt for plain text over full XTHML or HTML

Depending on a particular setting or the email provider you are using; you can view your emails either in plain-text format or HTML.  The plain-text format is pretty much regular text which lacks formatting such as bold, italics, or any other special layout option.

HyperText Markup Language or HTML describes how an email template or website is coded to allow special formats and images.

By choosing to plain text over HTML, you reduce the chances of malicious people targeting you via a phishing attack or any other kind of attack because you will not be able to see the images that might entice you to click on a suspicious link.

4. Encrypt your email traffic using a VPN

Encryption is probably one of the most essential tips when it comes to email security basics. By default, most email providers secure email communications using the Secure Socket Layer (SSL) protocol and Transport Security Layer (TSL) protocol.

These two protocols encrypt the email traffic between your computer and the email server, for instance, between your computer and the Gmail server. However, as soon as the email leaves the server and it is on transit to the recipient, it is unencrypted. That is where VPN encryption comes in. 

A Virtual Private Network creates a secure connection over any network, including the public internet. It encrypts any outgoing data before transmission and only allows decryption at the authorized destination.

Consequently, malicious persons who wait for emails to be in transit to intercept them are unable to do so. Keep in mind that aside from a VPN, you can use a dedicated email encryption software such as PGP, although it will not be as comprehensive as a VPN.

5. Use strong passwords and multi-factor authentication

Strong passwords protect your email account from hackers. Normally, hackers will utilize brute force to try and crack passwords. Brute force involves trying or guessing different passwords until one lands at the right one.

The more intricate the password, the harder it is to guess. Go for long, random, and unique passwords for all your accounts.

Multi-factor authentication involves using more than one method to authenticate the user. That means in addition to a regular password; a one-time code is sent to a device, e.g., a phone. One must then submit this code before access is allowed. 

Final word

Other basic tips that you can keep in mind include attachment scanning software and switching to secure email providers instead of free ones. However, the five discussed are the most essential.

By Travis Bard

This is a paid advertorial.

© 2019 Copyright Travis Bard - All Rights Reserved Disclaimer: The above is a matter of opinion provided for general information purposes only and is not intended as investment advice. Information and analysis above are derived from sources and utilising methods believed to be reliable, but we cannot accept responsibility for any losses you may incur as a result of this analysis. Individuals should consult with their personal financial advisors.


© 2005-2019 http://www.MarketOracle.co.uk - The Market Oracle is a FREE Daily Financial Markets Analysis & Forecasting online publication.


Post Comment

Only logged in users are allowed to post comments. Register/ Log in

6 Critical Money Making Rules