Tuesday, August 6, 2013

Protect Your Email

Internet security takes many forms and can be rather overwhelming to the average computer user.  I was reminded of this last week as I was asked to "repair" 4 infected computers.

The key is assessing risk and identifying which online activities pose the most significant threat.  Anyone with an e-mail address is exposed to a variety of Internet security threats including malware, phishing, and spyware. E-mail scams have become increasingly complex and more difficult to spot. 

There are a variety of simple e-mail security tips anyone can implement immediately with very little time or effort - so listen up.


All of these email internet security tips are easy to implement and will reduce the risk of data theft, malware, and viruses.

1. Use Multiple Accounts

The first way to make e-mail more secure is by using multiple accounts.  Using multiple e-mails spreads the risk of data theft across multiple secure accounts. If an e-mail account is compromised, only a small portion of personal data is vulnerable when multiple accounts are used.  One account should be closely guarded and only used for online financial transactions, such as banking and bill paying.  By doing this, users know that any e-mails from outside sources can be ignored.  Several other accounts can be created for social purposes, business, and newsletters.

2. Change Your Password Regularly

Regardless of how many e-mail accounts are used, every password should be changed regularly.    Additionally, every e-mail account should have a different password. If a different password is used for each account and a single account becomes compromised, the remaining accounts will remain secure, limiting the damage.

3. Be On The Lookout For Phishing

The number one Internet security threat associated with e-mail is phishing.  Malicious third parties send unsolicited e-mails in an attempt to gather information about the user.  For example, this tax season has introduced a variety of new targeted phishing attacks.  Third parties attempt to gather information by offering deals on tax filing services.  When a user fills out their tax information, the third-party will then have all of the information they need to steal the user’s identity.  It is even more dangerous now that many people have their refunds directly deposited into their bank account.

4. Scan Attachments

Viruses can be hidden in a variety of file types.  In a well-designed attack the user doesn’t even need to download the attachment to be at risk.

No comments:

Post a Comment