Technology admin  

Know? – Email more security

How secure is the information you send via email?

Many people I talk to have the misconception that sending an email is just as secure as sending a letter through the US mail. Simply put, that’s not the case. The US Post has a secure process that includes controlled physical access to your letter by only approved and monitored equipment and staff.

By comparison, every email message you send travels through an unknown number of servers, switches, routers, and electronic equipment, bouncing along the digital highway on its way to its intended recipient. There is no way to control which wires, servers, and computers your email goes to, and anyone with the knowledge and timing can intercept, review, and alter any email that touches your electronic equipment. Then your email touches your team = they can do what they want with the information contained or attached.

That’s why I say that email is more like a postcard than a sealed envelope. Your information is actually out there and you never really know who may have read it along the way.

What about the email you receive?

In addition to worrying about the confidentiality and security of the information and files you send in outbound communications, you also have to worry about the emails that are received by your domain and downloaded to your email application. Just one wrong “OK” from you or an employee (or anyone on any computer) can wreak havoc on the machine itself, the network it’s connected to, and worse, can be replicated and sent to your contacts and therefore infect them too!

Three of the most common incoming email threats are:

1.PHISHING

According to the free encyclopedia wikipedia.com, phishing is any attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by posing as a trusted person or company in an electronic communication. Typically, phishing is carried out through email and instant messaging.

You’ve probably received messages like this, from banks, Paypal, credit card companies, and financial institutions, many of which you’ve never heard of or never have an account with (hence it’s called “fishing”). These messages can look real enough with appropriate logos and great motivational copy about some problem with your account; But do not be fooled!

Never navigate to your bank or other online service provider for which you need to enter a password through an email you receive. Never! (Read the sentence one more time so you don’t forget when you’re doing 100 other things!)

Instead, open a new, secure browser and sign in to find customer service information in your account. You can also call the customer service number listed on your online account to report the phishing email.

2. VIRUSES

A computer virus is a program that can copy itself onto a computer without the permission or knowledge of the user/owner. A computer virus reproduces by making copies of itself in the computer’s memory, storage, or network.

3. WORMS

A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other computers on the network. Unlike a virus, a worm does not need to be attached to an existing program. Worms typically damage the network, while viruses infect or corrupt files on a target computer.

In many cases, computer viruses and worms are an attachment or embedded link in an email.

That’s why you should never open an attachment or click a link in an email received from an unknown recipient. In fact, even if you know the sender, be careful and pay attention. How else can you be sure you’re not clicking something a contact may have done by mistake! Certainly, when in doubt, opt for no.

Let’s face it, email isn’t going away anytime soon.

That’s why it’s more important than ever that email users understand the inherent risks of transmitting personally identifiable or company information and records via email.

When used correctly and with the intent to protect your personal and business information, as well as the equipment you use, email can be the technology that literally sets you free—from your office, your desk, and even the 9-week grind. 5. . This is how I started!

But when it’s not used correctly, when social security and credit card numbers are openly e-mailed, bad, bad things happen (usually to very nice people!).

Don’t let that happen to you. Use email wisely.

Leave A Comment