Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Email Security Basics

Email Security Basics

Email is a modern classic as far as business solutions are concerned, and you’d be hard-pressed to find an office that didn’t use it in some capacity or another. However, because email is so popular, it has become a favorite attack vector of malicious users. Fortunately, there are some basic practices that will help keep your email account secure and your communications private.

Follow Password Guidelines
As you might imagine, one of the most important, basic ways that you can lock down your email account is to ensure that your password is sufficiently strong. Too often, breach statistics (and similar data sets) reveal that passwords are still overwhelmingly insecure. Pet names, birthdays and anniversaries, and favorite sports teams are used as passwords far more than they should be, as are common keyboard patterns, like qwerty, asdf, and the like. Some minimal social engineering could very easily provide someone with access to an email account they have no business being in.

To counter this, avoid the temptation to resort to formulaic, easy-to-guess password systems - like, for instance, smushing your alma mater’s mascot together with the number of your childhood home. Again, these password conventions are the first things that a cybercriminal will try if they want to get into your email account. Instead, do your best to rely on an as-random-as-possible string of numbers and letters - creating a different one for each of your accounts. This will ensure that your passwords are as strong as possible with the added benefit of protecting the rest of your accounts if one of your passwords is discovered.

Of course, for the sake of pragmatism, is it totally realistic to remember a completely random string of alphanumeric characters for everything that requires a password? For many, it isn’t. That’s why many resort to using, rather than a password, a passphrase. A passphrase takes a sentence memorable to the individual and turns it into a mnemonic device. So, a fan of films by Rob Reiner could take a line from one of his works and create a password from it, like “uRdBS” or “HFSTC” from The Princess Bride, or “UCHTT” from A Few Good Men.

Avoid the Unknown
Once you’ve accessed your email, there are a few ways that you can avoid putting yourself at risk. One very important way is to avoid the links in email unless you have verified that they do, in fact, go to (and come from) where they appear to.

First, where will the included link direct you? Links can be tricky things, which makes them a favorite of cybercriminals to use in emails. If the link is attached to text, you should hover over it and peek at the status bar that pops up before clicking on it. While the text might say that it brings you to the sender’s official webpage, the link could very well actually direct you to a domain that uploads a virus into your system. If the status bar says that you will be directed to someplace that doesn’t look quite right, skip the link.

You also shouldn’t blindly open an email that hasn’t come from a known or verified source, and even that can now be dangerous. There is a tactic that can be used to great effect as a way to snare even the most cybersecurity-mindful targets called email spoofing. As its name suggests, email spoofing is the act of forging an email’s header so that it appears to have come from someone else, likely someone trusted enough that the email will be opened, read, and interacted with.

As a result, it is best to verify the email with the cited sender whenever possible, through a different means of communication. Whether that means a quick phone call or instant message before you open the email, it is better to be safe than it is to be sorry.

What are some other ways that you keep your email from becoming a security risk? Share them in the comments, and make sure you take a moment and subscribe to this blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery AI Android Upgrade Disaster Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Information Miscellaneous Holiday Automation Cloud Computing Covid-19 Gadgets Training Server Compliance Managed Service Provider Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Business Technology Mobile Office Data Security Vendor Apps Two-factor Authentication Chrome Budget Networking Mobile Device Management Apple Gmail App BYOD WiFi Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Avoiding Downtime Marketing How To BDR HIPAA Applications Computing Access Control Information Technology Office 365 Hacker Conferencing Augmented Reality Healthcare Website Storage Password Managed IT Services Bring Your Own Device Router Big Data Operating System Virtual Private Network Health Risk Management 2FA Help Desk Computers Analytics Office Tips Retail Telephone Scam Data loss Cooperation Free Resource Project Management Firewall Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Going Green The Internet of Things Vendor Management Solutions Physical Security Social Cybercrime Display Printer Paperless Office Windows 11 Infrastructure Monitoring Customer Service Excel Document Management Remote Workers Money Maintenance Humor Antivirus Downloads iPhone Licensing Word Entertainment Sports Vulnerabilities Data Privacy Mouse Images 101 Administration Telephone System Multi-Factor Authentication Robot Mobility Cost Management Safety IT Management VPN Employees Meetings Settings Wireless Printing Integration Content Filtering User Tip Modem Computer Repair Mobile Security Processor YouTube Cryptocurrency Holidays Customer Relationship Management Data Storage Smart Technology Supply Chain Video Conferencing Virtual Desktop Data storage LiFi Machine Learning Managed Services Provider Hacking Saving Time Virtual Machines Presentation Professional Services Outlook Wireless Technology Managed IT Service Twitter Alerts SQL Server Technology Care Download Net Neutrality IP Address Financial Data Error History Business Communications Browsers Smartwatch Hacks Connectivity IT Scary Stories Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Recovery Fun Upload Procurement Social Network Telework Deep Learning Cyber security Hard Drives Multi-Factor Security Tech Human Resources CES Tablet IoT Communitications Domains Dark Web Cables Education Alert Trends Supply Chain Management Managed IT Customer Resource management FinTech File Sharing Regulations Refrigeration Dark Data Google Calendar Term Google Apps Data Analysis Mobile Computing Star Wars IT Assessment Public Speaking How To Microsoft Excel IT Maintenance Lithium-ion battery Notifications Staff Value Business Intelligence Search Gamification Flexibility Organization Best Practice Travel Social Networking Legislation Shortcuts Entrepreneur Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Buisness Ransmoware IT solutions Wearable Technology Memory Vendors Legal Content Remote Working Health IT Business Growth Unified Threat Management Motherboard Data Breach Undo Comparison Google Play Be Proactive Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Cortana Alt Codes Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Internet Exlporer Software as a Service Downtime Fraud Meta Username Hosted Solution Managing Costs Amazon Application Typing Point of Sale eCommerce Black Friday SSID Virtual Assistant Outsource IT Database Surveillance IBM Network Management Tech Support IT Technicians Virtual Machine Environment Knowledge Media Google Drive Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses 5G Tactics Development Unified Communications Websites Mirgation Hypervisor Displays Experience Google Docs Shopping Bitcoin Nanotechnology Optimization Competition Running Cable PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Google Wallet Addiction Management PCI DSS Chatbots Navigation Lenovo Gig Economy Windows 8 Screen Reader Laptop Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing User Drones Service Level Agreement Internet Service Provider Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Halloween Co-managed IT

Blog Archive