Did you know? – Email more security

How secure is the information you send via email?

Many people I talk to are under the misperception that sending an email is just as secure as sending a letter through the US Mail. Simply put, that’s not the case. The US Post has a secure process that includes controlled physical access to your letter only by approved and monitored equipment and personnel.

By comparison, each email message you send travels through an unknown number of servers, switches, routers, and electronic equipment, bouncing along the digital highway on its way to the recipient. There is no way to control which wires, servers and equipment your email goes to and anyone with the right amount of time and knowledge can intercept, review and alter any email message that touches your electronic equipment. So your email touches their team = they can do whatever they want with the information contained or attached.

That’s why I say that email is more like a postcard than a sealed envelope. Your information is truly out in the open and you never really know who may have read it along the way.

What about the email you receive?

In addition to worrying about the confidentiality and security of the information and files you send in outgoing communications, you also have to worry about the emails that are received by your domain and downloaded to your email application. Just one wrong “OK” by you or an employee (or anyone at any computer) can wreak havoc on the machine itself, the network it’s connected to, and worse, replicated and sent to your contacts. and thus infect them too!

Three of the most common incoming email threats are:

1.PHISHING

According to the free encyclopedia wikipedia.com, phishing is any attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by impersonating a trusted person or company in an electronic communication. Phishing is usually carried out through email and instant messaging.

You’ve probably received messages like this, from banks, Paypal, credit card companies, and financial institutions, many of whom you’ve never heard of or never have an account with (hence why it’s called “fishing”). These messages can look real enough with appropriate logos and great motivational copy about something wrong with your account; But do not be fooled!

Never navigate to your bank or other online service provider that you need to type a password for via an email you receive. Never! (Read the sentence one more time so you don’t forget when you’re doing 100 other things!)

Instead, open a new, secure browser and sign in to find customer service information on your account. You can also call the customer service number listed in your online account to report the phishing email.

2. VIRUSES

A computer virus is a program that can copy itself onto a computer without the permission or knowledge of the user/owner. A computer virus reproduces by making copies of itself in the computer’s memory, storage, or network.

3. WORMS

A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other computers on the network. Unlike a virus, a worm does not need to attach itself to an existing program. Worms typically damage the network, while viruses infect or corrupt files on a target computer.

In many cases, computer viruses and worms are an attachment or link embedded in an email.

That’s why you should never open an attachment or click on a link in an email received from an unknown recipient. In fact, even if you know the sender, be careful and pay attention. How else can you be sure you’re not clicking on something a contact may have done by mistake! Certainly, when in doubt, opt for no.

Let’s face it, email isn’t going away any time soon.

That’s why it’s more important than ever that those who use email understand the inherent risks of transmitting company or personally identifiable information and records via email.

When used correctly and with the intention of protecting your personal and business information, as well as the equipment you use, email can be the technology that literally frees you from your office, your desk, and even the 9- 5. . That’s how I started!

But when it’s not used correctly, when social security and credit card numbers are openly emailed, bad, bad things happen (usually to very nice people!).

Don’t let that happen to you. Use email wisely.

Leave a Reply

Your email address will not be published. Required fields are marked *