Most Popular
1. It’s a New Macro, the Gold Market Knows It, But Dead Men Walking Do Not (yet)- Gary_Tanashian
2.Stock Market Presidential Election Cycle Seasonal Trend Analysis - Nadeem_Walayat
3. Bitcoin S&P Pattern - Nadeem_Walayat
4.Nvidia Blow Off Top - Flying High like the Phoenix too Close to the Sun - Nadeem_Walayat
4.U.S. financial market’s “Weimar phase” impact to your fiat and digital assets - Raymond_Matison
5. How to Profit from the Global Warming ClImate Change Mega Death Trend - Part1 - Nadeem_Walayat
7.Bitcoin Gravy Train Trend Forecast 2024 - - Nadeem_Walayat
8.The Bond Trade and Interest Rates - Nadeem_Walayat
9.It’s Easy to Scream Stocks Bubble! - Stephen_McBride
10.Fed’s Next Intertest Rate Move might not align with popular consensus - Richard_Mills
Last 7 days
THEY DON'T RING THE BELL AT THE CRPTO MARKET TOP! - 20th Dec 24
CEREBUS IPO NVIDIA KILLER? - 18th Dec 24
Nvidia Stock 5X to 30X - 18th Dec 24
LRCX Stock Split - 18th Dec 24
Stock Market Expected Trend Forecast - 18th Dec 24
Silver’s Evolving Market: Bright Prospects and Lingering Challenges - 18th Dec 24
Extreme Levels of Work-for-Gold Ratio - 18th Dec 24
Tesla $460, Bitcoin $107k, S&P 6080 - The Pump Continues! - 16th Dec 24
Stock Market Risk to the Upside! S&P 7000 Forecast 2025 - 15th Dec 24
Stock Market 2025 Mid Decade Year - 15th Dec 24
Sheffield Christmas Market 2024 Is a Building Site - 15th Dec 24
Got Copper or Gold Miners? Watch Out - 15th Dec 24
Republican vs Democrat Presidents and the Stock Market - 13th Dec 24
Stock Market Up 8 Out of First 9 months - 13th Dec 24
What Does a Strong Sept Mean for the Stock Market? - 13th Dec 24
Is Trump the Most Pro-Stock Market President Ever? - 13th Dec 24
Interest Rates, Unemployment and the SPX - 13th Dec 24
Fed Balance Sheet Continues To Decline - 13th Dec 24
Trump Stocks and Crypto Mania 2025 Incoming as Bitcoin Breaks Above $100k - 8th Dec 24
Gold Price Multiple Confirmations - Are You Ready? - 8th Dec 24
Gold Price Monster Upleg Lives - 8th Dec 24
Stock & Crypto Markets Going into December 2024 - 2nd Dec 24
US Presidential Election Year Stock Market Seasonal Trend - 29th Nov 24
Who controls the past controls the future: who controls the present controls the past - 29th Nov 24
Gold After Trump Wins - 29th Nov 24
The AI Stocks, Housing, Inflation and Bitcoin Crypto Mega-trends - 27th Nov 24
Gold Price Ahead of the Thanksgiving Weekend - 27th Nov 24
Bitcoin Gravy Train Trend Forecast to June 2025 - 24th Nov 24
Stocks, Bitcoin and Crypto Markets Breaking Bad on Donald Trump Pump - 21st Nov 24
Gold Price To Re-Test $2,700 - 21st Nov 24
Stock Market Sentiment Speaks: This Is My Strong Warning To You - 21st Nov 24
Financial Crisis 2025 - This is Going to Shock People! - 21st Nov 24
Dubai Deluge - AI Tech Stocks Earnings Correction Opportunities - 18th Nov 24
Why President Trump Has NO Real Power - Deep State Military Industrial Complex - 8th Nov 24
Social Grant Increases and Serge Belamant Amid South Africa's New Political Landscape - 8th Nov 24
Is Forex Worth It? - 8th Nov 24
Nvidia Numero Uno in Count Down to President Donald Pump Election Victory - 5th Nov 24
Trump or Harris - Who Wins US Presidential Election 2024 Forecast Prediction - 5th Nov 24
Stock Market Brief in Count Down to US Election Result 2024 - 3rd Nov 24
Gold Stocks’ Winter Rally 2024 - 3rd Nov 24
Why Countdown to U.S. Recession is Underway - 3rd Nov 24
Stock Market Trend Forecast to Jan 2025 - 2nd Nov 24
President Donald PUMP Forecast to Win US Presidential Election 2024 - 1st Nov 24

Market Oracle FREE Newsletter

How to Protect your Wealth by Investing in AI Tech Stocks

5 basic tips to help mitigate the vulnerability inherent in email communications

Personal_Finance / Cyber Crime Jun 24, 2019 - 03:09 PM GMT

By: Travis_Bard

Personal_Finance

Email is one of the most vulnerable areas in any network infrastructure. Why? Because any time you send an email, it leaves one network and moves into another.

While on transit, a sniffer can read the email, or, one of the servers between sender and receiver can intercept and save the email.




As such, no email-communication can ever be 100% secure. A recent survey confirmed how undefended emails were when it noted that 91% of all cyber-attacks are traceable to a phishing email. However, there are basic steps one can take to mitigate the vulnerability.

1. Filter spam mail

Filtering spam mail is essentially your first line of defense. Spam or junk mail comprises unsolicited messages that are sent in bulk to your email address. Often, these messages contain harmful or deceptive links that once you click will either lead you to a harmful site or download malware to your computer.



Note that even if you are extremely careful with who you disclose your email address to, at some point, someone will include you in a mass email and your email address will be out there.

A spam filter either dumps all the spam emails into a junk folder or ensures they never get into the network in the first place. That way, a lot of front-line risks are eliminated. With regards to filtering, you can either use the inbuilt spam filter that comes with the service, e.g., the Gmail spam filter or find a spam filtering software and incorporate it into your email service.

2. Use anti-phishing best practices

As noted above, phishing is a huge concern. While it is impossible to fine one foolproof method of protecting oneself against phishing, there are things you can do to reduce the chances of being a victim.

  • Avoid opening attachments and links from unknown sources.
  • To verify a link, go to the official website and find out if they are offering what the link says they are.
  • Never enter any personal or sensitive information in a pop-up screen. Even if you think the email is legitimate, go to the official website and log in from there. Also, keep in mind that legitimate organizations never ask for personal details via popups.
  • Use a phishing filter. A phishing filter is a software you can use with your email service, and it helps in filtering out any suspicious emails. A phishing filter can either place the email in a special inbox or strip the email of all links and attachments.

3. Opt for plain text over full XTHML or HTML

Depending on a particular setting or the email provider you are using; you can view your emails either in plain-text format or HTML.  The plain-text format is pretty much regular text which lacks formatting such as bold, italics, or any other special layout option.

HyperText Markup Language or HTML describes how an email template or website is coded to allow special formats and images.

By choosing to plain text over HTML, you reduce the chances of malicious people targeting you via a phishing attack or any other kind of attack because you will not be able to see the images that might entice you to click on a suspicious link.

4. Encrypt your email traffic using a VPN

Encryption is probably one of the most essential tips when it comes to email security basics. By default, most email providers secure email communications using the Secure Socket Layer (SSL) protocol and Transport Security Layer (TSL) protocol.

These two protocols encrypt the email traffic between your computer and the email server, for instance, between your computer and the Gmail server. However, as soon as the email leaves the server and it is on transit to the recipient, it is unencrypted. That is where VPN encryption comes in. 

A Virtual Private Network creates a secure connection over any network, including the public internet. It encrypts any outgoing data before transmission and only allows decryption at the authorized destination.

Consequently, malicious persons who wait for emails to be in transit to intercept them are unable to do so. Keep in mind that aside from a VPN, you can use a dedicated email encryption software such as PGP, although it will not be as comprehensive as a VPN.

5. Use strong passwords and multi-factor authentication

Strong passwords protect your email account from hackers. Normally, hackers will utilize brute force to try and crack passwords. Brute force involves trying or guessing different passwords until one lands at the right one.

The more intricate the password, the harder it is to guess. Go for long, random, and unique passwords for all your accounts.

Multi-factor authentication involves using more than one method to authenticate the user. That means in addition to a regular password; a one-time code is sent to a device, e.g., a phone. One must then submit this code before access is allowed. 

Final word

Other basic tips that you can keep in mind include attachment scanning software and switching to secure email providers instead of free ones. However, the five discussed are the most essential.

By Travis Bard

This is a paid advertorial.

© 2019 Copyright Travis Bard - All Rights Reserved Disclaimer: The above is a matter of opinion provided for general information purposes only and is not intended as investment advice. Information and analysis above are derived from sources and utilising methods believed to be reliable, but we cannot accept responsibility for any losses you may incur as a result of this analysis. Individuals should consult with their personal financial advisors.


© 2005-2022 http://www.MarketOracle.co.uk - The Market Oracle is a FREE Daily Financial Markets Analysis & Forecasting online publication.


Post Comment

Only logged in users are allowed to post comments. Register/ Log in