pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Keep Your Email Account Secure

Email has fast become one of the primary way people communicate. This is especially true in business. Email has become, perhaps, the most useful tool that has been spawned by the Internet. However, it has also become an area that can leave holes into our personal security. Accounts can be compromised and many people have a lot of private information inside of their email boxes. Here are a few tips you can employ to keep your email accounts safe.

Use Different Email Accounts

Many people use one email account for everything. They use it for work and personal communication. They give it to customers, suppliers, vendors, etc. Therefore, if someone breaks into that one account, then they have all of your information accessible.

A better idea is to use different emails for different aspects of your life. You should have different accounts for work and personal life at the very minimum. But, you could also consider a third one that can be used for recreation or all the various websites that you have to sign up for.

Use Strong Password Protection

This should go without saying, but you would be surprised how many people use simple passwords to protect their important email accounts. I have personally seen people use “Password” as their password. Some, will get creative, however and make it more complex like “Password1”. These passwords are so easy to crack and someone with the right tools could be in your account in seconds.

Therefore it is imperative that you use strong passwords on your accounts. Use multiple words and special characters. And, use a different password on each account. You can use a password management tool like LastPass to keep track of all of these.

Be Wary of Links and Attachments

If you receive emails with links and attachments, you need to tread carefully. Many hackers and viruses will use these as ways to spread their infection.

The first thing you need to look for is that you know the person sending the file. If you do not recognize them then don’t even hesitate to delete the email. But, that isn’t always foolproof. It could be that the person you know is infected with something. If you receive an email with a link or attachment from an acquaintance contact them and see if they intended to send it. If they did not, then delete it.

Watch out for Phishing Attacks

Phishing has become a more common way to steal information from people. It is a scam where people try to use email and social engineering to gain information for people. Many times they will pose as someone from a website like Facebook or a government agency like NSA. These emails should be ignored. This is especially true if they are asking for any personal information like passwords, social security, etc. Most legitimate organizations will not ask for this information through email.

Hopefully, these tips will help you keep your email account safe and secure. Do not let the usefulness of email be an entry point into your personal life. Use these tips to keep your account safe.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related

Filed Under: Articles

Latest Articles

USB Flash Drives – USB stick, USB RAM, Memory Stick

The near-ubiquitous USB flash drive is of course improperly named, as it has no drive as such, but the term was initially coined because the devices were seen as replacements for floppy disks drives for transferring data between PCs. The 1.44MB capacity limit of floppies was beginning to render them … [Read More...]

Super Floppies

The 200MB to 300MB range is best understood as super-floppy territory. This is about double the capacity of the would-be floppy replacements with performance more akin to a hard disk than a floppy disk drive. … [Read More...]

HDD Regenerator Review

HDD Regenerator HDD Regenerator is a program that is needed by all data recovery professionals. It's not really meant to recover files, but it is great for repairing bad sectors on hard drives. Once this is accomplished, then running a data recovery program on your drive should produce most, if … [Read More...]

2021 PC Hardware Releases to Bolster Your Gaming

If you are a PC gamer, then chances are you are looking to upgrade your kit over the coming year. However, a lot of money can go into building the … [Read More...]

New Transfer Feature in Dropbox Enable Sharing files with Third Parties

Dropbox has been a popular P2P sharing platform for many years. They don't announce new features as often as other applications, since they have a … [Read More...]

Ransomware Operators Find Data Theft Profitable

How valuable is your data? That’s not a question that organizations or individuals have to ask themselves all that often. You might know the market … [Read More...]

Engineers Encounter the Quantum Challenge with Computers Running a Hundred Million Times Faster

Quantum computers have been a subject of discussion for many years. They have probably been something that philosophers and technology pundits have … [Read More...]

Transferring Image Files from Your Cell Phone Without Cables or Email

You don't have a cable available to transfer the photos from your cell phone to your computer? You don't feel comfortable sending them through your … [Read More...]

Why Drupal Accessibility is Vital for Your Website

Drupal may not be as popular as WordPress, but it is still used in over 1 million websites. The Internet might be more conducive to our needs if more … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Updated List of Cybersecurity Best Practices for 2019

Online scams are becoming frighteningly common. The FBI released a report in 2018 showing that losses from online scams exceeded $1.4 billion the … [Read More...]

Defeating The Threats of A-Secure 2015

A-Secure 2015 is actually a fake and deceiving anti-virus program that will make you believe it’s a legitimate anti-virus protection program starting … [Read More...]

Flat Panel Feature Comparisons

The table below provides a feature comparison between a 13.5in passive matrix LCD (PMLCD) and active matrix LCD (AMLCD) and … [Read More...]

[footer_backtotop]

Copyright © 2021 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors