pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Protecting Your Email Account

Email is a crucial application in today’s world. It is just as important for personal reasons as it is for business. It is essential in communicating with other people, signing up for events, managing memberships and a host of other reasons. But, email also has security issues if it is not properly protected. A compromised email box can be a security nightmare for an individual or a business. There is so much information in an email box that can wreak havoc if it falls into the wrong hands. But, there are some simple steps anyone can take to make sure their email box is safe from hackers and nefarious individuals.

Use Strong Passwords

You would be surprised how many people use simple, predictable passwords. At times, they are laughable. You do not want to be one of the people using simple passwords because you are just asking for your account to be hacked. Spend a few minutes thinking of a good password. Try to mix it with letters, numbers and special characters. Go a step further and use different passwords for each account that you have. You can use a password manager like Lastpass or Roboform to keep track of all the different websites. Just be sure you set a strong password to those programs as well.

Many emails are offering two-factor authentication as well. Strongly consider this as an options. It is one more step you have to go through to get into your email, but it greatly increases the strength of your password. The way it works, is you will have to enter your usual password. But, then the second step is to identify the actual person entering the password. This is typically done using a token. This is a random number that is generated every 30 seconds to two minutes. Typically these tokens are received in an app on a phone, a text message or a specialized piece of hardware.

Use Different Email Accounts

It may be a good idea to use different email accounts for different areas of your life. Create one for your personal life and one for your work life at the very least. This will keep mail from all different newsletters, friends, coworkers, etc getting comingled inside one email account. Then if the account does get compromised they will have keys to all areas of your life. Having different email accounts can, at the very least, minimize the impact if one of your accounts is taken over.

Be Careful with Links and Attachments

Viruses, malware and spyware can be spread using links and attachments in emails. If you become infected with one of these, you can become a spreader of the virus. But, you can also have your private information exposed to the person distributing the bug. Therefore, it is a good ideas to not click on links or open attachments unless the email is from someone you know and you know they are sending something. Just because you know them does not mean anything because they could be infected and sending you something that is meant to harm. If you receive an email from someone with a link or attachment, follow up with them and make sure they intended to send it.

Filed Under: Articles

Latest Articles

Transfer Files From Old Computer to New Computer

When doing a PC to PC file transfer from your old computer to the new one you first need to decide on what files you need to copy over to your new computer. Most likely you will want most of your documents, pictures, music and videos. With a FileCenter's software it's easier to scan, manage and find … [Read More...]

Pentium 4 Fan

A boxed Pentium 4 processor includes a high quality unattached fan heatsink specifically designed to provide sufficient cooling to the Pentium 4 processor when used in a suitable chassis environment. The fan heatsink and clip assembly (A) comprises: B: Clip frame C: Clip levers D: … [Read More...]

What is a Digital CRT Monitor and How Does It Work

Nearly 99 percent of all video displays sold in 1998 were connected using an analogue VGA interface, an ageing technology that represents the minimum standard for a PC display. In fact, today VGA represents an impediment to the adoption of new … [Read More...]

Revolutionize Your Internet Experience with Orbi 960 – The Ultimate WiFi System

In a world where seamless connectivity is essential, slow and unreliable internet connections are a major problem. Whether you are running a business, … [Read More...]

Do You Need a VPN When Trading Cryptocurrency?

There’s no doubt that the biggest global industries in 2023 are tech-driven, while there remains a significant crossover between many of these … [Read More...]

Goodbye Bitcoin: the 3 alternative cryptocurrencies that have great upside potential, according to experts

Bitcoin has been a very lucrative investment for people that got into it early. One report from The Motley Fool pointed out that $10 of bitcoin … [Read More...]

Self-driving cars face their Achilles’ heel and may be targets of hackers

The market for self-driving cars is booming. Customers spent $22.22 billion on these autonomous vehicles in 2021 and they will likely spend more in … [Read More...]

How to avoid scams with bitcoin and other cryptocurrencies

Cryptocurrencies got a bad reputation when scams multiplied like ants on a piece of cake. Even today many people associate bitcoin and other … [Read More...]

WHAT IS CLOUD COMPUTING AND WHAT ARE ITS MAIN BENEFITS?

Users are Increasingly using cloud computing to store their information, which is replacing local storage. The business digitization process goes … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Essential Steps to Restore Lost Macbook Files

MacBooks are gaining tremendous popularity. They might soon overtake the total computers produced by the largest PC manufacturer. Apple reportedly … [Read More...]

Intel’s Triton Chipsets Explained – their history, architecture and development

Triton430FX Introduced in early 1995, the 82430FX - to give it its full name - was Intel's first Triton chipset and conformed to the PCI 2.0 … [Read More...]

DirectMusic Technology

The establishment of the MIDI protocol in 1982 enabled independent composers to effectively control the entire recording … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors