pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Protecting Your Email Account

Email is a crucial application in today’s world. It is just as important for personal reasons as it is for business. It is essential in communicating with other people, signing up for events, managing memberships and a host of other reasons. But, email also has security issues if it is not properly protected. A compromised email box can be a security nightmare for an individual or a business. There is so much information in an email box that can wreak havoc if it falls into the wrong hands. But, there are some simple steps anyone can take to make sure their email box is safe from hackers and nefarious individuals.

Use Strong Passwords

You would be surprised how many people use simple, predictable passwords. At times, they are laughable. You do not want to be one of the people using simple passwords because you are just asking for your account to be hacked. Spend a few minutes thinking of a good password. Try to mix it with letters, numbers and special characters. Go a step further and use different passwords for each account that you have. You can use a password manager like Lastpass or Roboform to keep track of all the different websites. Just be sure you set a strong password to those programs as well.

Many emails are offering two-factor authentication as well. Strongly consider this as an options. It is one more step you have to go through to get into your email, but it greatly increases the strength of your password. The way it works, is you will have to enter your usual password. But, then the second step is to identify the actual person entering the password. This is typically done using a token. This is a random number that is generated every 30 seconds to two minutes. Typically these tokens are received in an app on a phone, a text message or a specialized piece of hardware.

Use Different Email Accounts

It may be a good idea to use different email accounts for different areas of your life. Create one for your personal life and one for your work life at the very least. This will keep mail from all different newsletters, friends, coworkers, etc getting comingled inside one email account. Then if the account does get compromised they will have keys to all areas of your life. Having different email accounts can, at the very least, minimize the impact if one of your accounts is taken over.

Be Careful with Links and Attachments

Viruses, malware and spyware can be spread using links and attachments in emails. If you become infected with one of these, you can become a spreader of the virus. But, you can also have your private information exposed to the person distributing the bug. Therefore, it is a good ideas to not click on links or open attachments unless the email is from someone you know and you know they are sending something. Just because you know them does not mean anything because they could be infected and sending you something that is meant to harm. If you receive an email from someone with a link or attachment, follow up with them and make sure they intended to send it.

Filed Under: Articles

Latest Articles

Safari Shortcuts to Make Your Day

Ask any avid Mac user their browser of choice and chances are you will hear them say Safari. But, there are non-Mac users that also prefer the Safari browser.  But, many do not know there are some great keyboard shortcuts to make this browser even more useful. This article will go over some of … [Read More...]

Key Steps to Improving Your Digital Marketing Knowledge

A decade ago, digital marketing was sold to small business owners as an extremely cheap and remarkably easy way of gaining visibility and connecting with consumers — and that might have been true a decade ago. These days, however, digital marketing is a much more difficult endeavor, requiring … [Read More...]

Utilization of New Software for Professional Trading Strategies

We have seen massive growth in the trade management software industry. Grandview Research reports that the market for these software applications is worth $1.43 billion. The market is growing even faster for trading software. The Value of Professional Trading Software … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

10 Exceptional Books on ChatGPT that Will Blow Your Mind

ChatGPT is a powerful new AI tool that is taking the world by storm. You are going to find a lot of amazing books that will teach you how to make the … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

SCSI Explained – With Pictures

As with most specifications in the computer world, the original SCSI (pronounced scuzzy) specification was completed (in … [Read More...]

7 Great Microsoft Word Hacks to Bolster Productivity

Today we are going to show you 24 Word tricks to get the most out of this text editor. Although there are many alternatives, Word is still the tool … [Read More...]

RAID tutorial – maintaining the RAID array

Since the context of this tutorial is a new system build, the configuration of of the RAID array was performed via the RAID Controller's BIOS Setup … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors