pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Protecting Your Email Account

Email is a crucial application in today’s world. It is just as important for personal reasons as it is for business. It is essential in communicating with other people, signing up for events, managing memberships and a host of other reasons. But, email also has security issues if it is not properly protected. A compromised email box can be a security nightmare for an individual or a business. There is so much information in an email box that can wreak havoc if it falls into the wrong hands. But, there are some simple steps anyone can take to make sure their email box is safe from hackers and nefarious individuals.

Use Strong Passwords

You would be surprised how many people use simple, predictable passwords. At times, they are laughable. You do not want to be one of the people using simple passwords because you are just asking for your account to be hacked. Spend a few minutes thinking of a good password. Try to mix it with letters, numbers and special characters. Go a step further and use different passwords for each account that you have. You can use a password manager like Lastpass or Roboform to keep track of all the different websites. Just be sure you set a strong password to those programs as well.

Many emails are offering two-factor authentication as well. Strongly consider this as an options. It is one more step you have to go through to get into your email, but it greatly increases the strength of your password. The way it works, is you will have to enter your usual password. But, then the second step is to identify the actual person entering the password. This is typically done using a token. This is a random number that is generated every 30 seconds to two minutes. Typically these tokens are received in an app on a phone, a text message or a specialized piece of hardware.

Use Different Email Accounts

It may be a good idea to use different email accounts for different areas of your life. Create one for your personal life and one for your work life at the very least. This will keep mail from all different newsletters, friends, coworkers, etc getting comingled inside one email account. Then if the account does get compromised they will have keys to all areas of your life. Having different email accounts can, at the very least, minimize the impact if one of your accounts is taken over.

Be Careful with Links and Attachments

Viruses, malware and spyware can be spread using links and attachments in emails. If you become infected with one of these, you can become a spreader of the virus. But, you can also have your private information exposed to the person distributing the bug. Therefore, it is a good ideas to not click on links or open attachments unless the email is from someone you know and you know they are sending something. Just because you know them does not mean anything because they could be infected and sending you something that is meant to harm. If you receive an email from someone with a link or attachment, follow up with them and make sure they intended to send it.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related

Filed Under: Articles

Latest Articles

Guidelines on Processing Big Data with Hadoop

We are observing an increasing number of social and industrial applications where the flow of data and information grows at an exponential rate, which generates databases of sizes that exceeds traditional media. In just one day, Google must process more than 20000 terabytes of information while NASA … [Read More...]

1T SRAM

Historically, while much more cost effective than SRAM per Megabit, traditional DRAM has always suffered speed and latency penalties making it unsuitable for some applications. Consequently, product manufacturers have often been forced to opt … [Read More...]

GoodDeals Ads Removal Tips and Tool

GoodDeals Ads is an adware application that displays pop up ads. It is very pervasive and shows ads on just about every page that you visit. This PUP (potentially unwanted program will display ads, popups, coupons. It will also underline words in the text you read and insert banners into the web … [Read More...]

2021 PC Hardware Releases to Bolster Your Gaming

If you are a PC gamer, then chances are you are looking to upgrade your kit over the coming year. However, a lot of money can go into building the … [Read More...]

New Transfer Feature in Dropbox Enable Sharing files with Third Parties

Dropbox has been a popular P2P sharing platform for many years. They don't announce new features as often as other applications, since they have a … [Read More...]

Ransomware Operators Find Data Theft Profitable

How valuable is your data? That’s not a question that organizations or individuals have to ask themselves all that often. You might know the market … [Read More...]

Engineers Encounter the Quantum Challenge with Computers Running a Hundred Million Times Faster

Quantum computers have been a subject of discussion for many years. They have probably been something that philosophers and technology pundits have … [Read More...]

Transferring Image Files from Your Cell Phone Without Cables or Email

You don't have a cable available to transfer the photos from your cell phone to your computer? You don't feel comfortable sending them through your … [Read More...]

Why Drupal Accessibility is Vital for Your Website

Drupal may not be as popular as WordPress, but it is still used in over 1 million websites. The Internet might be more conducive to our needs if more … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Identifying and Protecting Against the Most Dangerous Keyloggers

Keyloggers are among the most frightening tools in the hands of a skilled hacker. They are malicious devices or malware applications that enable … [Read More...]

5 Tips to Improve Your Data Security

In this day and age, data breaches are a major concern for many businesses across the globe. In the first six months of 2019, 4.1 billion records were … [Read More...]

Motherboard IDE Connections

IDE connectors, like floppy drive and other connectors, are keyed to ensure proper connection. Connect your IDE devices to the motherboard IDE … [Read More...]

[footer_backtotop]

Copyright © 2021 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors