5 ways to make your email safer in case of a hack attack  | Inquirer Technology

5 ways to make your email safer in case of a hack attack 

/ 03:38 PM December 20, 2014

LOS ANGELES — The Sony hack, the latest in a wave of company security breaches, exposed months of employee emails. Other hacks have given attackers access to sensitive information about a company and its customers, such as credit-card numbers and email addresses. One way hackers can sneak into a company is by sending fake emails with malicious links to employee inboxes. Here are five simple steps to make your email more secure and limit the harm a hacker can have:

1. ARCHIVE EARLY AND OFTEN

Most corporate email systems allow people to set up regularly scheduled archiving so that emails are moved off of the server after a certain number of days. You can still check archived emails on your work computer, but they are no longer easily accessible on websites outside the office or on your phone. That limits hackers’ ability to access those emails too. You can make exceptions for emails that you want to keep in your active inbox, and they won’t be archived.

Article continues after this advertisement

2. GET ORGANIZED

FEATURED STORIES

As emails come into your inbox, deal with them. Sort them into folders. This segments your data, requiring an attacker to know which folder to go to, or to take multiple steps to search for wanted information. Paired with archiving, it also ensures that what the hacker does compromise is limited and known for any future damage assessment. Sensitive information can also be removed from your inbox. For example, delete an email and save what you need to your hard drive or an external drive.

3. KEEP WORK AND PERSONAL EMAILS SEPARATE

Article continues after this advertisement

Don’t use your work email for personal email or activities online. That limits details a hacker can glean about you to conduct more sophisticated attacks targeting you as the entryway into your company’s system. For example, hackers can learn about your shopping habits or personal hobbies and use those to send a phishing email that appears to come from websites you bought goods from or read frequently. Phishing messages route you to a fake address and allow hackers to gain access to your system.

Article continues after this advertisement

4. DON’T CLICK ON UNEXPECTED LINKS AND ATTACHMENTS

Article continues after this advertisement

If you receive an email with a link or attachment you weren’t expecting, send the person a separate email asking whether the first email was legitimate. For links from companies such as banking institutions, hover your cursor over the hyperlink or right-click to show the link’s final destination. Before you click, make sure the address that pops up when you hover over the link matches where the hyperlink says you’ll be sent. If unsure, use a new window and physically type in the website’s address to conduct your business.

5. IF YOU SEE SOMETHING, SAY SOMETHING

Article continues after this advertisement

If your email is acting up or a link or attachment strikes you as strange, forward it to your IT department as quickly as possible. Your attention and fast response may prevent someone else at your company from making a mistake.

RELATED STORY

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

Obama says Sony made a mistake in pulling movie on N. Korea

TOPICS: Cyber attack, Email, hacking, security, Sony, technology
TAGS: Cyber attack, Email, hacking, security, Sony, technology

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our newsletter!

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

This is an information message

We use cookies to enhance your experience. By continuing, you agree to our use of cookies. Learn more here.