Business Information Security – Cybersecurity Services

Do you use your email correctly?

Karen Corredor Avila  // 31 July , 2018

E-mail is a fundamental communication tool in our days, both in the personal and in the business world. This makes it the target of cybercriminals, who use it to launch their attacks.

As Graham Cluley (Cybersecurity expert and award-winning freelance blog writer, researcher and speaker) says: ” Your email account is the center of your digital existence .”

The ‘phishing’ are emails that appear to come from legitimate entities and hide malicious codes. Currently it is not a new strategy, but it is still one of the most used.

From R3 CyberSecurity we recommend the following practices for a safe and responsible use of mail.

Cybersecurity recommendations for the use of electronic mail:

  • Configure the security measures provided by your server.

Always activate the double authentication factor. In the case of Gmail, for example, you can also disable access to mail through the POP3 and IMAP protocol.

  • Write in the browser the correct web and enter your keys there.

Never identify yourself in portals of which you are not 100% sure.

  • Use complex passwords and change them often.

From INCIBE point out that to ensure the security of a password, it must have more than 8 characters and include uppercase, lowercase and letters or characters.

  • Encrypt email in case of confidential information

We suggest that you include an application of data encryption (eg Enigmail ,  GPG  , Mailvelope ) to share sensitive information in a secure way or send a compressed and encrypted file.

  • Disable HTML

For critical information, it is advisable to disable the HTML of the mail. Cause from here, can be used of JavaScript options to infect the computer.

  • It’s best not open emails from strangers.

Although the majority of providers (Gmail, Hotmail / Outlook, Yahoo!) includes spam filters, it is better to be suspicious of the emails from unknown senders. Should not be answer to emails, click on the links or open the attached files. Taking special care with those that have a double extension, because they are usually Trojans or worms.

  • It’s best not send mass emails.

It if is not possible, use the CCO section (hidden copy) so that the addresses of your contacts are not visible and can be subject to spam.

  • Do not answer to spam emails.

An answer can show the spammer that the address is active.

  • Stay away from public WI-FI.

If you’re connected to the Internet via a public wireless network, the network traffic you send or receive can be intercepted by any of the users connected to that network.

use your email correctly

Karen Corredor Avila | Marketing Digital Assistant R3 CyberSecurity

Share it with your friends!




Meet all the professional opportunities that will allow you to achive your personal goals.

r3 cybersecurity

© R3 Cyber Security