How Safe is Your Email?

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Northern Colorado small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

Spam Inundation

If you've been using email for a while either professionally or personally you have almost certainly gotten email from people you don't know. Most of these emails are blatantly unwanted while others can look 'almost' legit, as if a real person is trying to contact you. Often (and unfortunately) spammers can get your email address when you put it online or use it to register for accounts on sites on the internet. The good news is standard spam protection is getting better these days, and more advanced spam protection is cost effective for businesses that need the extra layer of protection. Spam can cause a lot of harm for a business network if it isn't kept under control - spam can bog down email servers and eat up network bandwidth and plus it drastically slows down employee productivity because they need to sift through it all just to find their real email. If you and your staff are getting more than a few spam emails a day, contact us at 970-526-6499 and ask about our anti-spam solutions.

Don't Open Attachments from Unsolicited Emails

This has been a golden rule for general email usage for a very long time. If you received an email from a stranger and there is an attachment, don't touch it. If you receive an email from a contact and there is an attachment, but anything is suspicious, don't touch it. This goes the same for links - if the email was unexpected and just seems fishy, it is possible your contact's email may have been compromised. Use your judgment on this, but remember it isn't your contact trying to trick you, they are merely the victim of a similar hoax from one of their contacts. If you have any doubt, simply reply or pick up the phone and ask them about it before continuing.

Keep your Computer Safe

Be sure to keep antivirus definitions up to date, and run scans regularly. Running adware and spyware removal software at regular intervals is important too. Be sure your Windows Updates are up to date as well. For businesses, you'll want to invest in network protection to keep external threats from leaking in. Even for small Northern Colorado businesses, security and threat management is important to keep operations running smoothly and to prevent expensive downtime and data theft.

Don't Rely on Email for Storage

Everyone has done this at least once; you are working on a report or document on one computer and you email it to yourself in order to pull it up on another computer. That's fine as long as you mind your inbox capacity, but you shouldn't rely on email for storing files, not even as a reliable backup. Imagine having to painstakingly pick through all of your email to restore your most important files. It doesn't sound like a good idea now, does it? On top of that, email isn't any less prone to data corruption or loss than any typical storage solution, and unless the server hosting your email is backed up with a reliable solution, it could be here today and gone the next.

Encrypt Sensitive Data

If you send sensitive data to other recipients, you will want to consider email encryption. Some industries require this. Email encryption simply scrambles the message while it is being sent, and depending on what type of encryption, will descramble itself or allow your recipient to log in to a secure location to view the data. Although email encryption services vary, most of them are very cost effected especially when put beside the risks of sensitive data getting leaked and stolen. Give us a call at 970-526-6499 to learn more about email encryption and what solution is right for your business needs.

Let's Talk Tablets
Slow Computer? Increase your memory to boost comp...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 22 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Best Practices Small Business Security Privacy Saving Money Technology Passwords Backup Managed IT Services Hardware Email Business Computing Gadgets Multi-Factor Security Audit eWaste Screen Mirroring Vendor Management Budget Physical Security Applications Internet Uninterrupted Power Supply Staff Mobile Computing NarrowBand DDoS Credit Cards Frequently Asked Questions Data Breach Upgrade Money Wi-Fi Risk Management Artificial Intelligence Productivity Miscellaneous Cybercrime Scalability Microsoft Smartphone Infrastructure Start Menu webinar Trending Computer Fan Environment Cast Charger Server Google Drive USB Cleaning Data Protection Windows 10 Wireless Technology Distributed Denial of Service Fraud Excel IBM Facebook End of Support Big Data Employer-Employee Relationship Password Electronic Medical Records Retail Black Market Instant Messaging Software Encryption Password Manager Tools Conferencing Digital Signature Comparison User Error Data Storage Computer Care User Tips Relocation Virtual Reality Marketing Tech Support Biometrics Chromecast Windows Amazon Tip of the week Supercomputer Gmail Internet exploMicrosoft Books Word Netflix WiFi FENG Techology Save Time Efficiency Internet of Things Outsourced IT Notifications Business Mangement Specifications Computer IT Management Samsung Google Humor Worker Commute Shadow IT Advertising Emergency Two-factor Authentication Bring Your Own Device Mouse Amazon Web Services Windows Server 2008 BDR Settings Managed IT IT Support Wireless Windows 10 HaaS Hiring/Firing Tip of the Week Downtime Managed IT Services Social Engineering Recycling Internet Exlporer Business Intelligence Wearable Technology IT Plan Value Disaster Recovery Government Automobile Private Cloud Patch Management Cloud Mobile Device Management Collaboration Online Shopping Windows 7 Current Events People Remote Monitoring Holiday OneNote Employer Employee Relationship Networking Robot Search Network Security Criminal Android Data recovery Running Cable Unsupported Software Loyalty Browser Law Enforcement Work/Life Balance Public Cloud Scam Hosted Solutions Business Management IT Support Streaming Media Evernote Flash Cybersecurity Mobile Office Avoiding Downtime How To SharePoint CrashOverride Computer Accessories Smartphones Data storage How to Best Practice CES Sports Millennials communications Software Tips SaaS Mobile Devices iPhone Content Hybrid Cloud Transportation Going Green Flexibility Entertainment Keyboard Redundancy Knowledge Productivity Update Spam Blocking Workplace Tips Root Cause Analysis Bluetooth Innovation Monitor Apps Virtualization Content Management VPN Workforce Chrome BYOD Cloud Computing Malware Computers Audiobook Customer Relationship Management PDF Benefits Maintenance Laptop Mobility Data Wireless Charging Sync Network Congestion Meetings Google Docs Windows 10s Business Spam Worker IT solutions Reputation Battery Data Management Blockchain Remote Computing App Telecommuting Data Security Assessment Ransomware Health Politics Customer Service Information Technology Firewall IT Services Touchpad Legal Bandwidth Cortana Communication IT Consultant Microsoft Office Website Vulnerability Hackers Data Backup Rootkit Managed Service Provider Customer Education Users Recovery HIPAA YouTube VoIP Remote Work HBO Television Business Continuity Files Music Application Router Smart Technology Quick Tips Automation Mobile Device Operating System Google Apps Telephony Leadership Office Voice over Internet Protocol Solid State Drive Apple Data loss Training Save Money Hacking Computing Infrastructure Social Media Network Human Resources The Internet of Things Telephone Systems Identity Theft Outlook Public Computer Office Tips History Troubleshooting Fax Server Office 365 Alert Two Factor Authentication Shortcut Safety Video Games Lithium-ion battery Workers Skype Phishing

Latest Blog Entry

Technology is a major factor that can determine your business’s fate, yet some organizations don’t necessarily recognize IT problems before they make themselves apparent. Unfortunately, by the time you notice any issues with your IT, they are usually turning into problems th...

Latest News

Platinum Technology launches new website!

Platinum Technology is proud to announce the launch of our new website at www.platinumtech.net. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.
Read more ...