croom new

Platinum Technology Blogs

How Safe is Your Email?

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Northern Colorado small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

Spam Inundation

If you've been using email for a while either professionally or personally you have almost certainly gotten email from people you don't know. Most of these emails are blatantly unwanted while others can look 'almost' legit, as if a real person is trying to contact you. Often (and unfortunately) spammers can get your email address when you put it online or use it to register for accounts on sites on the internet. The good news is standard spam protection is getting better these days, and more advanced spam protection is cost effective for businesses that need the extra layer of protection. Spam can cause a lot of harm for a business network if it isn't kept under control - spam can bog down email servers and eat up network bandwidth and plus it drastically slows down employee productivity because they need to sift through it all just to find their real email. If you and your staff are getting more than a few spam emails a day, contact us at 970-526-6499 and ask about our anti-spam solutions.

Don't Open Attachments from Unsolicited Emails

This has been a golden rule for general email usage for a very long time. If you received an email from a stranger and there is an attachment, don't touch it. If you receive an email from a contact and there is an attachment, but anything is suspicious, don't touch it. This goes the same for links - if the email was unexpected and just seems fishy, it is possible your contact's email may have been compromised. Use your judgment on this, but remember it isn't your contact trying to trick you, they are merely the victim of a similar hoax from one of their contacts. If you have any doubt, simply reply or pick up the phone and ask them about it before continuing.

Keep your Computer Safe

Be sure to keep antivirus definitions up to date, and run scans regularly. Running adware and spyware removal software at regular intervals is important too. Be sure your Windows Updates are up to date as well. For businesses, you'll want to invest in network protection to keep external threats from leaking in. Even for small Northern Colorado businesses, security and threat management is important to keep operations running smoothly and to prevent expensive downtime and data theft.

Don't Rely on Email for Storage

Everyone has done this at least once; you are working on a report or document on one computer and you email it to yourself in order to pull it up on another computer. That's fine as long as you mind your inbox capacity, but you shouldn't rely on email for storing files, not even as a reliable backup. Imagine having to painstakingly pick through all of your email to restore your most important files. It doesn't sound like a good idea now, does it? On top of that, email isn't any less prone to data corruption or loss than any typical storage solution, and unless the server hosting your email is backed up with a reliable solution, it could be here today and gone the next.

Encrypt Sensitive Data

If you send sensitive data to other recipients, you will want to consider email encryption. Some industries require this. Email encryption simply scrambles the message while it is being sent, and depending on what type of encryption, will descramble itself or allow your recipient to log in to a secure location to view the data. Although email encryption services vary, most of them are very cost effected especially when put beside the risks of sensitive data getting leaked and stolen. Give us a call at 970-526-6499 to learn more about email encryption and what solution is right for your business needs.

Let's Talk Tablets
Slow Computer? Increase your memory to boost comp...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, December 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Best Practices Small Business Saving Money Technology Security Privacy Hardware VoIP Email Passwords Business Computing Gadgets communications Managed IT Services Telephone System Backup Computer Accessories How To Disaster Recovery Data Cortana Wire Excel Hacking Fraud Video Games Warranty Wi-Fi Data Breach Quick Tips User Error Tech Support Accountants Compliance Root Cause Analysis Update Private Cloud Social Media Save Money Windows Chromecast Thought Leadership E-Commerce BYOD Robot Workforce IT Support Content SaaS Cloud Business People Data Management HIPAA NIST Computer Fan Tools History Applications Productivity webinar Authentication Augmented Reality Data Storage Safety Comparison Alert Charger Fax Server WiFi Office Tips Notifications Recycling Managing Stress Sync Law Enforcement Wireless Charging How to Help Desk Transportation Knowledge Networking App Remote Computing Business Management Google Docs Public Cloud Bluetooth Spam Blocking Microsoft Office Browser Bandwidth Google Apps Smart Office Tip of the week Physical Security Amazon Scalability Printer Big Data IBM Shortcut Computer Shadow IT Tech Term Regulation Spam Conferencing Internet Budget Mouse Bring Your Own Device Twitter Camera Data Security Data storage Telecommuting Flexibility Audiobook Cloud Computing Hosted Solutions Hackers Mobile Office Recovery Human Resources Cryptocurrency FENG Word Money USB Electronic Medical Records Nanotechnology Remote Worker IT Management Cybercrime Specifications Artificial Intelligence Computer Care Mobile Computing Wireless Upgrade Social Engineering Criminal Servers Communication iPhone Apps Software as a Service Benefits Network Congestion Smartphones YouTube Data Backup Going Green Website Hybrid Cloud Worker Windows 10s Office Mobile Devices Operating System Workers Document Management Windows Server 2008 Google Drive Amazon Web Services Instant Messaging Administrator Books Supercomputer Microsoft Miscellaneous Wearable Technology Internet Exlporer Practices Information Save Time Netflix Server Collaboration Mobile Device Management Addiction HBO Monitor Remote Work Mobility Politics Assessment Apple Productivity Network Staff Safe Mode Windows 10 Managed IT End of Support Virtual Reality The Internet of Things Smart Tech Wiring IT Plan Black Market Business Intelligence Password Worker Commute Samsung Windows 10 Holiday Facebook Network Security CES HVAC Telephony Computers Battery Shortcuts Firewall IT Consultant Innovation Telephone Systems Managed Service Data loss Laptop Voice over Internet Protocol PDF Rootkit Vulnerability Customer Relationship Management Office 365 Malware Lithium-ion battery Infrastructure Paperless Office Windows 7 Relocation Online Shopping Outsourced IT Microchip Emergency BDR Software Retail Running Cable Android Hosted Computing Hiring/Firing IT Support Marketing User Tips Streaming Media Cache Outlook Reputation Identity Theft Legal Music Television Maintenance eWaste Meetings Uninterrupted Power Supply Data Protection Virtual Assistant OneNote Remote Monitoring Internet exploMicrosoft IT solutions DDoS NarrowBand Connectivity Unified Threat Management Unsupported Software Internet of Things Data recovery Techology Automobile Value Biometrics SharePoint Gmail Best Practice Content Management Enterprise Content Management Skype Health Education Smart Technology Leadership Inventory MSP Screen Mirroring Touchpad Multi-Factor Security Information Technology Training Solid State Drive Customer Service Risk Management Ransomware Smartphone Password Manager Machine Learning Flash Humor Evernote Managed IT Services Search Engine Patch Management Current Events Efficiency Sports Employer Employee Relationship Google Entertainment Wireless Internet Frequently Asked Questions Customer Credit Cards Mobile Device Printers Troubleshooting Public Computer IT Services Environment Cleaning Digital Signature CrashOverride Avoiding Downtime Advertising Users Managed Service Provider Distributed Denial of Service Wireless Technology Devices GDPR Software Tips Downtime Millennials HaaS Work/Life Balance Loyalty Two-factor Authentication Workplace Tips Settings Virtualization Blockchain Password Management Audit Start Menu Files Computing Infrastructure Two Factor Authentication Phishing Access Control File Sharing Cast Automation Trending Router Vendor Management Application Employer-Employee Relationship Business Continuity Encryption Business Mangement Company Culture Redundancy Government Keyboard Search Bing Scam Cybersecurity Tip of the Week Chrome VPN

Latest Blog Entry

Communication is pivotal to the success of your business, but it’s hard when you have a telephone system that seems like it was built for an age long past. A modern telephone system that utilizes the cloud is the ideal way to approach collaboration in the workplace. You have...

Latest News

Platinum Technology launches new website!

Platinum Technology is proud to announce the launch of our new website at www.platinumtech.net. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.
Read more ...