From pay pal to Amazon, you will need an email account to reset your password account. Additionally, your email can say so much about you. Most of us never delete the sent history or even any emails at all. Except for spam of course.
So if the email is breached, then you will expose travel, work or private details.
Therefore a secure email is a must today.
There are two simple steps to ensure that you boost your access security:
For passwords the easier way to create a strong password is to use a password manager and avoid reusing passwords.
Additional authentication method like 2FA
Two-factor authentication (2FA) is an additional layer of protection beyond your password. It significantly decreases the risk of a hacker accessing your online accounts by combining your password (something you know) with a second factor, like your mobile phone (something you have). Many of the world’s largest websites have made 2FA readily available from the security settings of your online accounts, but it’s up to you to turn on this free feature.
Protect your email from malware and spam
Malware and spam are one of the main gateways to your account. To ensure that it is not breached you should know how to identify those attacks.
Their great thing is that those preventive security rulers are pretty straightforward and universal.
The most important thing that you should always ask yourself is, am I expecting this email? From this question, you can move to the next one. Do I know the sender?
With these two simple questions, you can already sort out many of spam, unsolicited emails, or even emails with malware.
Now, of course, this is not enough as one should always double check to make sure that the email is safe and legitimate.
Here are three simple tips:
Check the sender
The exciting part of emails is that you can display any name for whatever email account yo have. That’s why you will receive an email from Marc even if his account is email@example.com, for example. This is explored by scammers and hackers in a pretty simple way as no first technology knowledge is needed. They just use simple, available for all solutions and leverage on the psychology factor. Many times this is the fort indicator of a suspicious mail.
Check the link
Many email attacks are successful because people are tricked into clicking on links. Those links will redirect you to hacked websites to download malware on your computer.
You can easily prevent this by taking the time to review the link.
First of all, never click the link directly. You can hover with your mouse or long press on your phone to reveal the connection.
So for example, if you received an email seems from DHL and says click on this link to track your package then after hovering you and if you see that you’ll be redirected, so I’m not a DSL site then You know something is fishy.
Sometimes you’ll come across links that are shortened with the four examples bit.lyAnd in those cases can always uncertain the name of the many three providers on the internet before you go in five states in one of those sites.
Check the attachment
Malicious attachments are also a popular way of compromising the target account. The easiest way to protect yourself from those attachments is to open them only if you know or you expect it from the sender.
But sometimes we might receive things that you could be interested, So we need to be cautious when we open attachments from unknown sources. Some file formats can almost guarantee you that you might get infected like for example they zip extension. Multiple file extensions that are also no need to be used by cybercriminals are the .xlsm and .docm because they contain additional executable council that is embedded in the file and will be executed once you enable them to run.
To prevent that from happening, never click on such harmful things like run the program or enable macros from unknown senders and sources.
Most big email providers scan your attachments for malware, but this does not mean that you should not be vigilant. You can always run additional scans if you have a home antivirus installed. Or you can also send those documents to virustotal.com for additional reassurance. But please remember that the case this was a legitimate file then the sample will be saved on the website so other security researchers can use it in their research.