Five ways to secure your e-mail

Concerns have been raised after hackers exposed months of e-mails of Sony employees

December 20, 2014 11:55 pm | Updated 11:55 pm IST - LOS ANGELES:

File picture illustration of the word 'password' pictured on a computer screen, taken in Berlin May 21, 2013. Security experts warn there is little Internet users can do to protect themselves from the recently uncovered "Heartbleed" bug that exposes data to hackers, at least not until vulnerable websites upgrade their software. Researchers have observed April 8, 2014, sophisticated hacking groups conducting automated scans of the Internet in search of Web servers running a widely used Web encryption program known as OpenSSL that makes them vulnerable to the theft of data, including passwords, confidential communications and credit card numbers. OpenSSL is used on about two-thirds of all Web servers, but the issue has gone undetected for about two years.  REUTERS/Pawel Kopczynski/Files    (GERMANY - Tags: CRIME LAW SCIENCE TECHNOLOGY)

File picture illustration of the word 'password' pictured on a computer screen, taken in Berlin May 21, 2013. Security experts warn there is little Internet users can do to protect themselves from the recently uncovered "Heartbleed" bug that exposes data to hackers, at least not until vulnerable websites upgrade their software. Researchers have observed April 8, 2014, sophisticated hacking groups conducting automated scans of the Internet in search of Web servers running a widely used Web encryption program known as OpenSSL that makes them vulnerable to the theft of data, including passwords, confidential communications and credit card numbers. OpenSSL is used on about two-thirds of all Web servers, but the issue has gone undetected for about two years. REUTERS/Pawel Kopczynski/Files (GERMANY - Tags: CRIME LAW SCIENCE TECHNOLOGY)

The Sony hack, the latest in a wave of company security breaches, exposed months of employee e-mails. Other hacks have given attackers access to sensitive information about a company and its customers, such as credit-card numbers and e-mail addresses. One way hackers can sneak into a company is by sending fake e-mails with malicious links to employee inboxes.

Here are five simple steps to make your e-mail more secure and limit the harm a hacker can cause:

1. ARCHIVE EARLY & OFTEN

Most corporate e-mail systems allow people to set up regularly scheduled archiving so that e-mails are moved off of the server after a certain number of days.

You can still check archived e-mails on your work computer, but they are no longer easily accessible on websites outside the office or on your phone. That limits hackers’ ability to access those e-mails too. You can make exceptions for e-mails that you want to keep in your active inbox, and they won’t be archived.

2. GET ORGANISED

As e-mails come into your inbox, deal with them. Sort them into folders. This segments your data, requiring an attacker to know which folder to go to, or to take multiple steps to search for wanted information.

Paired with archiving, it also ensures that what the hacker does compromise is limited and known for any future damage assessment. Sensitive information can also be removed from your inbox. For example, delete an e-mail and save what you need to your hard drive or an external drive.

3. KEEP WORK AND PERSONAL MAILS SEPARATE

Don’t use your work e-mail for personal e-mail or activities online. That limits details a hacker can glean about you to conduct more sophisticated attacks targeting you as the entryway into your company’s system.

For example, hackers can learn about your shopping habits or personal hobbies and use those to send a phishing e-mail that appears to come from websites you bought goods from or read frequently.

Phishing messages route you to a fake address and allow hackers to gain access to your system.

4. DON’T CLICK ON UNEXPECTED LINKS

If you receive an e-mail with a link or attachment you weren’t expecting, send the person a separate e-mail asking whether the first e-mail was legitimate.

For links from companies such as banking institutions, hover your cursor over the hyperlink or right—click to show the link’s final destination. Before you click, make sure the address that pops up when you hover over the link matches where the hyperlink says you’ll be sent.

If unsure, use a new window and physically type in the website’s address to conduct your business.

5. IF YOU SEE SOMETHING, SAY SOMETHING

If your e-mail is acting up or a link or attachment strikes you as strange, forward it to your IT department as quickly as possible. Your attention and fast response may prevent someone else at your company from making a mistake. — AP

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.