Blogs

Showing items tagged with "email security" - 15 found.

Email security – top tips to reduce the risk of cyber crime

Posted Sunday April 1st, 2018, 7:50 pm by

Email security remains a top priority for most IT Departments and especially as GDPR approaches. Here are five top ways to improving email security in your organisation and make sure you are not the one to open the door to the cyber-criminal.

  1. Check and re-check the email. With auto-fill it is all too easy to send your email to the wrong Jack Thief. At one organisation the Corporate Lawyer was frequently asked about the Pantone colour to use for an advert. Whilst the Marketing Director was sent delicate often highly confidential information about pending legal transaction. Why? They both had almost identical names and hence email addresses. Checking the address before hitting improves email security.
  2. When forwarding an email check the content of the whole email. It is unbelievable the number of clients who tell me they have been forwarded an email only to find something about themselves buried in it – often about 10 conversation down! It is not unknown for this to result in legal action. Always scroll to the very end of the email you are about to forward to check there is nothing the new recipient might either be offended by or see confidential information to which they should not be privy eg sales data when the recipient is another supplier. This improves email security.
  3. Avoiding sending raw Office documents. When possible always send Office files as PDFs. Although not fool proof it does help limit the scope for making changes then denying the change. Also it helps improve the integrity of the file and reduce the risk of exposing edits and comments which have not been completely removed and may also contain confidential information. Email security and integrity is increased.
  4. Password protect/encrypt highly confidential files. The choice is usually dictated by IT. The key for us as individuals is to make optimum use of the available security technology when sending highly confidential files and not be lazy. Always a good way to improve email security.
  5. Be ruthless about what attachments you open. We have said it many times before but recent surveys show that cyber-attacks through malware hidden in Word files are up by 33%.

Concerned about any of these points?  Call us now to discuss how Mesmo Consultancy’s Smart Email Management masterclasses and workshops can help improve email security.

Tags: , , , ,

Read this post... | Comment on this post

Articles and Blogs of Note – February 2015

Posted Friday February 13th, 2015, 10:07 pm by

January into February are often lean months for good news stories outside of real major world events.  From a technology standpoint, three threads really stood out, security, email etiquette and the effect of mobile devices on our wellbeing.  In the light of the Sony hacking offensive the emphasis on cyber crine and email etiquette is not surprising. Here are our top five articles and blogs of note.

Press room

Articles of note

  1. Sony hacking saga – the true reputational damage as Amy Pascal steps down.   A summary of events and the cost to personal professional lives when a hacker finds email which should never have been sent in the first place.
  2. Being a good diplomat takes more than Ferrero Rocher.  Appalled at the lack of language and social skills, the Foreign Office set up a new Academy to enable its Diplomats to regain their standing overseas.  They will be taught not only languages such as Mandarin but also how to use social media.  Will the courses extend to email etiquette and when its more effective to use pen and paper rather than email?  There is also a very good article in The Times with some tips and hints which might give anyone a competitive advantage during sales negotiation (but you need a subscription to read it).
  3. FTSE 350 cyber governance health check tracker report.  Although aimed at larger organisations, it makes excellent reading for every business owner and IT Director.
  4. Symantec cyber crime survival guide.  A short video on how to reduce the risk of a cyber attack and manage the after effects.  You can download a handy aid memoir.  Interestingly user education is a key point.
  5. Switching on outside office risks relationships. A new study from Surrey University has found that the long hours culture predicated by mobile devices and email overload is increasing levels of stress.

If email security, email etiquette or the impact of email overload on well being are on your agenda for 2015, why not contact Mesmo Consultancy now for a free consultation? Either call us on +44 (0)1202 434340 or email us.

Tags: , , , , , ,

Read this post... | Comment on this post

Close the email backdoor to cyber crime

Posted Tuesday November 4th, 2014, 9:59 pm by

Who is the weakest link in the fight against cyber crime? It is us the user. Click here to listen to how we leak data ever day through careless use of email. Without thinking we have either opened or sent an email which opens the door to cyber crime be it hacking, stealing our identity (phishing) and giving away confidential data.

There are many ways we can manage our email behaviour to reduce the risk to ourselves and our organisation of a breach of confidentiality and improve email related security. Here are our top five tips.

Email cyber crime

Email cyber crime

  1. Be alert to unusual emails even from well know colleagues, eg – updates, especially for you, my CV, money for XYZ crisis. Sadly, emails scams often pick up on recent natural disasters such as the Ebola crisis.
  2. Make sure when you go to a website that it really is genuine, ie BBC.co.uk really is BBC.co.uk. Before clicking on the link, hover over it and check what the url is showing in the bottom left-hand corner of your browser. If it looks suspicious stop and access the website directly from the browser address bar.
  3. Use Bcc when sending an email to many people – it limits the risk of spammers getting a list of email addresses.
  4. Set strong passwords for your email and other accounts. Click here for tips.
  5. When setting up a new social media account, selectively add only those contacts that you really need. Don’t use the default option of uploading you entire address book.

Education is the key to reducing the risk of an email predicated cyber attack. For a free five minute review of your email security behaviour and how you can improve it either call Mesmo Consultancy on 01202 434340 or email us now to book an appointment.

Tags: , , , ,

Read this post... | Comment on this post

Smart email security

Posted Saturday December 14th, 2013, 4:47 pm by

Top tips to reduce leaking confidential information through email and improve email security.  Article published in Executive Secretary Magazine October 2013.

Tags: , , , ,

Read this post... | Comment on this post

Email security and internet security – password protection

Posted Friday November 8th, 2013, 5:46 pm by

The recent hacking of the Adobe website is a salient reminder of the need to remain vigilant about protecting ones personal information on-line. One of the most stark factors to emerge was the number of very weak passwords used by people. Email security and internet security depends in part of having strong passwords and being vigilant about what you post on social media sites.  A recent report revealed that the most common passwords were ‘123456’ (190,000+ users) and ‘123456789’ (46,000+ users).

Creating a strong password is really quite easy. Think of a meaningful sentence and then take the first letter of each word and use it to construct a password. Turn a couple of letters into capitals/symbols and add in a couple of numbers and you have a strong password.  For example:

In my youth my favourite singer was Leonard Cohen. A password might be 1mYMf3Wlc!

Email security

Email security

Three other top tips to follow to improve your email security are:

1.  Password protect important attachments.

2.  Do not put confidential information in the body of an email, rather either convey the information verbally or in a password protected attachment. Click here for an example of what can otherwise go wrong.

3.  Remember that despite your best efforts email evidence is very rarely destroyed. Someone somewhere will always have a copy.

For those managing a business (no matter what size) a key part of your email and internet security must be your Acceptable (computer) Usage Policy (AUP).  It must be up-to-date to take account of changing technologies, and you must have evidence that everyone has read and accepted its conditions.

Click here to access our free on-line tool to benchmark just how robust is your current AUP.  Mesmo Consultancy have helped many clients improve their email security and reduce the risk of leaking sensitive and confidential information.  Call us now for a free consultation and review about how vulnerable your business is currently (+44 (0)1202 434340) .

Tags: , , , ,

Read this post... | Comment on this post