Xtrii
  • Solutions
    • Strategy & Transformation
    • Rapidly Improve Your IT
    • Technology Leadership
    • Address Risks
    • Cloud Services
    • Integrate & Optimize
  • Insights
    • Thought Leadership
    • Press Room
    • Subscribe
  • About
    • About Xtrii
    • The Xtrii Difference
    • The Results
    • Global Clients
    • Client Access
    • Careers at Xtrii
  • Contact
    • Contact Us
    • Social Connections

​Thought Leadership

7 Ways to Protect Your Email from Hackers

12/6/2017

0 Comments

 
Picture
Technology protection has improved over the years and hackers have shifted their focus from technical vulnerabilities to individual vulnerabilities.  Tricking one person into giving up computer access is the easiest path to sensitive information, and hackers have developed some clever strategies for doing so through email.
​Below are some of the top email threats, and how you can protect against them.
  1. Beware of intriguing/funny emails:  That funny joke or animated dancing elf picture your friend just sent you isn’t so funny when it ruins your PC and steals sensitive information.  Hackers often publish these pictures/jokes and hide their viruses/malware in the attachment.  When someone emails the files, they are unknowingly distributing the Hacker’s malware. Be smart. If your friend sends an email that looks spammy, it’s best to be on the safe side. Don’t open it, and delete it  immediately.  
  2. Look out for emails from an unknown source/random emails:  If you don’t know the sender or you are not expecting an email from the sender, call by phone to verify before opening the email.
  3. Guard against email “spoofing”:  Hackers can make their email address look like it came from the CEO of your company, another VIP, or an important entity asking you to do something unusual or suspicious (such as transferring money or providing your sensitive, personal information). If you’re surprised to be receiving an email from someone, there’s chance it’s a fake account. Don’t be fooled. Contact the sender to verify before opening the message or proceeding with the request.
  4. Disregard emails with threats:  Don’t be fooled by emails containing threats or that attempt to scare you into taking action — even if the email contains the logo of a prominent entity and appears to look official on the surface.  Hackers often use the logo of the FBI, IRS, your financial institution, or other organizations along with a spoofed (see #3 above) email address to trick people. These emails often contain language such as “Failure to follow the instructions in this email within 24 hours will result in serious consequences for you….”.  Don’t fall for this. Credible organizations don’t send these types of emails.  Don’t open the email or click on any links in the email.  Instead, directly contact the organization via phone or the organization’s official website.   
  5. Don't click email links:  Don’t click on any links in an email.   Links can deceptively re-direct you to the Hacker’s website that is used to attack your computer.  Instead, open a new browser window and go directly to the proper company website.      
  6. Don't open email attachments:  Don’t open any email attachment from someone outside your company, unless are specifically expecting it and the source is trusted.   If in doubt, contact the sender by phone before opening.   
  7. Don’t use email for sensitive information:  Never provide your password, social security number or any sensitive information via email.  
0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Author

    ​Mark Johnson is the Chief Executive Officer at Xtrii. He is a 10x CIO, global technology advisor and business leader.  He has received global awards and recognition for excellence in technology and innovation. 
    ​For more than 30 years he has helped some of the world's best organizations optimize their technology and achieve extraordinary success.
    For more details visit his LinkedIn profile or follow him on Twitter @johnsonme.​

    Picture

    Archives

    April 2020
    March 2020
    December 2019
    November 2019
    October 2019
    June 2019
    March 2019
    February 2019
    January 2019
    August 2018
    July 2018
    June 2018
    April 2018
    February 2018
    January 2018
    December 2017
    December 2014
    November 2014
    June 2014
    April 2014
    March 2014
    February 2014

    Categories

    All
    CyberSecurity
    Excellence
    Healthcare
    Improving Performance
    Leadership
    Presentations
    Videos

    RSS Feed

© Xtrii, LLC, All Rights Reserved 
Austin  |  Dallas  |  Houston  |  San Antonio

Service Marks | Terms of Use | Contact
  • Solutions
    • Strategy & Transformation
    • Rapidly Improve Your IT
    • Technology Leadership
    • Address Risks
    • Cloud Services
    • Integrate & Optimize
  • Insights
    • Thought Leadership
    • Press Room
    • Subscribe
  • About
    • About Xtrii
    • The Xtrii Difference
    • The Results
    • Global Clients
    • Client Access
    • Careers at Xtrii
  • Contact
    • Contact Us
    • Social Connections