precautions while using securing email

Securing your email
1. There are a few important steps that you can take in order to increase the security of your email communication. The first is to make sure that only the person to whom you send a given message is able to read it. This is discussed in the Keeping your webmail private and Switching to a more secure emailaccount sections, below. Going beyond the basics, it is sometimes critical that your email contacts have the ability to verify that a particular me .....
Keeping your webmail private
2. The Internet is an open network through which information typically travels in a readable format. If a normal email message is intercepted on the way to a recipient, its contents can be read quite easily. And, because the Internet is just one large, worldwide network that relies on intermediary computers to direct traffic, many different people may have the opportunity to intercept a message in this way. Your Internet Service Provider ISP is the .....
Additional tips on improving your email security
3. Always use caution when opening email attachments that you are not expecting,In addition to protecting passwords and financial transactions, this type of encryption is perfect for securing your webmail. However, many webmail providers do not offer secure access, and others require that you enable it explicitly, either by setting a preference or by typing in the HTTPS manually. You should always make sure that your connection is secure before logg .....
Switching to a more secure email account
4. Few webmail providers offer SSL access to your email. Yahoo and Hotmail, for instance, provide a secure connection only while you log in, to protect your password, but your messages themselves are sent and received insecurely. In addition, Yahoo, Hotmail and some other free webmail providers insert the IP address of the computer you are using into all of the messages you send. .....
Gmail accounts
5. Gmail accounts, on the other hand, use a secure connection during log-in and all the way until you log out. You can confirm this along the way by looking at the address bar and observing the URL starting with https , where the s denotes a secure connection. And, unlike Yahoo or Hotmail, Gmail avoids revealing your IP address to email recipients. However, it is not recommend that you rely entirely on Google for the confidentiality of your sensi .....
When creating an account
6. When creating an account that you intend to use while remaining anonymous from your own email recipients, or from public forums to which you might post messages by email, you must be careful not to register a username or Full Name that is related to your personal or professional life. In such cases, it is also important that you avoid using Hotmail, Yahoo, or any other webmail provider that includes yourIP address in the messages you send. .....
Passwords
7. At the very least your password should consist of a jumble of letters and numbers. It should not be a word. There are a few important steps that you can take in order to increase the security of your email communication. The first is to make sure that only the person to whom you send a given message is able to read it. This is discussed in the Keeping your webmail private and Switching to a more secure emailaccount sections, below. Going beyond t .....
Common sense
8. Do not click on a web link contained in an email even if the email is from your mom. It s a common way that hackers use to infect your machine. The link can take you to a site that downloads a program to your computer giving the hacker access to your email account. .....
Wide open computers
9. I find it incredible that many people have no protection at all against viruses, spyware and other malware. It s like driving a car that has no brakes. And there are plenty of excellent programs out there that do a fine job and yet don t cost a penny. .....
Nave users
10. While browsing the web they see an offer that seems too good to be true, or a contest that sounds like it would be fun, or a new game to play online. So they click on the button and allow software to be downloaded to their machine. What a deal. Not only do they get to enter a contest or play a game, they get hacked. .....
Secret questions that beg to be hacked
11. You were probably asked to create the answers to some questions when you opened the account. That way, being able to answer helps to prove that you are the owner of that account. But some of the usual questions and answers make things easy for a hacker to be able to answer them and change the password taking control of the account. For instance, a common question is what high school did you attend or what s your mother s maiden name. In cas .....
You may not have been hijacked after all
12. There s another way to send out email messages that seem to be from you. And it doesn t require hacking your account. It is possible for a spammer to use what is called a spoofed email address. It s trivially easy to send out emails in another person s name that seem legit. .....
Recovering from a hack attack
13. OK. You failed to take these tips to heart. Or it s possible that you did everything right and still got hacked. Let s talk about preparing for that event. For starters don t use a free email account for important business transactions or any other type of email that is personal or important. Here s why. Providers of free email accounts often are next to impossible to reach when your account is hacked. That makes sense after all they can t affo .....
Email hijacking is a big deal
14. I don t have to do much to convince you of that. I ll bet in any given week you receive at least one bogus message falsely sent in the name of a friend or business contact whose computer has been hijacked. Or, one fine day your friends may have received spam that seemed to come from you. And since spammers use this hijacked accounts to shield themselves from the law it may have advertised pornography or illegal scams. All in your name. Let .....
Never use the same passwords
15. Never use the same passwords that you use at work on a social networking site. You should also know what to do if you think the privacy of your email account may have been violated. The Tips on responding to suspected email surveillance section addresses this question. Remember, too, that secure email will not do you any good if everything you type is recorded by spyware and periodically sent over the Internet to a third party. .....
Limit usage of social networking sites
16. Limit usage of social networking sites to personal use only. Do not write about work issues. Always assume everyone in the world will be able to see what you re writing even if the site limits your post to your friends exclusively. The Internet is an open network through which information typically travels in a readable format. If a normal email message is intercepted on the way to a recipient, its contents can be read quite easily. And, because .....
Try to avoid mentioning where you work
17. Try to avoid mentioning where you work; so that if you mention something you thought innocent (but that might be valuable information for hackers) they will not know who to target. Your Internet Service Provider ISP is the first recipient of an email message as it begins its journey to the recipient. Similarly, the recipient s ISP is the last stop for your message before it is delivered. Unless you take certain precautions, your messages can be r .....
Important to beware
18. After all above precautions it is still very important to beware of what you write in the messages and what impact would it have if it fell into the wrong hands. One way of increasing the security of information exchange is to develope a code system for sensitive information exchange, so you would not use real names of the people, real addresses of places, etc. .....
Wait while Gmail activates Priority Inbox
19. You will now see that your inbox looks a little different: 1-Important and unread are now listed first. 2-Starred items are listed below in a second list. 3-All other emails are listed after the starred emails as the final list. 4-If you don t want to see the actual emails, you can collapse each set of headers using the tiny black arrows located in each header. The end result will appear very neat. .....
Train your Priority Inbox
20. You can rectify mistakes Gmail makes in highlighting or demoting the importance of your emails by pressing the tabs and stars at the start of each email line. These tabs or stars represent increasing or lowering the email s importance. In this way, Gmail s Priority Inbox quickly learns your preferences. .....
Change back to the ways things used to be
21. If you discover that you don t like using Priority Inbox, simply change it back. Do this by selecting the old inbox type in Settings. Email accounts are used for anything from personal emails to friends to sending important letters to you bank or someone important, and some people are so sad and have nothing better in their life but to look into other peoples emails account for money, pleasure, or personal reasons, and can put your privacy and ev .....
Risks to user
22. Email is vulnerable to both passive and active attacks. Passive threats include Release of message contents, and traffic analysis while active threats include Modification of message contents, Masquerade, Replay, and denial of service attack. .....
Disclosure of Information
23. Most emails are currently transmitted in the clear (not encrypted). By means of some available tools, persons other than the designated recipients can read the email contents. Email address. Have a complicated email address, not so you will forget it, but so no one else can guess it through your name (it should contain a number - for example, John023@ .com) .....
Traffic analysis
24. It is believed that some countries are routinely monitoring email messages as part of their surveillance. This is not just for counter-terrorism reasons but also to facilitate combat against industrial espionage and to carry out political eavesdropping. However, it is not devoted to the national agencies since there is a thriving business in providing commercial and criminal elements with the information within emails. .....
Modification of messages
25. Email contents can be modified during transport or storage. Here, the man-in-the-middle attack does not necessarily require the control of gateway since an attacker that resides on the same Local Area Network (LAN), can use an Address Resolution Protocol (ARP) spoofing tool such as ettercap to intercept or modify all the email packets going to and from the mail server or gateway. .....
Masquerade
26. It is possible to send a message in the name of another person or organization. Every email service provider, be it Gmail, Yahoo, Hotmail, etc. has different security measures. All of the above companies timely provides security steps to protect user s account. They timely send emails to their customers like your account is being attempted to compromised from different IP addresses. Please change your password. .....
Replay of previous messages
27. Previous messages may be resent to other recipients. This may lead to loss, confusion, or damage to the reputation of an individual or organization. It can cause some damage if email is used for certain applications such as funds transferring, registration, and reservation. .....
Spoofing
28. False messages may be inserted into mail system of another user. It can be accomplished from within a LAN, or from an external environment using Trojan horses. Passwords are there to protect your account; without passwords we would be lost. Make sure your password is complicated; do not use your name, or last name. For example, do not put in John because the first thing that hackers will do is to guess your password based on your name. Don t us .....
Remedies
30. To provide a reasonable level of privacy, all routers in the email pathway, and all connections between them, must be secured. This is done through data encryption, which translates the email s contents into incomprehensible text that, if designed correctly, can be decrypted only by the recipient. An industry-wide push toward regular encryption of email correspondence is slow in the making. However, there are certain standards that are already in .....
The protection of email
31. The protection of email from unauthorized access and inspection is known as electronic privacy. In countries with a constitutional guarantee of the secrecy of correspondence, email is equated with letters and thus legally protected from all forms of eavesdropping. .....
The Gmail interface
32. The Gmail interface makes Gmail unique amongst webmail systems for several reasons. Most evident to users are its search-oriented features and means of managing e-mail in a conversation view that is similar to an Internet forum. An official redesign of the Gmail interface was rolled out on November 1, 2011 that simplified the look and feel of Gmail into a more minimalist design to provide a more consistent look throughout Google products and se .....
Importance markers
33. Marking of emails as important is more or less automatic. Users can .....
Attachments
34. Individual Gmail messages including attachments may be up to 25 MB in size. However, users can send files of up to 15 GB in size through Google Drive. Effectively, the files are stored on Google Drive and only links to them are sent. This means that the recipients can access the file only if it is shared with them on Google Drive. Gmail notifies the user if the file being sent is not shared with the recipient and allows the user to modify the sha .....
Addresses
35. Gmail supports plus-addressing of e-mails. Users can send messages to addresses in the format username+extratext@gmail.com, where extratext can be any string, and will arrive in the inbox of username@gmail.com. This allows users to sign up for different services with different aliases and then easily filter all e-mails from those services. In addition, if users receive spam messages directed to an e-mail address with the extra text, they will kno .....
Set up a Gmail account to easily access all Google platforms
36. Gmail is an extremely straightforward interface to operate and offers 15 GB of free storage to share between your Google Drive, Gmail, and Google+ accounts. This means you almost never have to delete emails and can simply archive them in case you ever need to recover old messages. The best part about having a Google account is that it lets you access all of your Google platforms from any device, including Google Drive, which organizes text docume .....
Visit the website of the email provider of your choice
37. If you choose to use Gmail, simply visit www.gmail.com. The website for Yahoo! Mail is mail.yahoo.com, and Outlook is simply www.outlook.com. A good password will contain a combination of uppercase and lowercase letters; numbers; and/or special characters such as %, $, and +. It is very important to keep your password private at all times. A password that contains a mixture of letters and numbers is a good way of securing your password. .....
Find the link on the homepage of your chosen provider that says Sign Up or Create New Account
38. Click on the link and follow the prompts on the following pages. You will be asked for basic personal information and to create an email address. If your computer is wireless or does not use any antivirus software and is used not just by you, your email address and password is completely at risk. Download free antivirus software by going to www.avast.com. Using wireless isn t the safest form of using the Internet, as it can be hacked by people u .....
Type in the URL of your email provider and log in with your username and password
39. If you forget either piece of login information, there will be a link underneath the login box that asks Forgot Your Username/Password? or something similar. Click the link and follow the steps to recover your lost information. You will most likely have to answer security questions to be able to reset your password. .....
Become familiar with your email interface
40. Spend some time clicking around your email interface and familiarizing yourself with the different features and functions available to you. You can change or add one by going into Connections -> Your Wireless Network -> Wireless Map -> Your Router -> Properties -> Device Webpage. Then click Wireless Security Settings and then WEP/WPA Key . It s best to have it set using a WPA key as it s the latest version of security. .....
Enter a subject in the subject bar
41. Keep your subject line short and make sure that it appropriately summarizes the contents of the email you are sending. Subject lines that use all upper case letters, misuse numbers, or include too many symbols may look like spam emails to your recipients and therefore they may not want to open them. You do not have to put a subject in order to send an email. Leave the subject line blank if you prefer not to add one. .....
Click your cursor in the Body field of the message
42. This box may not be labelled as anything but will always be the largest block of white space on the new message template. Your email ID and its password are your own confidential information. No company s employee will ever ask you for your password in an unsolicited phone call or email message. The sender is a hacker, no doubt. S/he wants to gain access to your account and send spam emails, like asking money from your contacts or make an unautho .....
Security
43. At one time Gmail used an unencrypted connection to retrieve user data, encrypting only the connection used for the login page. However, by replacing the URL http://mail.google.com/mail/ with https://mail.google.com/mail/, users were able to force Gmail to use a secure connection, reducing the risk of third-party eavesdropping on user information, such as emails and contacts, which are transmitted in plaintext as JavaScript data in the page sourc .....
Business email
44. Email sent by employees through their employer s equipment has no expectation of privacy; the employer may monitor all communications through their equipment. Generally speaking, the factors courts use to determine whether companies can monitor and read personal emails in the workplace include: (i) the use of a company email account versus a personal email account and (ii) the presence of a clear company policy notifying employees that they shoul .....
Need
45. The Internet is an expansive network of computers, much of which is unprotected against malicious attacks. From the time an email composed to the time it is read, an email travels through this unprotected Internet, exposed to various electronic dangers. .....
Time sensitive information
46. E-mail is fast. Time-sensitive information including updates pertaining to events and breaking news can be received within minutes, not days or weeks. If you are a victim of such a scenario, please contact the respective company immediately. Every company has an account verification department. They also provide instant chat support/phone support. By changing your password immediately, you quickly minimize the resulting risk of your Yahoo! accoun .....
E mail generates an immediate response
47. E-mail generates an immediate response. By providing links within your e-mail, you give potential participants the opportunity to register right then and there. You can see the results of your efforts instantly. If you are ever asked for your password in an unsolicited manner or by someone you do not believe to be a representative of Yahoo!/Hotmail/Facebook/gmail, etc., please do not share your password with them and ask them the reason for askin .....
E mail is targeted
48. You can easily segment your lists into groups so your e-mails go to the individuals who are most likely to respond to that particular message. It s tough to get people to pay attention and be serious about their online identity. An Email account is the first and primary component of your online identity and yet it s the one that is left unguarded the most. Email accounts may be virtual but once hacked, the consequences and damages are very real. .....
E mail is proactive
49. E-mail is proactive. Instead of passively waiting for participants to visit your Web site, e-mail enables you to aggressively communicate with and educate your existing participants. The problem with a hacked email account is the domino effect. All registrations, purchases, renewals, transactions, password reminders etc. are sent to your email inbox. So once the first domino falls, the entire setup falls apart in one fell swoop. After the jump, w .....
Grow your database
50. E-mail expands your reach. Grow your database by sending information to your participants and encourage them to forward the message onto their own friends and family. Yes, I know this is what every other tech blogger says every single time. But that has never made people any wiser. Even hackers feel insulted when they come across passwords like sweetlove123 , pass@123 and the like. Google is the best when it comes to putting real effort into s .....
Build a regular
51. E-mail allows you to foster long lasting relationships. Build a regular, ongoing dialogue with those registrants/participants who appreciate the routine communication. Those who do not can easily opt-out. We can Use a reliable Secondary Email Address-Absolutely no Hotmail accounts for secondary fallback email account people. They still have their stone age era email account expiry plan after certain number days of non usage. So if the secondary e .....
Growing your e mail database
52. E-mail will grow your organization. Maintaining and growing your e-mail database will allow you to fully utilize our services, including free broadcast e-mails and an upgraded version of HTML e-mails (fee applies) in order to reach more participants. Even if a hacker gets hold of the answer to your security question, they cannot use it immediately to reset the password and break into your Gmail account. Password reset with security question is po .....
Direct mailing or newsletter
53. In your next direct mailing or newsletter, include an e-mail solicitation letter, along with a postcard or insert which can be easily filled out and mailed back to your endurance events. We tend to equate e-mail with postal mail in our minds, and most of the time this is fine. We write our messages, send them off, and they are delivered to their destination address as expected. We can send copies to third parties and save a copy for our records. .....
Make email address a mandatory
54. Make e-mail address a mandatory field on all printed registration forms. Don t accidentally let others access your account! Keep your password in a safe place, and change it frequently. If you use a cybercafe, take care that nobody is watching you log in, and be sure to click the logout button in your Webmail when you are finished. If you simply close the browser window, the next user might be able to log into your account and you wouldn t even k .....
Encourage registrants and participants
55. During walk-in days, encourage registrants/participants to offer their contact information. Use secure connections wherever possible. If you are using Webmail, always ensure the address starts with https:// when you log in - this indicates that the connection between the computer you are on and the Webmail server is secure and private. Similar connections are possible in e-mail programs such as Outlook (look for keywords like Secure SMTP or SSL). .....
Send e mails
56. When you send e-mails with a call-to-action (such as event registration), ask recipients to forward the message to friends and relatives so they, too, can get involved. Use hosting providers you trust. Since e-mail (unless it is encrypted) is stored in plain text in your mailbox on the server, the technicians managing the server can technically access your e-mail messages, even without knowing your password. .....
Prominently place contact lists
57. Prominently place contact lists for your endurance events on your homepage. You may also want to include this option on other pages, like news or contact us . Create an anonymous Webmail account. Free online services such as Yahoo! and Gmail do not require you to provide personal details about yourself, so you (and your correspondent) could have secret conversations with relative (but not perfect!) confidence that you are not being overheard .....
Chourishi Systems