SlideShare a Scribd company logo
1 of 7
Common E-mail Security Mistakes
While e-mail is one of the most widely used business applications, it isn’t a secure way to
communicate, so the messages you receive every day are also a potential threat to your
confidential and sensitive business information.
To help you protect your and your clients’ confidential information -- and to help you stay
in compliance with state and federal regulations – secure messaging solution developer
Nveloped put together this list of common e-mail security mistakes.
1. Sending confidential information in a regular e-mail
Traditional e-mail isn’t secure and does not have safeguards to protect your data or your client’s data.
And sending separate e-mails with password information doesn’t provide more security -- it’s just as
easy to intercept that message with the password.
2. Clicking on links or opening attachments in unexpected messages
Clicking a link or opening an attachment in an unexpected e-mail message can infect your computer
or your business’ systems with malware. If you receive an unexpected message that asks you to take
some action (for example, “Click here to confirm your account details”), check with the sender to
verify that they sent the original message to you.
Also, in most e-mail clients, the link address shows up at the bottom of the window when you hover
your mouse over the link. That’s a good way to verify whether the link is “safe.” If the sender and link
address don’t match up, it’s a good idea to check with your IT staff to confirm that the message is
legitimate.
3. Not protecting your password
Your password is the most direct way for someone to get into your e-mail account, so choosing a
password that is complex (not “password”) and keeping it safe is extremely important. Many
organizations now implement password policies that require a certain level of password complexity
and periodic changes, but users also need to avoid writing down their passwords on sticky notes or
posting them in their office where others can see them.
4. Not verifying the sender of an e-mail message
In most e-mail clients today, there is a way to verify that the message actually came from the listed
sender. In Gmail, for example, you can click on the small triangle next to the sender’s name, and it
will show what e-mail server delivered the e-mail message. Messages that don’t have this
information aren’t necessarily bad or untrustworthy, but you should be a bit cautious before clicking
the links because the message sender has not been authenticated.
5. Not asking your partners to communicate securely
There are many instances where an organization wants to communicate securely, but the partners
they work with outside their organization continue to send information in a non-secure way. If you
aren’t asking the other people and organizations with whom you communicate to also protect your
sensitive data, it may still be at risk because your partners don’t have the right safeguards in place.
Source: Nveloped
5. Not asking your partners to communicate securely
There are many instances where an organization wants to communicate securely, but the partners
they work with outside their organization continue to send information in a non-secure way. If you
aren’t asking the other people and organizations with whom you communicate to also protect your
sensitive data, it may still be at risk because your partners don’t have the right safeguards in place.
Source: Nveloped

More Related Content

What's hot

E mail etiquette
E mail etiquetteE mail etiquette
E mail etiquette
jmbenak
 
The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !
Theawaster485
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
Zeno Idzerda
 

What's hot (20)

Spear Phishing 101
Spear Phishing 101Spear Phishing 101
Spear Phishing 101
 
Spear Phishing
Spear PhishingSpear Phishing
Spear Phishing
 
GMP Ransomware Slides
GMP Ransomware SlidesGMP Ransomware Slides
GMP Ransomware Slides
 
eBay's Big "Whoops": What Others Can Learn From It
eBay's Big "Whoops": What Others Can Learn From IteBay's Big "Whoops": What Others Can Learn From It
eBay's Big "Whoops": What Others Can Learn From It
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Apple Ransomware Slides
Apple Ransomware SlidesApple Ransomware Slides
Apple Ransomware Slides
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
E mail etiquette
E mail etiquetteE mail etiquette
E mail etiquette
 
Phishing
PhishingPhishing
Phishing
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !The Electronic Mail Data Will Be Published On The Web !
The Electronic Mail Data Will Be Published On The Web !
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
 
Email security netwroking
Email security  netwrokingEmail security  netwroking
Email security netwroking
 
2016 Social Engineering Training
2016 Social Engineering Training2016 Social Engineering Training
2016 Social Engineering Training
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
 

Viewers also liked (7)

Technology Allows us to Reimagine Everything
Technology Allows us to Reimagine EverythingTechnology Allows us to Reimagine Everything
Technology Allows us to Reimagine Everything
 
Business of Meetings
Business of MeetingsBusiness of Meetings
Business of Meetings
 
2016 Strategies for Engaging Tomorrows Members
2016 Strategies for Engaging Tomorrows Members2016 Strategies for Engaging Tomorrows Members
2016 Strategies for Engaging Tomorrows Members
 
CPA Training
CPA TrainingCPA Training
CPA Training
 
Mobile Deep Dive - 2012 ASAE Annual Meeting
Mobile Deep Dive - 2012 ASAE Annual MeetingMobile Deep Dive - 2012 ASAE Annual Meeting
Mobile Deep Dive - 2012 ASAE Annual Meeting
 
AICPA Leadership Retreat - Technology
AICPA Leadership Retreat - TechnologyAICPA Leadership Retreat - Technology
AICPA Leadership Retreat - Technology
 
٣٦٥ يوما مع الرسول صلى الله عليه و آله و سلم
 ٣٦٥ يوما مع الرسول صلى الله عليه و آله و سلم ٣٦٥ يوما مع الرسول صلى الله عليه و آله و سلم
٣٦٥ يوما مع الرسول صلى الله عليه و آله و سلم
 

Similar to Common Email Security Mistakes

phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
amby3
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
Payza
 

Similar to Common Email Security Mistakes (20)

phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations  Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
5 examples of how easily data leaks can occur
5 examples of how easily data leaks can occur5 examples of how easily data leaks can occur
5 examples of how easily data leaks can occur
 
How to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxHow to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptx
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 

More from Emerge Management Training Center

More from Emerge Management Training Center (14)

Ramadan promotion
Ramadan promotionRamadan promotion
Ramadan promotion
 
CMA Review - Emerge Management Training Center
CMA Review - Emerge Management Training CenterCMA Review - Emerge Management Training Center
CMA Review - Emerge Management Training Center
 
EMERGE – CPA Success Story 2014
EMERGE – CPA Success Story 2014EMERGE – CPA Success Story 2014
EMERGE – CPA Success Story 2014
 
EMERGE - CMA Success Story 2014
EMERGE - CMA Success Story 2014EMERGE - CMA Success Story 2014
EMERGE - CMA Success Story 2014
 
The top stories in accounting in 2013
The top stories in accounting in 2013The top stories in accounting in 2013
The top stories in accounting in 2013
 
10 celebrity almost CPAs
10 celebrity almost CPAs10 celebrity almost CPAs
10 celebrity almost CPAs
 
20 things you should know about your money
20 things you should know about your money20 things you should know about your money
20 things you should know about your money
 
Article on emerge
Article on emergeArticle on emerge
Article on emerge
 
Accountant’s Priorities -AICPA
Accountant’s Priorities -AICPAAccountant’s Priorities -AICPA
Accountant’s Priorities -AICPA
 
Certified Public Accountant - CPA
Certified Public Accountant - CPACertified Public Accountant - CPA
Certified Public Accountant - CPA
 
Certified Management Accountant - CMA
Certified Management Accountant - CMACertified Management Accountant - CMA
Certified Management Accountant - CMA
 
Pass announcement
Pass announcementPass announcement
Pass announcement
 
Cma dubai
Cma dubaiCma dubai
Cma dubai
 
Cpa dubai
Cpa  dubaiCpa  dubai
Cpa dubai
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Common Email Security Mistakes

  • 1. Common E-mail Security Mistakes While e-mail is one of the most widely used business applications, it isn’t a secure way to communicate, so the messages you receive every day are also a potential threat to your confidential and sensitive business information. To help you protect your and your clients’ confidential information -- and to help you stay in compliance with state and federal regulations – secure messaging solution developer Nveloped put together this list of common e-mail security mistakes.
  • 2. 1. Sending confidential information in a regular e-mail Traditional e-mail isn’t secure and does not have safeguards to protect your data or your client’s data. And sending separate e-mails with password information doesn’t provide more security -- it’s just as easy to intercept that message with the password.
  • 3. 2. Clicking on links or opening attachments in unexpected messages Clicking a link or opening an attachment in an unexpected e-mail message can infect your computer or your business’ systems with malware. If you receive an unexpected message that asks you to take some action (for example, “Click here to confirm your account details”), check with the sender to verify that they sent the original message to you. Also, in most e-mail clients, the link address shows up at the bottom of the window when you hover your mouse over the link. That’s a good way to verify whether the link is “safe.” If the sender and link address don’t match up, it’s a good idea to check with your IT staff to confirm that the message is legitimate.
  • 4. 3. Not protecting your password Your password is the most direct way for someone to get into your e-mail account, so choosing a password that is complex (not “password”) and keeping it safe is extremely important. Many organizations now implement password policies that require a certain level of password complexity and periodic changes, but users also need to avoid writing down their passwords on sticky notes or posting them in their office where others can see them.
  • 5. 4. Not verifying the sender of an e-mail message In most e-mail clients today, there is a way to verify that the message actually came from the listed sender. In Gmail, for example, you can click on the small triangle next to the sender’s name, and it will show what e-mail server delivered the e-mail message. Messages that don’t have this information aren’t necessarily bad or untrustworthy, but you should be a bit cautious before clicking the links because the message sender has not been authenticated.
  • 6. 5. Not asking your partners to communicate securely There are many instances where an organization wants to communicate securely, but the partners they work with outside their organization continue to send information in a non-secure way. If you aren’t asking the other people and organizations with whom you communicate to also protect your sensitive data, it may still be at risk because your partners don’t have the right safeguards in place. Source: Nveloped
  • 7. 5. Not asking your partners to communicate securely There are many instances where an organization wants to communicate securely, but the partners they work with outside their organization continue to send information in a non-secure way. If you aren’t asking the other people and organizations with whom you communicate to also protect your sensitive data, it may still be at risk because your partners don’t have the right safeguards in place. Source: Nveloped