Five tricks to easily prevent potential vulnerabilities and ensure Email Security
In the previous introduction, I introduced five tips for ensuring Email Security. They are applicable to all types of users and are irrelevant to the types of clients used. In this article, five more formal suggestions are provided. These suggestions focus on preventing problems caused by users' own errors, rather than preventing attacks from external malicious hackers. Compared with external forces, security is more vulnerable to internal neglect.
Note: These tips are based on information technology security entries.
1: Disable Automatic processing.
With the increasing number of automated functions provided by communication software for ease of use, we will see more events caused by accidental selection of wrong recipients. A typical example is the "terrible auto-Fill function" in Microsoft Outlook, where it is easy to accidentally select a recipient near the drop-down list. This is especially likely to cause problems when discussing sensitive information such as trade secrets.
2: Use the BCC function when sending to multiple recipients
From a security perspective, it is not a good idea to share email addresses with people who do not need them. It is also impolite to share an email address with a stranger without the consent of others. When sending the same email to multiple recipients, if you use the send or CC Option, it means sharing all the email addresses with everyone. For emails that do not explicitly indicate that you want to share information with the world, You should select the BCC function. In this way, the recipient can only see its own email address, but cannot find the address of any other person in the bcc cc.
3: only save emails in a safe place
From the perspective of mail security, the more encryption measures, the better. If you save an email in plain text format after receiving and decrypting it, it may be discovered by other users who can log on. After a problem occurs, Sarah Palin finds that the mailbox service does not effectively protect the stored confidential emails as we imagined. Many users' personal computers do not consider security issues. In this case, the Windows root directory is usually set to a common Network File System (CIFS) protected by weak passwords).
4: Use your personal account to process your own emails
Emails shared with the public can easily make you the target of spam senders, whether sending emails to them or forging mail addresses using the email header field, various types of attacks may occur. The more you know about your email addresses, the more likely it is to bypass the blacklist used by the Internet service provider's spam interceptor and the system administrator of the lazy email server, this means that the email you send is more difficult to receive by the expected recipient.
5: The recipient is repeatedly confirmed every time-especially at the time of sending the email list
From a security perspective, it is not a big problem to accidentally reply to someone in the email list directly, instead of replying to the list as planned. It may cause inconvenience. However, you may not even notice that the email is not actually in the list. However, if the situation is reversed, it is a real problem: if you are not careful, you should send an email to a specific person and send it to the Mail list, it may lead to embarrassing or worse public events. Accidental disclosure of secrets may even be known to hundreds of people you don't know.