{"id":86530,"date":"2016-09-23T07:15:24","date_gmt":"2016-09-23T12:15:24","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=86530"},"modified":"2017-04-07T19:17:55","modified_gmt":"2017-04-08T00:17:55","slug":"10-important-email-security-tips-practices","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2016\/09\/10-important-email-security-tips-practices\/","title":{"rendered":"10 important email security tips and practices"},"content":{"rendered":"

Before Gmail, there was Yahoo Mail, which\u00a0was, and still is, popular in the Caribbean. With the theft data on over 500 million accounts stolen, we are reminding email users of basic security tips.<\/span><\/i><\/p>\n


\nEarlier this week, reports emerged that global technology firm, Yahoo Inc. had been hacked and data associated with\u00a0over 500 million email accounts were stolen. The hacking incident(s) appeared to have occurred several weeks, even months, ago, but is only now being made public. Whilst it is not clear how many subscribers Yahoo has worldwide, nor has any information been disclosed on whether the stolen accounts were limited to specific countries or geographic regions, it would be safe to assume that Caribbean subscribers of Yahoo have been affected.<\/span><\/p>\n

The Yahoo platform offers a broad range services, including email, news, online mapping, video sharing, to name a few, and it is in the top five most visited websites globally (source: \u00a0<\/span>Alexa<\/span><\/a>). Further, the company is in the process of being acquired by Verizon Inc. and from some reports, Verizon may not have been made aware major security breach until just a few days ago. Accordingly, longer term implications of the breach and theft are expected \u2013 not just affecting the firm itself, but also to its subscribers.<\/span><\/p>\n

So many of us would be lost without email access, especially for work. We therefore take it for granted, until something happens, and we are reminded how vulnerable our personal information and private communication truly are. Hence, although we, at ICT Pulse, have done so before, it again is opportune to remind all of us of some basic email security tips \u2013 this time from popular computer security software firm, <\/span>McAfee<\/span><\/a>:<\/span><\/p>\n

    \n
  1. \u00a0Obtain comprehensive security software. <\/span><\/li>\n
  2. \u00a0Share your email address with only trusted sources. <\/span><\/li>\n
  3. \u00a0Be careful when opening attachments and downloading files from friends and family or accepting unknown emails. <\/span><\/li>\n
  4. \u00a0Be smart when using Instant Messaging programmes. <\/span><\/li>\n
  5. \u00a0Watch out for phishing scams. (Phishing scams use fraudulent emails and fake Web sites, masquerading as legitimate businesses, to lure unsuspecting users into revealing private account or login information.) <\/span><\/li>\n
  6. \u00a0Use email wisely. (Be careful about what information you submit via email. Never send your credit-card information, Social Security number, or other private information via email.)<\/span><\/li>\n
  7. \u00a0Do not reply to spam email. If you don\u2019t recognize the sender, don\u2019t respond. Even replying to spam mail to unsubscribe could set you up for more spam.<\/span><\/li>\n
  8. \u00a0Create a complex email address. <\/span><\/li>\n
  9. \u00a0Create smart and strong passwords. <\/span><\/li>\n
  10. \u00a0Never enter your personal information into a pop-up screen.<\/span><\/li>\n<\/ol>\n

    An issue that the Yahoo email incident has emphasised, is the fact that frequently both the firm and the email account holders are blissfully unaware of any security breach, and may only learn of it well after the damage has been done. In being proactive and incorporating the practices suggested above, account holders would be doing their part to minimise their exposure and loss, should their email accounts be compromised.<\/span><\/p>\n

     <\/p>\n

    Image credit: \u00a0Heartlover1717<\/a>\u00a0(flickr)<\/em><\/p>\n

    _______________<\/p>\n","protected":false},"excerpt":{"rendered":"

    Before Gmail, there was Yahoo Mail, which\u00a0was, and still is, popular in the Caribbean. With the theft data on over 500 million accounts stolen, we are reminding email users of […]<\/p>\n","protected":false},"author":2,"featured_media":86533,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[17,13,11,33],"tags":[105,38,34],"class_list":["post-86530","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-caribbean","category-content","category-ict-tech","category-lists","tag-cybercrimecybersecurity","tag-data-protection","tag-lists-2","et-has-post-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2016\/09\/Tie-A-String-Around-Your-Finger-Heartlover1717-flickr.jpg?fit=640%2C512&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-mvE","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/86530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=86530"}],"version-history":[{"count":4,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/86530\/revisions"}],"predecessor-version":[{"id":96969,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/86530\/revisions\/96969"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/86533"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=86530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=86530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=86530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}