Skip to main content

Command Palette

Search for a command to run...

Staying Safe With Emails

Updated
5 min read
Staying Safe With Emails

In our digital age, emails have become a staple of communication. From personal messages to business transactions, emails connect us to the world. However, they also open doors to potential threats that can compromise your security and privacy. If you're not familiar with the tactics bad actors use to exploit email, this guide is for you. We'll explore which platforms to use, the different kinds of threats you might encounter, and how to stay safe.

This is a living document. I'll be adding more threat types and examples in the future.

Choosing A Secure Email Platform

The first step in staying secure is choosing a reliable email provider. Not all email platforms are created equal, and some offer better security features than others. Here are a few recommendations:

  • Gmail: Google’s email service is popular for its robust security features. It offers two-factor authentication (2FA), advanced spam filtering, and protection against phishing attacks.

  • ProtonMail: For those who prioritize privacy, ProtonMail is a great option. It offers end-to-end encryption, meaning that even the service provider cannot read your emails. This is ideal if you want to ensure your communications are as private as possible.

  • Outlook: Microsoft’s Outlook also provides strong security measures, including encryption, 2FA, and the ability to block external content in emails to prevent tracking.

When setting up your email account, take advantage of the security features these platforms offer. Always enable two-factor authentication and choose a strong, unique password for your email account.

Common Email Threats To Be Aware Of

Understanding the types of threats you might face is key to staying safe. Here are some of the most common email-based attacks:

  1. Phishing: This is when a bad actor sends an email pretending to be someone you trust, like a bank, a friend, or a popular service. The email usually contains a link that, when clicked, leads to a fake website designed to steal your personal information.

    How to spot it: Look for generic greetings ("Dear customer"), a sense of urgency ("Act now!"), and suspicious links. Always double-check the sender's email address and hover over links to see where they lead.

  2. Malware: Some emails contain attachments or links that, when opened, install malicious software on your device. This malware can steal your data, track your activity, or even lock you out of your own files until you pay a ransom (ransomware).

    How to spot it: Be wary of unexpected attachments, especially if the file type is unusual (.exe, .zip, etc.). If you're not expecting an attachment, don't open it without confirming with the sender.

  3. Spam: While not always malicious, spam emails can clutter your inbox and sometimes contain links to phishing sites or malware. These are often mass emails sent by marketers or scammers.

    How to spot it: Look for poorly written content, unsolicited offers, or emails from unknown sources. Most email providers have spam filters that automatically move these emails to a separate folder, but some might still slip through.

  4. Impersonation: Sometimes, attackers might try to impersonate someone you know, like a colleague or family member, to gain your trust and trick you into providing sensitive information.

    How to spot it: Double-check the email address, even if the name seems familiar. Look for inconsistencies in the way the person communicates. If something feels off, reach out to the person directly through another means of communication.

Tips for Staying Safe

Now that you know the types of threats to look out for, here are some practical tips to help you stay secure when dealing with emails:

  1. Think Before You Click: Always be cautious with links and attachments. If an email seems suspicious, don't click on anything until you've verified its legitimacy. When in doubt, navigate directly to the website by typing the URL into your browser rather than clicking a link in the email.

  2. Use Strong, Unique Passwords: Your email password should be strong (a mix of letters, numbers, and symbols) and unique (don’t reuse passwords across multiple accounts). Consider using a password manager to help you generate and store complex passwords.

  3. Enable Two-Factor Authentication (2FA): This adds an extra layer of security by requiring a second form of verification (like a code sent to your phone) in addition to your password. Even if someone gets your password, they won’t be able to access your account without the second factor.

  4. Keep Your Software Updated: Regularly update your email app, antivirus software, and operating system. Updates often include security patches that protect against new threats.

  5. Be Wary of Public Wi-Fi: Avoid accessing your email on public Wi-Fi networks, especially if they are unsecured. If you must use public Wi-Fi, consider using a Virtual Private Network (VPN) to encrypt your connection.

  6. Regularly Review Your Security Settings: Take some time to review the security settings of your email account. Ensure that 2FA is enabled, check for any unusual account activity, and keep your recovery options up to date.

  7. Report Suspicious Emails: If you receive a phishing email or another type of suspicious email, report it to your email provider. This helps them improve their filters and protects other users.

Conclusion

Email is a powerful tool, but it comes with its own set of risks. By choosing a secure email platform, staying informed about common threats, and following best practices, you can protect yourself and your personal information. Remember, the key to staying secure is vigilance and taking proactive steps to safeguard your digital life. Stay safe out there!

Online Security Practices For Everyone

Part 1 of 1

Here I'm writing about basic practices to help avoid bad actors while on the internet. Mostly making this for my family that isn't keeping up with the rapid advancement of technologies, but open for everyone else that is interested.