• Latest
  • All
  • How To

Email Security.

September 20, 2011
Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025
Apple Smart Glasses

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
DHgate Tablet Cases deals
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025
Airtel Africa Starlink partnership

Starlink Is Expanding in Africa Through New Airtel Partnership

May 8, 2025
Android FreeType patch

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

May 7, 2025
worldcoin kenya

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

May 7, 2025
smartphones-2024

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

May 7, 2025
GTA 6 Trailer 2

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

May 7, 2025
YouTube Premium Duo

YouTube Now Lets Two People Share a Premium Plan

May 6, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Email Security.

Morris Mwiti by Morris Mwiti
September 20, 2011
in News
Reading Time: 5 mins read
261
0

We use our emails in a manner that may compromise our own security and we blame our flaws on others.  These few points will help you secure your mail box (and others too) as you use email in your day to day activities

1. Don’t use one email account.

Most newbie’s think of an email account just like you think of your postal box number. It is a good idea to have at least 3 accounts (1 for personal use, another for online newsletter subscriptions and everything you want to do, and the last for business or job related work)

 

2. Don’t hold onto spammed-out accounts too long.

Over time, your email account will accumulate a lot of spam and junk mail. You will find that most of your time you have to wade around junk mail to get the email you really need. If this is the case, you will find that is better to discard the email account for a new account.

 

3. Please close the browser after logging out.

 

When you check your mail from a shared computer e.g in a cyber café, library or school, you not only need to log out but also make sure you close the browser. Some mail clients display your username (email address) even after logging out. You can also click the browser’s back button and some mail services still do a cache of your pages (bad)

If you are using Mozilla Firefox browser, before you start browsing, click tools>start private browsing or pres Shft+Ctrl+P

 

4. Remember to delete browser cache, history and passwords.

 

How many times have you heard someone claim their facebook account has been hacked to and some weird stuff updated? In fact the users are to blame but I always pity them when they complain because they never admit they are to blame.

Once you are done at shared computer, be it in a cyber café or library or a friend’s computer; make sure you clear some history. If using firefox just hit Shft+ctrl+Del

 

5. Please use Blind Carbon Copy (BCC) option when sending a message to multiple people.

Most mail users I have seen reply or forward lots of mail to lots of people in the To: field. That is a bad habit considering all other receivers will see all addresses, the receivers get the message, forward the message and earlier addresses are appended in the current message. Stop and think.

That is why most of us receive close to 50 spam mails every day.

 

6. Do not forward Chain Letters.

The message is right there. And this includes that mail that says “.. If you don’t forward you will not be blessed…” or you will die.

These chain letters get into my nerves. And sorry to say I never read them. Especially long mails to me contain no sense (I just hit Del)

 

7. Don’t think an erased email is gone forever.

Take care of what you write and send via email. Even after deleting a mail from your sent>inbox>trash folders, the mails still reside in remote servers and can be retrieved very easily by professionals. These mails may come to haunt you years later.

 

8. SCAM!

 

How on earth do you win in a lottery you never participated? I don’t have to talk about this.

You get an email from an anonymous girl who claims to be the daughter of a certain late president claiming to be in need to transfer funds and you reply to that….

 

9. Phishing

 

Phishing is a type of online fraud where the attacker tries to imitate a certain website to make you believe it is a legit website. They usually steal logo’s, and entire website designs, trick you to supply your personal details e.g passwords, credit card number e.t.c

 

Before you click a link  in your mail, look at the status bar to confirm it is the link you really want to visit.

 

Signs of phishing include:

 

* A logo that looks distorted or stretched.

* Email that refers to you as “Dear Customer” or “Dear User” rather than including your actual name.

* Email that warns you that an account of yours will be shut down unless you reconfirm your billing information immediately.

* An email threatening legal action.

* Email which comes from an account similar, but different from, the one the company usually uses.

* An email that claims ‘Security Compromises’ or ‘Security Threats’ and requires immediate action.

 

10. Never Send personal and financial information via email.

Any descent financial institution or online store will never ask for your financial information (e.g credit card number) via Email. They usually have a secured web address where you submit your data. The connection is usually SSL secured (Secure Sockets Layer) and ensure that the address starts with HTTPS:// for a secure connection.

Emails are more hacked than any other online form of communication

 

11. Do Not Unsubscribe from newsletters you never subscribed to.

Yeah. Spammers like this particular technique. They send out thousands of spam  with an unsubscribe link at the bottom. And because you are bad  enough to unsubscribe, you end up supplying your mail address.

You now end up signing up for more spam.

 

12. Don’t Trust your friends email.

 

I know you are very careful when you get a mail from an unknown party. But when it is from your friend, you think everything in it must be true.

Most a time I get email from friends that are as a result of their accounts being hacked. Screen your friend’s mail first before taking any action

 

13. Blacklist spam after deleting it.

 

Deleting spam does not stop the nuisance. Black list the address

 

14. Enable Spam Filter

Most mail services and mail client apps have spam filters built in. Make use of the spam filter.

 

15. Scan all email attachments.

 

Nine out of every ten viruses that infect a computer reach it through an email attachment. Make sure you scan email attachments before you can open them

 

16. Do not share your account information with others.

 

I know its your spouse but s/he might not apply the security policies that you apply. Once you share your password with someone else, it is never secure anymore.

 

17. Don’t use simple and easy-to-guess passwords.

How on earth would you use a guessable password e.g. 123456, abcd, mypassword etc. Hackers try out guessable passwords which are usually English names and if they cant get in to your account; as a result of a strong password, they will simply give up.

Use passwords with a combination of letters, numbers, caps, and symbols.

 

18. Encrypt your wireless connection.

 

You have a wireless router but you never care or know that it is open. Encrypt your wireless connection.

It is more secure encrypting it using WPA2 standard. WEP is no longer secure.

 

Tags: Data SecurityDigital MediaEmail
SendShare146Tweet92
Morris Mwiti

Morris Mwiti

Doing Web Hosting, Reseller Web Hosting, domain registration, SSL certificate sale, Web Design. I am mostly into IT issues.

Related Posts

Facial recognition technology

China Tightens Facial Recognition Laws to Ensure Data Security

March 24, 2025
mark zuckerberg

WhatsApp Fined KES 29 Billion For Data Breach

September 2, 2021
How To Get Rid of Unwanted Emails Once and For All

How To Get Rid of Unwanted Emails Once and For All

March 11, 2021
Security

How to Fortify Data Security in Your Business

November 16, 2021
Facebook Wants To Rival Email In Account Recovery

Facebook Wants To Rival Email In Account Recovery

January 31, 2017
Telegram Rolls Out Several New Features Which Includes One We See in Email

Telegram Rolls Out Several New Features Which Includes One We See in Email

June 15, 2016

Latest

Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025
Apple Smart Glasses

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

5 Most Reliable Virtual Dollar Card Providers in Nigeria

More News

Starlink Is Expanding in Africa Through New Airtel Partnership

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

YouTube Now Lets Two People Share a Premium Plan

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.