Ways to Prevent Email Account being compromised in a Breach
- by Brittany Day
In this interview Dave Wreski, CEO of Guardian Digital, explains various best practices for securing your email and protecting your privacy.
BD: What were your thoughts when you learned that your email address had been pwned in a data breach?
DW: I was discouraged, but not the least bit surprised when I was notified that my email account had been pwned in a data breach. These days, data breaches are ubiquitous and, unfortunately, somewhat unavoidable. In 2018 alone, there were 12,449 authentic breaches and leaks (Dark Reading). You can take all of the advisable precautions; however, chances are one of your email accounts will be compromised in a data breach or a data leak at some point. It is critical to recognize this and take measures to mitigate your risk and protect your privacy.
BD: What role does email typically play in data breaches and data leaks and how can an effective email security solution prevent the compromise of email accounts and sensitive data?
DW: Email is frequently involved in data breaches and data leaks because it is a popular vector for sending private information and conducting business affairs. This sensitive information could include email addresses, which could be used by threat actors to carry out future spear phishing or BEC attacks. An effective cloud email security accurately identifies and blocks malicious or fraudulent emails that could prompt users to share sensitive information or data, thus minimizing a person or an organization’s risk of experiencing data theft or data loss and the devastation that a successful attack can cause.
BD: How can open-source software and open-source operating systems be leveraged in an email security solution to provide a level of security that exceeds what proprietary solutions offer?
DW: The transparency, collaboration, and innovation encouraged by the open-source development model model result in software, operating systems and solutions that are inherently reliable and secure. Open-source code is available for experts from around the world to review and improve, leading to the rapid detection and elimination of vulnerabilities and security bugs. Thus, open-source email security solutions are secure from the ground up and offer a higher level of security and protection than proprietary alternatives. Proprietary software is not available for the public to review, and email security solutions comprised of proprietary technology often consist of software created for a different purpose with incoherent security features added on.
BD: What is your best advice in terms of both email security and email best practices for someone looking to minimize their risk of being affected by a data breach or an email-related attack?
DW: First off, never open a suspicious email, link or attachment. Here are some other measures that I would recommend taking to help prevent your email account from being hacked:
- Create a strong password that includes a variety of characters and NEVER share your password.
- Try to minimize logging into your email from public places. Untrusted computers can have spyware or keylogging programs hidden on them, which can collect personal information.
- Add two-step verification to your email address. A second step password is a random set of characters sent directly to your phone, laptop or tablet, which means that a hacker would need both your email password and your personal device to access your email account.
- Frequently check your account activity to make sure that records match your own login history.
That being said, email-related attacks have evolved to become highly sophisticated and deceptive and cyber criminals utilize advanced, complex social engineering tactics to trick their victims. This is why it is critical to invest in a comprehensive cloud email security that is designed to protect against both new and existing threats. To learn about EnGarde Cloud Email Security, an advanced open-source email security solution that outperforms proprietary alternatives in terms of security, reliability and resilience, visit www.guardiandigital.com.
Check if your email account has been pwned in a data breach here: haveibeenpwned.com
Follow us on social media!
Facebook: Guardian Digital
LinkedIn: Guardian Digital, Inc.
Latest Blog Articles
- Thinking Strategically about Email Security in 2021 and Beyond
- Open Source: A Powerful, Yet Underutilized Weapon against Phishing & Zero-Day Attacks
- Buyer's Guide: What to Prioritize in an Email Security Solution
- Buyer's Guide to Office 365 & Workspace Email Security
- EnGarde Cloud Email Security: The Logical Solution to Cyber Risk in Office 365
- Exchange Servers Are Vulnerable - Learn How To Secure Your Email Server Now
- Top Email Security Risks in 2021 - How To Set Your Business Up for Safety & Success
- Ransomware By The Numbers: How Big Is My Risk?
- SMB Ransomware Warnings & How To Prevent an Attack
- Apache SpamAssassin 3.4.6 Release Fixes Two Potentially Aggravating Bugs
Must Read Blog Posts
- Demystifying Phishing Attacks: How to Protect Yourself Now
- What You Need to Know to Shield Your Business from Ransomware
- Shortcomings of Endpoint Security in Securing Business Email
- Limitations of Microsoft 365 Email Security & How To Close These Dangerous Gaps
- Complete Guide to Email Viruses & Best Practices to Avoid Infections