Ways to Prevent Email Account being compromised in a Breach
- by Brittany Day
In this interview Dave Wreski, CEO of Guardian Digital, explains various best practices for securing your email and protecting your privacy.
BD: What were your thoughts when you learned that your email address had been pwned in a data breach?
DW: I was discouraged, but not the least bit surprised when I was notified that my email account had been pwned in a data breach. These days, data breaches are ubiquitous and, unfortunately, somewhat unavoidable. In 2018 alone, there were 12,449 authentic breaches and leaks (Dark Reading). You can take all of the advisable precautions; however, chances are one of your email accounts will be compromised in a data breach or a data leak at some point. It is critical to recognize this and take measures to mitigate your risk and protect your privacy.
BD: What role does email typically play in data breaches and data leaks and how can an effective email security solution prevent the compromise of email accounts and sensitive data?
DW: Email is frequently involved in data breaches and data leaks because it is a popular vector for sending private information and conducting business affairs. This sensitive information could include email addresses, which could be used by threat actors to carry out future spear phishing or BEC attacks. An effective cloud email security accurately identifies and blocks malicious or fraudulent emails that could prompt users to share sensitive information or data, thus minimizing a person or an organization’s risk of experiencing data theft or data loss and the devastation that a successful attack can cause.
BD: How can open-source software and open-source operating systems be leveraged in an email security solution to provide a level of security that exceeds what proprietary solutions offer?
DW: The transparency, collaboration, and innovation encouraged by the open-source development model model result in software, operating systems and solutions that are inherently reliable and secure. Open-source code is available for experts from around the world to review and improve, leading to the rapid detection and elimination of vulnerabilities and security bugs. Thus, open-source email security solutions are secure from the ground up and offer a higher level of security and protection than proprietary alternatives. Proprietary software is not available for the public to review, and email security solutions comprised of proprietary technology often consist of software created for a different purpose with incoherent security features added on.
BD: What is your best advice in terms of both email security and email best practices for someone looking to minimize their risk of being affected by a data breach or an email-related attack?
DW: First off, never open a suspicious email, link or attachment. Here are some other measures that I would recommend taking to help prevent your email account from being hacked:
- Create a strong password that includes a variety of characters and NEVER share your password.
- Try to minimize logging into your email from public places. Untrusted computers can have spyware or keylogging programs hidden on them, which can collect personal information.
- Add two-step verification to your email address. A second step password is a random set of characters sent directly to your phone, laptop or tablet, which means that a hacker would need both your email password and your personal device to access your email account.
- Frequently check your account activity to make sure that records match your own login history.
That being said, email-related attacks have evolved to become highly sophisticated and deceptive and cyber criminals utilize advanced, complex social engineering tactics to trick their victims. This is why it is critical to invest in a comprehensive cloud email security that is designed to protect against both new and existing threats. To learn about EnGarde Cloud Email Security, an advanced open-source email security solution that outperforms proprietary alternatives in terms of security, reliability and resilience, visit www.guardiandigital.com.
Check if your email account has been pwned in a data breach here: haveibeenpwned.com
Follow us on social media!
Facebook: Guardian Digital
LinkedIn: Guardian Digital, Inc.
- Effectively Securing Business Email Accounts: Are Employees the Weakest Link?
- Encryption: An Essential Yet Highly Controversial Component of Digital Security
- Business Email Security Redefined: Key Benefits of Securing Your Business Email with Guardian Digital
- 8 Business Email Security Best Practices
- Demystifying Email Encryption: Stop Sender Fraud
- Demystifying Phishing Attacks: How to Protect Yourself Now
- Demystifying Tax Fraud: How to Avoid Falling Victim to Deceptive, Costly Scams This Tax Season
- Coronavirus Phishing Scams are On the Rise - Is Your Business Email at Risk of Infection?
- Dave Wreski: Founder of Guardian Digital – Open Source Cloud Email Security
- New Ransomware Warnings: Is Your Business Safe from This Silent Threat?
- FBI: Existing Cloud Email Protection Inadequate Against Phishing, Ransomware
- Email Risk is Universal: Securing Business Email in Every Industry Sector
- How To Safely Navigate Office 365 While Working Remotely
- Tips and Advice for Staying Safe Online During COVID-19
- Why Your Business Needs Better Email Security
- Defending Against COVID Email Spoofing Attacks with DMARC
- You’ve Got Mail: How To Tell If It’s Fraud
- Open-Source Security Is Opening Eyes
- Think Like A Criminal: How To Write A Phishing Email
- The Four Biggest Email Threats Your Business Faces Today
- Everything On DocuSign Phishing Attacks in 3 Minutes
- Understanding Payload-Less Email Attacks in Under 3 Minutes
- Demystifying Fileless Malware in Less than 3 Minutes
- How to Protect Sensitive Data & Maintain Client Trust in Financial Services Industry
- Exchange Servers Are Vulnerable - Learn How To Secure Your Email Server Now
- Apache SpamAssassin Leads A Growing List of Open-Source Projects Taking Steps to Correct Instances of Racism and White Privilege
- Cyber Risk Is Greater than Ever in the Legal Industry
- Understanding Malicious URL Protection - And Why You Need It to Secure Your Email
- Email Security for SMBs Beyond COVID-19
- Email Risk Is BIG for SMBs - How To Protect Your Business Now
- Email Threats By The Numbers: How Big Is My Risk?
- The Modern Email Threat Landscape: Where Traditional Defenses Fall Short
- Why Email Security Is More Important Than Ever in This 'New Reality'
- The Threat of CEO Fraud Extends Beyond the C-Suite
- Top Email Security Trends Putting Your Business at Risk of Attack
- Think Like A Criminal: What You Need to Know About Social Engineering Attacks in 2020
- Managed Services: A Key Element of Effective Email Security that Even Modern Solutions Lack
- How To Secure Your Remote Workforce: Advice from Leading Security Experts
- FBI: The 2020 Presidential Election Is Under Attack by Email Scammers
- AT&T Security Researchers Identify a Correlation between Strong Cybersecurity and Business Success
- The Aftermath of a Cyberattack Pt. 1: Phishing Recovery Basics
- It Pays to be Prepared! Ransomware Preparedness & Recovery Basics
- Breaking Down Fileless Malware: Anatomy of an Attack
- Office 365 Email Is Vulnerable to Attack Without These Critical Supplementary Defenses in Place
- Keep the Holidays Merry & Bright - Beware of These Sneaky Seasonal Phishing Scams
- Migrating Business Email: The Hidden Complexities You Need To Know
- How Do SPF, DMARC & DKIM Secure Email Against Sender Fraud?
- Top Email Security Risks Heading into 2021 - How To Set Your Business Up for Safety & Success
- Your Current Approach to Email Security May Not Be Enough
- Ways to Prevent Email Account being compromised in a Breach
- Celebrating 20 Years of Revolutionizing Digital Security
- IBM Closes its $34 Billion Acquisition of Red Hat
- Interview with Security Expert and Author Ira Winkler
- What is Phishing Email? How to prevent Phishing email scams?
- Ways Our Business Email Exceed Your Expectations
- Spear Phishing Protection - Definition & How To Recognize Spear Phishing Email
- What is Whaling (Whaling Phishing)? & How to Prevent Whaling attacks?
- Ransomware Attack Explained - Best Practices For Ransomware Protection
- Business Email Compromise (BEC) - Definition & Prevention From BEC Attacks
- Wire Transfer Scams Involving Real Estate Transactions: How to Prevent Fraud with Effective Email Security
- Guardian Digital and Mautic: A Dynamic Open-Source Duo
- Email Malware - How to Recognize & Prevent Malware Email Attack
- An Open-Source Success Story: Apache SpamAssassin Celebrates 18 Years of Effectively Combating Spam Email
- What is Spam Email - Types & How to Prevent Spam Emails?
- Email Virus - Complete Guide to Email Viruses Plus Best Practices
- What Is A Zero-Day Attack & How To Prevent Zero Day Exploit?
- 2020: A New Decade of Digital Threats - Is Your Business Email Secure?
- Linux: An OS Capable of Effectively Meeting the US Government’s Security Needs Heading into 2020
- Complete Guide on Email Security & Threats Faced by Organizations
- Guardian Digital Keeps its Customers Protected from Intel Design Flaw
- Security Spotlight: Open Source Email Security Solutions
- Top Six Advantages of Open Source Development/Products
- Python and Bash - Contenders for the most used scripting language
- Guardian Digital Outlines Top 4 Benefits of Choosing Cloud
- Unrivaled Protection Against Today’s Most Dangerous Threats
- Guard Your Email Accounts Against Today’s Most Dangerous Threats
- Security Highlights from Defcon 26
- Linux / Open Source FAQs: Common Myths / Misconceptions
- Email Security FAQs Answered by Guardian Digital
- Guardian Digital Mail Systems: Designed to be Secure Without Fail