{"id":1591,"date":"2016-09-08T14:21:31","date_gmt":"2016-09-08T14:21:31","guid":{"rendered":"https:\/\/tsisupport.com\/?p=1591"},"modified":"2021-08-09T05:53:25","modified_gmt":"2021-08-09T09:53:25","slug":"directors-best-practices-e-mail-security","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=1591","title":{"rendered":"Email Security Best Practices: How to Secure Your Email"},"content":{"rendered":"<p style=\"text-align: justify;\">E-Mail is one of the most commonly used applications in the world.\u00a0 It provides organizations with a quick and cost effective means to communicate and, from inception, it quickly became a necessity most businesses could not live without.\u00a0 However, hackers are keenly aware of this fact as well and continuously devise new creative ways to exploit any possible vulnerabilities for profit.\u00a0 At TSI, we strive to provide our clients with the knowledge and tools they need to mitigate this ever-present threat. We have outlined some key areas to developing a comprehensive E-Mail Security implementation.<!--more--><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Spam Filtering:\u00a0<\/strong><\/span>\u00a0Spam filters are appliances that can be deployed on-premises or in the cloud and are the first line of defense against E-Mail attacks.\u00a0 Not only can they drastically reduce the amount of junk mail users receive, they can also block E-Mail from blacklisted unsafe senders, remove messages with harmful verbiage and\/or attachments as well as warn users if the sender of a message is impersonating someone else.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Firewall:\u00a0<\/strong><\/span>Most SMBs know what a firewall is, but many are unaware of their full capabilities.\u00a0 Modern firewalls have the ability to detect anomalies in network traffic in real-time and discard\/quarantine anything deemed unreliable before it ever reaches the intended recipient.\u00a0 Firewalls also have built-in content filters capable of preventing users from browsing potentially harmful websites that contain malicious URLs embedded in E-Mail messages.\u00a0 They can also be configured to only allow E-Mail traffic that has been routed through an organization\u2019s spam filter before delivery.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Antivirus &amp; Antimalware:<\/strong><\/span> Antivirus and Antimalware applications are a small but significant component of an E-Mail security strategy.\u00a0 They can remove dangerous attachments from E-Mail messages and prevent users from unknowingly navigating to a suspicious link.\u00a0 However, in order for these applications to be effective, it is imperative that they be maintained and kept up to date.\u00a0 IT Security is only as strong as its weakest link and missing a single maintenance window has the potential to wreak havoc on a network.\u00a0\u00a0 A vigilant, consistent approach to AV\/Antimalware maintenance should be a crucial part of\u00a0your IT Security policy.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Password Management:<\/strong><\/span> Password management is often overlooked by many SMBs today, but it is a huge factor in a properly designed security strategy.\u00a0 30% of investigated data breaches last year were found to be caused by the use of weak passwords, yet surveys indicate that 49% of passwords are still considered to be weak.\u00a0 Insecure passwords can be exploited by hackers to gain access to your E-Mail.\u00a0 Once access is obtained, attackers will then use your E-Mail account to attempt a number of malicious attacks such as Phishing campaigns and wire transfer scams.\u00a0 They will also have access to any sensitive information that may be stored in the account.<\/p>\n<p style=\"text-align: justify;\">The problems that arise from the use of weak passwords are compounded by the fact that 70% of people admit to using the same password for multiple systems and that 51% are opposed to having to remember yet another complicated alphanumeric password. \u00a0A proper password policy should follow the guidelines in the infamous \u201cUnderwear Analogy\u201d which states:<\/p>\n<p style=\"text-align: center;\"><em><span style=\"color: #800000;\">Passwords should be treated like underwear.<\/span><\/em><\/p>\n<p style=\"text-align: center;\"><em><span style=\"color: #800000;\">You should not be able to guess what they look like.<\/span><\/em><\/p>\n<p style=\"text-align: center;\"><em><span style=\"color: #800000;\">They should be changed frequently.<\/span><\/em><\/p>\n<p style=\"text-align: center;\"><em><span style=\"color: #800000;\">They shouldn\u2019t be left out in the open for everyone to see.<\/span><\/em><\/p>\n<p style=\"text-align: center;\"><em><span style=\"color: #800000;\">They should not be shared with anyone.<\/span><\/em><\/p>\n<p style=\"text-align: justify;\">Password management applications ensure all of these guidelines are met, while increasing the productivity of employees.\u00a0 They ensure complex passwords are used, regularly changed, and eliminate the need to memorize them.\u00a0 They allow a user to log into a system with a single click of a mouse. Further, passwords are stored in the application using military grade encryption, which satisfies password compliance requirements from regulatory agencies such as HIPPA, PCI-DSS and SOX.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>User Education:<\/strong><\/span> End User Education is by far the most critical component of an Email-Security Strategy.\u00a0 There is no such thing as a bullet proof security policy; threats will inevitably find their way to an organization\u2019s user base.\u00a0 The sooner this realization is accepted; the sooner it can be properly mitigated.<\/p>\n<p style=\"text-align: justify;\">The most devastating breaches are rarely the result of a sophisticated attack.\u00a0 Rather, they are the consequence of employees who unknowingly provide hackers the keys to the kingdom.\u00a0 It is imperative that a healthy degree of paranoia is instilled in end users so that it becomes second nature to think twice before clicking on links or attachments in E-Mail messages, even those that appear to come from legitimate sources within the organization.<\/p>\n<p style=\"text-align: justify;\">One of the most effective ways to develop this awareness is to conduct routine Phishing Drills in which regular, targeted E-Mail messages containing suspicious attachments and links are sent to all employees.\u00a0 The results are then analyzed and detailed reports are generated that indicate which employees may need to refresh their training on E-Mail security best practices.<\/p>\n<p style=\"text-align: justify;\">Users should also undergo regular training on the proper use of E-Mail.\u00a0 Messages containing sensitive information such as social security numbers, employee tax or salary information, credit card numbers, etc. should be avoided.\u00a0 If sensitive information must be sent via E-Mail, use an application capable of encrypting the contents of the message, both at rest and in transit.<\/p>\n<p style=\"text-align: justify;\">Business E-Mail should be kept separate from personal E-Mail at all times.\u00a0 All of the E-Mail security tools in the world cannot help a company whose employees regularly conduct business with their own personal E-Mail accounts, outside of company control.\u00a0 Consider monitoring and\/or blocking access to personal email accounts from company resources and forcing remote users to connect to a corporate VPN before using company E-Mail.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Final Thought:<\/strong><\/span> Although E-Mail security risks have increased dramatically in recent years, there are a number of tools and strategies that can be implemented to mitigate these risks.\u00a0 Work proactively with your IT Team and\/or Managed Services Provider to identify and remediate potential threats as well as ensure company employees are educated in security best practices.\u00a0 Work with a security professional to develop a WISP (Written Information Security Policy) specific to your organization, review the document regularly to ensure that the policy is being followed and enforced.<\/p>\n<p style=\"text-align: justify;\">Unfortunately, there is no way to prevent all E-Mail attacks from reaching a user.\u00a0 The good news is most hackers are lazy and rely on automated processes to do their dirty work for them. An organization that implements E-Mail Security practices is far less likely to be a victim of a breach, and will likely be passed over by a potential attacker. To learn more on how TSI can help you with E-Mail Security, <a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\">Contact Us<\/a> today!<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>E-Mail is one of the most commonly used applications in the world.\u00a0 It provides organizations with a quick and cost effective means to communicate and, from inception, it quickly became a necessity most businesses could not live without.\u00a0 However, hackers are keenly aware of this fact as well and continuously devise new creative ways to&hellip;<\/p>\n","protected":false},"author":8,"featured_media":8461,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[271,272,17,273,274,192,242,275,21,23],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Email Security Best Practices | How to Secure Your Email | TSI<\/title>\n<meta name=\"description\" content=\"Protect your business by developing a comprehensive security email strategy. Follow these email security best practices and strengthen your cyber defenses.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Email Security Best Practices | How to Secure Your Email | TSI\" \/>\n<meta property=\"og:description\" content=\"Protect your business by developing a comprehensive security email strategy. Follow these email security best practices and strengthen your cyber defenses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=1591\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-08T14:21:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-09T09:53:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Email-Security.fw_-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Brian Downey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brian Downey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1591\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1591\",\"name\":\"Email Security Best Practices | How to Secure Your Email | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1591#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1591#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Email-Security.fw_-1140x380-1.png\",\"datePublished\":\"2016-09-08T14:21:31+00:00\",\"dateModified\":\"2021-08-09T09:53:25+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c\"},\"description\":\"Protect your business by developing a comprehensive security email strategy. Follow these email security best practices and strengthen your cyber defenses.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1591#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=1591\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1591#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Email-Security.fw_-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Email-Security.fw_-1140x380-1.png\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1591#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Email Security Best Practices: How to Secure Your Email\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c\",\"name\":\"Brian Downey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g\",\"caption\":\"Brian Downey\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=8\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Email Security Best Practices | How to Secure Your Email | TSI","description":"Protect your business by developing a comprehensive security email strategy. Follow these email security best practices and strengthen your cyber defenses.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Email Security Best Practices | How to Secure Your Email | TSI","og_description":"Protect your business by developing a comprehensive security email strategy. Follow these email security best practices and strengthen your cyber defenses.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=1591","og_site_name":"TSI Support","article_published_time":"2016-09-08T14:21:31+00:00","article_modified_time":"2021-08-09T09:53:25+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Email-Security.fw_-1140x380-1.png","type":"image\/png"}],"author":"Brian Downey","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Brian Downey","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1591","url":"https:\/\/tsisupport.com\/tsistaging\/?p=1591","name":"Email Security Best Practices | How to Secure Your Email | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1591#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1591#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Email-Security.fw_-1140x380-1.png","datePublished":"2016-09-08T14:21:31+00:00","dateModified":"2021-08-09T09:53:25+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c"},"description":"Protect your business by developing a comprehensive security email strategy. Follow these email security best practices and strengthen your cyber defenses.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1591#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=1591"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1591#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Email-Security.fw_-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Email-Security.fw_-1140x380-1.png","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1591#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Email Security Best Practices: How to Secure Your Email"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c","name":"Brian Downey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g","caption":"Brian Downey"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=8"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1591"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1591"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1591\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8461"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}