MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Avoiding Email Scams To Protect Professional And Personal Data From Hackers

Published on 09 November 13
0
4
Avoiding Email Scams To Protect Professional And Personal Data From Hackers - Image 1

Not many people know by entertaining certain emails and clicking links cleverly disguised they are actually giving access to crooks to take control of their browsing information. Phishing scams are real and widespread across the internet, especially through the different common free email sites such as Yahoo and Gmail, where receiving phishing emails is normal. You would think people do not click the links or reply to such mails but they do.


Hacks Start With A Phishing Email

While people might be able to control phishing emails and other related spam in their email inboxes, companies and organizations with many people manning the same email address might grapple with another challenge. We have heard of the New York Times being hacked by Chinese hackers and AP Twitter accounts hacked and false messages posted. Both the two big news media sites reported weeks ago that it had started with phishing emails well disguised that an employee clicked and the hackers accessed their information. This indicates sharing things in emails, especially important data such as passwords should not happen or allowing crucial information to be suspended in your email.


Mobile Phone Security Apps

With so much technological development and lots of apps already developed, you can get both free and paid apps services providing monitoring services of your iPhone or Android Smartphone emails, text messages and other information you might have on the phone. Most of them ensure no evil or clandestine monitoring of your email takes place with some apps even letting you know who is watching your internet browsing activities. However, to avoid phishing scams especially on your PC or your company’s computer network, a number of things must be done.


Training

You might be shocked but some employees have no idea what phishing is and links on emails to them are normal in this age of newsletters sent to our email with links and clickable graphics. Workers must be warned and trained on how to identify phishing emails, mostly characterized by bad written emails with serious issues of grammar, lots of links or just one where you are convinced to click it, intimidating or threatening email and some that seem to prod you to give personal information or to elicit some form of reply from you to allow the hackers work on you.


Safety Measures

To be as safe as you can, protect yourself through a number of measures such as guarding yourself against all forms of spam. At the same time, be vigilant about emails that seem to emanate from senders you cannot recognize, requesting that you confirm financial or personal information on the web or urgently request for such information from you. Always ignore emails not personalized or directly sent to you. Also, most of them will play with your mind by threatening you with some information to frighten you to act fast or rashly.


Secure Communication Of Serious Information

Rather than send emails with sensitive information, use cloud based platforms to share the documents such as Dropbox, Box and Google Drive or simply make a call. Always look for signs that the site you are transacting on is secure with an “https” and icon that appears much like a lock on the status bar of the browser. No matter what you do, email addresses should be clearly monitored.


Prateek is a IT graduate who is addicted to social networking and uses those platforms daily. He recently blogged on how he lost his access to gmail account and used this www.socialpasswordfinder.com to recover the lost password.

This blog is listed under IT Security & Architecture and Digital Media & Games Community

Related Posts:

Social media analytics

 

Cyber security

 

Google hacking

 
Post a Comment

Please notify me the replies via email.

Important:
  • We hope the conversations that take place on MyTechLogy.com will be constructive and thought-provoking.
  • To ensure the quality of the discussion, our moderators may review/edit the comments for clarity and relevance.
  • Comments that are promotional, mean-spirited, or off-topic may be deleted per the moderators' judgment.
You may also be interested in
 
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top