SlideShare a Scribd company logo
1 of 11
Download to read offline
Top 5 email security best practices
Educating your workforce
When it comes
to email security,
technological
solutions
aren’t enough.
$12 billion
In losses
due to BEC scams in 2018
74.5%
Of respondents say their
organisation receive brand
impersonation phishing emails
WHY?
The most common email threats go directly to humans.
Technological solutions can help, but there’s only so
much they can do to protect your organisation.
You need to educate your workforce on email security
best practices to achieve full security
Top 5 email security best practices
Strong, unique passwords
(stored in a password manager)
01
First and foremost, you need to secure your email accounts. Provide your employees
with the tools they need to understand how to create a secure password.
Recommendations vary, but a selection of four random yet common words can be
difficult to guess but easy to remember. Introduce a couple of special characters and
you’ll make your password even more secure.
Two-factor authentication
02
A strong password is the first line of defence for your inbox, but there’s more you can do
to secure it. Two-factor authentication is a simple method that makes it harder to hack
accounts.
AuthenticationtoolslikeGoogleAuthenticatorgenerateasix-digitnumberthatrefreshes
every few seconds. Users must enter this code to access the account. Other 2FA tools
include sending a code to a mobile or email address.
Phishing Emails
Educating Your Workforce
03
Once you’ve introduced more account security features, you need to educate your
workforce.Phishingemailsarethemostcommonemailthreat,soeducateyouremployees
on them.
In particular, discuss how cyber-attackers might hijack a brand to legitimise their phishing
email and trick people into clicking malicious links or attachments.
Likewise, make sure staff report harmful-looking spam instead of clicking on the
unsubscribe button.
Introduce Firm Email Policies
04
You don’t want to have any cracks in your email security armour, but the only way to
guarantee that is to introduce firm email policies.
Don’t allow your employees to use their work email address for personal use. Also, don’t
allow employees to connect their personal mobile devices to the company Wi-Fi – it is a
major security risk.
Make Email Security
Everyone’s Responsibility
05
Ultimately, you need to promote a culture of email security within your company to fully
combat fraud and cyber-crime.
Makeemailsecurityanddataprotectioneveryone’sresponsibility.Educateyourworkforce
and ensure they take a proactive approach to email security.
If your workforce stays vigilant, your organisation can head off most email threats.
87%
Of respondents believe email security threats
will increase over the next 12 months.
Don’t let the human element in your organisation be your downfall.
Co-opt them into your email security processes using our top five
email security best practices to secure your inbox.
Find out more about email security at
Intelligent Inbox
Visit

More Related Content

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Top 5 Email Security Best Practices

  • 1. Top 5 email security best practices Educating your workforce
  • 2. When it comes to email security, technological solutions aren’t enough. $12 billion In losses due to BEC scams in 2018 74.5% Of respondents say their organisation receive brand impersonation phishing emails WHY?
  • 3. The most common email threats go directly to humans. Technological solutions can help, but there’s only so much they can do to protect your organisation. You need to educate your workforce on email security best practices to achieve full security
  • 4. Top 5 email security best practices
  • 5. Strong, unique passwords (stored in a password manager) 01 First and foremost, you need to secure your email accounts. Provide your employees with the tools they need to understand how to create a secure password. Recommendations vary, but a selection of four random yet common words can be difficult to guess but easy to remember. Introduce a couple of special characters and you’ll make your password even more secure.
  • 6. Two-factor authentication 02 A strong password is the first line of defence for your inbox, but there’s more you can do to secure it. Two-factor authentication is a simple method that makes it harder to hack accounts. AuthenticationtoolslikeGoogleAuthenticatorgenerateasix-digitnumberthatrefreshes every few seconds. Users must enter this code to access the account. Other 2FA tools include sending a code to a mobile or email address.
  • 7. Phishing Emails Educating Your Workforce 03 Once you’ve introduced more account security features, you need to educate your workforce.Phishingemailsarethemostcommonemailthreat,soeducateyouremployees on them. In particular, discuss how cyber-attackers might hijack a brand to legitimise their phishing email and trick people into clicking malicious links or attachments. Likewise, make sure staff report harmful-looking spam instead of clicking on the unsubscribe button.
  • 8. Introduce Firm Email Policies 04 You don’t want to have any cracks in your email security armour, but the only way to guarantee that is to introduce firm email policies. Don’t allow your employees to use their work email address for personal use. Also, don’t allow employees to connect their personal mobile devices to the company Wi-Fi – it is a major security risk.
  • 9. Make Email Security Everyone’s Responsibility 05 Ultimately, you need to promote a culture of email security within your company to fully combat fraud and cyber-crime. Makeemailsecurityanddataprotectioneveryone’sresponsibility.Educateyourworkforce and ensure they take a proactive approach to email security. If your workforce stays vigilant, your organisation can head off most email threats.
  • 10. 87% Of respondents believe email security threats will increase over the next 12 months. Don’t let the human element in your organisation be your downfall. Co-opt them into your email security processes using our top five email security best practices to secure your inbox.
  • 11. Find out more about email security at Intelligent Inbox Visit