Free Site Registration


Common E-mail Security Mistakes

These five bad habits can make your confidential information -- and that of your clients -- easy to steal

While e-mail is one of the most widely used business applications, it isn’t a secure way to communicate, so the messages you receive every day are also a potential threat to your confidential and sensitive business information.

To help you protect your and your clients’ confidential information -- and to help you stay in compliance with state and federal regulations – secure messaging solution developer Nveloped put together this list of common e-mail security mistakes.

1. Sending confidential information in a regular e-mail 1. Sending confidential information in a regular e-mail

Traditional e-mail isn’t secure and does not have safeguards to protect your data or your client’s data. And sending separate e-mails with password information doesn’t provide more security -- it’s just as easy to intercept that message with the password.

Source: Nveloped

2. Clicking on links or opening attachments in unexpected messages 2. Clicking on links or opening attachments in unexpected messages

Clicking a link or opening an attachment in an unexpected e-mail message can infect your computer or your business’ systems with malware. If you receive an unexpected message that asks you to take some action (for example, “Click here to confirm your account details”), check with the sender to verify that they sent the original message to you.

Also, in most e-mail clients, the link address shows up at the bottom of the window when you hover your mouse over the link. That’s a good way to verify whether the link is “safe.” If the sender and link address don’t match up, it’s a good idea to check with your IT staff to confirm that the message is legitimate.

Source: Nveloped

3. Not protecting your password 3. Not protecting your password

Your password is the most direct way for someone to get into your e-mail account, so choosing a password that is complex (not “password”) and keeping it safe is extremely important. Many organizations now implement password policies that require a certain level of password complexity and periodic changes, but users also need to avoid writing down their passwords on sticky notes or posting them in their office where others can see them.

Source: Nveloped

Advertisement
4. Not verifying the sender of an e-mail message 4. Not verifying the sender of an e-mail message

In most e-mail clients today, there is a way to verify that the message actually came from the listed sender. In Gmail, for example, you can click on the small triangle next to the sender’s name, and it will show what e-mail server delivered the e-mail message. Messages that don’t have this information aren’t necessarily bad or untrustworthy, but you should be a bit cautious before clicking the links because the message sender has not been authenticated.

Source: Nveloped

5. Not asking your partners to communicate securely 5. Not asking your partners to communicate securely

There are many instances where an organization wants to communicate securely, but the partners they work with outside their organization continue to send information in a non-secure way. If you aren’t asking the other people and organizations with whom you communicate to also protect your sensitive data, it may still be at risk because your partners don’t have the right safeguards in place.

Source: Nveloped



More Taxpayer Misconceptions

Apparently, there’s no end to the ridiculous things taxpayers believe

View the slideshow >>


Dumbest Employee Excuses for Being Late

Running a little late could have big repercussions, especially at a firm in the midst of busy season. From escaped zebras to must-see TV, employers told CareerBuilder some of the most memorable excuses they've heard from tardy employees.

View the slideshow >>


Common Taxpayer Misconceptions

The NAEA’s collection of ridiculous things tax clients believe

View the slideshow >>


The 10 Fastest-Growing Firms in the U.S.

The firms with the highest 2013 revenue growth in our Top 100 Firms/Regional Leaders list

View the slideshow >>


Top 10 Tech Trends for 2014

As companies gain more affordable access to new technology and platforms, they also seek to make smarter investments. As we begin 2014, James Cashin, partner at McGladrey, has identified 10 common strategies in how companies are capitalizing on their IT investments to best implement process improvements and increase performance.

View the slideshow >>


Most Unusual Sales Tax Changes Last Year

The Tax & Accounting business of Thomson Reuters has compiled its annual sampling of quirky sales tax changes passed or implemented in 2013.

View the slideshow >>


Strangest Tax Deductions

The Minnesota Society of CPAs recently conducted its annual CPA member survey about the most strange and unusual tax deductions proposed by clients. The responses included everything from pets and wedding rings to gifts not given.

View the slideshow >>


A Taxpayer Bill of Rights?

The Taxpayer Advocate proposes a list of rights — and responsibilities

View the slideshow >>


The Top Stories in Accounting in 2013

Our editors’ picks for the biggest stories in accounting in 2013

View the slideshow >>


10 Ways to Attract Talent and Show Off Your Firm’s Assets

Is your firm attracting the right kind of candidates—or any candidates? Dawn Wagenaar, a principal at the accounting and professional consulting agency, Ingenuity Marketing Group, offers 10 ways for firms to attract the hottest talent.

View the slideshow >>



Advertisement

Advertisement

Advertisement

Advertisement