<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.actisofttechnology.com/blogs/tag/tips/feed" rel="self" type="application/rss+xml"/><title>ActiSoft Technology - Blog #Tips</title><description>ActiSoft Technology - Blog #Tips</description><link>https://www.actisofttechnology.com/blogs/tag/tips</link><lastBuildDate>Thu, 23 Apr 2026 21:15:21 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Our Email Security Top 10 Tips]]></title><link>https://www.actisofttechnology.com/blogs/post/our-email-security-top-10-tips</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-825187098.jpg"/> Tip Number 1&nbsp; Understand Cyber Crime and Methods Used Cybercrime comes in many shapes and forms, ranging fro ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_8KXupqpYQdiKsuid6HKgzQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Wdyg3QyQSJq1FvM1dv5szg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_dch80vC3R8q2oFXJpR2A8A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_5oOvSJmTT0O3D7T6wn2c9w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_5oOvSJmTT0O3D7T6wn2c9w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Over 90% of All Cyber Attacks Start with an Email</h2></div>
<div data-element-id="elm_wQmbpIL7S8CsdFzl5uURig" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wQmbpIL7S8CsdFzl5uURig"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:0.0001pt;"><b><span style="font-size:13.5pt;">Tip Number 1&nbsp;</span></b><i><span style="font-size:13.5pt;">Understand Cyber Crime and Methods Used</span></i></p><p style="margin-bottom:0.0001pt;"><i><span style="font-size:13.5pt;"><br></span></i></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">Cybercrime comes in many shapes and forms, ranging from harmless pranks to company bankrupting crimes. BEC (</span><span><span style="font-size:13.5pt;">business email compromise</span></span><span style="font-size:13.5pt;">) attacks should be considered one of the biggest threats to businesses today. They have cause billions in company losses and continue to evolve and multiply at an alarming rate. Always be careful with instructions from CEO's and senior management as they may not be legitimate, query them if they are outside of the norm, especially when it says not to!</span></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">The first step in defence against cyber criminals, is a clear understanding of the various types of </span><span style="font-size:13.5pt;">malware</span><span style="font-size:13.5pt;">, </span><span style="font-size:13.5pt;">ransomware</span><span style="font-size:13.5pt;">, </span><span style="font-size:13.5pt;">viruses</span><span style="font-size:13.5pt;">, and</span><span style="font-size:13.5pt;"><a href="http://www.theemaillaundry.com/phishing-awareness/"></a>phishing</span><span style="font-size:13.5pt;"> attacks and how they are deployed. Each of these target a specific type of user and require different precautions to be taken to avoid infection.</span></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">Be careful with information you provide on company websites, social media both company and personal as this information can be used by criminals to attack your organisation.</span></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;"><br></span></p><p style="margin-bottom:0.0001pt;"><b><span style="font-size:13.5pt;">Tip Number 2&nbsp;</span></b><i><span style="font-size:13.5pt;">Be Wary of Public WiFi</span></i></p><p style="margin-bottom:0.0001pt;"><i><span style="font-size:13.5pt;"><br></span></i></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">One of the lesser-known email security tips is to avoid the use of public WiFi and devices Public computers and hot spots can be tempting for those users on-the-go, but their unsecured nature makes them a hotbed for cyber-attacks. </span></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">When a user logs onto a public computer they are completely unaware of who and what has been on that device in the past. While the machine may appear normal to a user, there could be unsavoury programs installed such as keyboard logger, waiting to collect credentials. </span></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">Hackers use public WiFi to lure in unaware victims, once connected, these victim’s computers become completely accessible. Once they have access, the hacker can view the computer’s information, lead the user to phishing sites, or trick them into downloading malware or ransomware. </span></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">The best way to stay safe in public is to avoid public WiFi and shared computers. If you can't get away from not using public WiFi then try using a VPN as that will encrypt all your traffic.</span></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;"><br></span></p><p style="margin-bottom:0.0001pt;"><b><span style="font-size:13.5pt;">Tip Number 3&nbsp;</span></b><i><span style="font-size:13.5pt;">Know What Your Opening</span></i></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;"><br></span></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">The majority of cyber-attacks happen through email as it is the easiest way onto a user’s computer. Proper education and training should be completed by anyone who interacts with email on a regular basis as standard. Hacker tactics are getting more advanced and authentic looking by the moment, so users should always be aware of how to detect a malicious email and what to do if they receive one/open one by accident.</span></p><p style="margin-bottom:0.0001pt;"><b><span style="font-size:13.5pt;"><br></span></b></p><p style="margin-bottom:0.0001pt;"><b><span style="font-size:13.5pt;">Tip Number 4&nbsp;</span></b><i><span style="font-size:13.5pt;">Stay Safe on Mobile Devices</span></i></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;"><br></span></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">Although not publicised as much as desktops &amp; laptops, mobile devices can and do, still get attacked. A user’s device is not only vulnerable through email and phishing sites, user’s must also be</span><span><span style="font-size:13.5pt;"><a href="https://www.grahamcluley.com/advertising-trojan-100-android-apps-google-play-store/"></a>wary of the apps</span></span><span style="font-size:13.5pt;"> they are downloading. While Android devices are more likely to be attacked, iPhone users should also be cautious to ensure safety. Be sure not to visit any potentially dangerous sites or download any unknown attachments with-out putting in place other security strategies.</span></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">All organisations should put in place the ability to wipe clean a mobile device that has been lost or stolen preventing access to the corporate email or other systems. Users are becoming more mobile in their working day and this will only increase with time which will open more threat vectors to your business.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;"><br></span></p><p style="margin-bottom:0.0001pt;"><b><span style="font-size:13.5pt;">Tip Number 5&nbsp;</span></b><i><span style="font-size:13.5pt;">Use an Email Security Service</span></i></p><p style="margin-bottom:0.0001pt;"><i><span style="font-size:13.5pt;"><br></span></i></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">Email security is nothing to take lightly, especially when the number and sophistication of these cyber-attacks are increasing. Email security companies use filters and other tools to help sift through email looking for spam and potential attacks.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">The biggest advantage of enlisting an email security service is the ability to combat both known and unknown attacks. If you use a cloud-based service these use threat intelligence and your protection is constantly updated keeping the malicious emails at bay.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">The majority of providers also have additional services that will help in keeping your business safe, such as Encryption, Advanced Threat Protection, Archiving, and in case of a disaster or loss of normal email capability an Email Continuity service.</span><br></p><p style="margin-bottom:0.0001pt;"><b><span style="font-size:13.5pt;"><br></span></b></p><p style="margin-bottom:0.0001pt;"><b><span style="font-size:13.5pt;">Tip Number 6&nbsp;</span></b><i><span style="font-size:13.5pt;">Educate and Train Your Users</span></i><br></p><p style="margin-bottom:0.0001pt;"><i><span style="font-size:13.5pt;"><br></span></i></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">Do you train your users in what to look out for in suspicious and who to report it to? To enhance your security posture users should be educated on avoiding threats sent by email such as not opening emails from unknown sources, taking care when opening attachments or clicking on links and checking the senders email address to ensure it isn’t a spoof mail.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">We are all busy every day and sometimes our usual care and attention wavers as we want to get on and the cyber criminals count on users not be vigilant 24/7 and are always trying new ways to exploit us. Some of the malicious emails today are disguised very well and unless you have a cycle of training and education for users the increase of them being caught out increases. Also, Death by PowerPoint is not always the way!</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;"><br></span></p><p style="margin-bottom:0.0001pt;"><b><span style="font-size:13.5pt;">Tip Number 7&nbsp;</span></b><i><span style="font-size:13.5pt;">Back Up and Test!</span></i></p><p style="margin-bottom:0.0001pt;"><i><span style="font-size:13.5pt;"><br></span></i></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">One of the best email security tips an organisation can take onboard is to frequently back up their data and ensure that you can recover them!</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">Ransomware attacks are happening more this is mostly due to the high ROI the attack awards the hacker. Once installed, these attacks start by scanning through the user’s computer, selecting files and encoding them. When encryption is complete, the user is notified that their files are being held for ransom and the user must pay a fee to get your data back.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">This type of attack can cause severe damage to a business, leaving them with nothing more than shell of a network. This leaves you with the option to pay the ransom or to lose all your data, which isn’t practical for a company. Only half of the businesses that pay the ransom get their data back and by paying it you are opening yourself up to further attacks.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">Backing up information on a consistent basis is the best and easiest way to protect your business from a ransomware attack. Since the user will already have a backed-up version of their information, there will be no need to pay the ransom.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">Taking back-ups are all well and good but if you can’t recover the data, they are pointless so don’t forget to verify that your back-ups will work when needed.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;"><br></span></p><p style="margin-bottom:0.0001pt;"><b><span style="font-size:13.5pt;">Tip Number 8&nbsp;</span></b><i><span style="font-size:13.5pt;">Encryption</span></i></p><p style="margin-bottom:0.0001pt;"><i><span style="font-size:13.5pt;"><br></span></i></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">A sent email does not follow a private dedicated route to its desired destination, it is not direct, your email will go through 3rd party servers on its route. Anyone along this route can look at or edit the original email without the sender’s or recipient’s knowledge and can lead to serious data and information breaches.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">To protect against snoopers, users can use a range of tactics and email security tips. One of the most applied methods is the enabling of TLS encryption. TLS adds an additional layer of protection to email and stops hackers from being able to read the content of the email. If TLS cannot be enabled, or the destination server doesn’t have TLS enabled, emails will continue to be unsecured and the user should be cautious. TLS should be the standard today.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">In general, users should protect their email attachments with passwords or by placing them in a zip file. This ensures the user’s files cannot be tampered with or infected on the path to its destination regardless of if TLS is enabled.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;"><br></span></p><p style="margin-bottom:0.0001pt;"><b><span style="font-size:13.5pt;">Tip Number 9&nbsp;</span></b><i><span style="font-size:13.5pt;">Who Has Your Email?</span></i></p><p style="margin-bottom:0.0001pt;"><i><span style="font-size:13.5pt;"><br></span></i></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">Email addresses are used for almost everything on the internet nowadays, but that doesn’t mean user’s should just hand theirs over. The more public an email address is, the more likely it is to be targeted for an attack by hackers.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">User email addresses are also exposed to attacks through the email lists that are collected and compiled by companies and businesses. This leaves the security of the user’s email address to the company, which may or may not be completely secure.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">Don’t reply back to Phishing or other malicious email scams, no matter how tempting it is, as it lets the attacker know that they have a valid email address that they can then use for further hacking activities and more elaborate ruses.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">Look at obtaining a Dark Web Monitoring service to monitor for domain credentials being sold on the Dark Web.</span></p><p style="margin-bottom:0.0001pt;"><b><span style="font-size:13.5pt;"><br></span></b></p><p style="margin-bottom:0.0001pt;"><b><span style="font-size:13.5pt;">Tip Number 10&nbsp;</span></b><i><span style="font-size:13.5pt;">Implement and Regularly Review</span></i><br></p><p style="margin-bottom:0.0001pt;"><i><span style="font-size:13.5pt;"><br></span></i></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">Agree an Email Security structure with the organisations Management Team and then implement it. At each stage of change train and educate all users, for the security structure to succeed it has to have buy in from everyone within the organisation. Add a reporting process for suspicious emails and a culture that is security driven without being restrictive to business practices will pay dividends in protecting your business and your brand.</span></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">Once you have implemented a structure and educated your users keep reviewing it on a regular basis. Threats are always evolving so you need to be aware of them.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;"><br></span></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;">&nbsp;It’s not easy to keep up to date along with everything else you need to do but that’s why we are here so consider outsourcing some or all of your security requirements.</span><br></p><p style="margin-bottom:0.0001pt;"><span style="font-size:13.5pt;"><br><br></span></p><p style="margin-bottom:6pt;"><b><i><span style="font-size:13.5pt;">We love to talk security and are always happy to have a chat regarding your current setup and any ideas you have on how you could improve it and of course we would love you to take some of our products into your organisation to help you achieve your IT Security goals!</span></i></b></p><p><span style="color:inherit;"></span></p><p>&nbsp;&nbsp;</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 25 Mar 2020 16:17:36 +0000</pubDate></item></channel></rss>