SlideShare a Scribd company logo
1 of 11
Download to read offline
Top 5 email security best practices
Educating your workforce
When it comes
to email security,
technological
solutions
aren’t enough.
$12 billion
In losses
due to BEC scams in 2018
74.5%
Of respondents say their
organisation receive brand
impersonation phishing emails
WHY?
The most common email threats go directly to humans.
Technological solutions can help, but there’s only so
much they can do to protect your organisation.
You need to educate your workforce on email security
best practices to achieve full security
Top 5 email security best practices
Strong, unique passwords
(stored in a password manager)
01
First and foremost, you need to secure your email accounts. Provide your employees
with the tools they need to understand how to create a secure password.
Recommendations vary, but a selection of four random yet common words can be
difficult to guess but easy to remember. Introduce a couple of special characters and
you’ll make your password even more secure.
Two-factor authentication
02
A strong password is the first line of defence for your inbox, but there’s more you can do
to secure it. Two-factor authentication is a simple method that makes it harder to hack
accounts.
AuthenticationtoolslikeGoogleAuthenticatorgenerateasix-digitnumberthatrefreshes
every few seconds. Users must enter this code to access the account. Other 2FA tools
include sending a code to a mobile or email address.
Phishing Emails
Educating Your Workforce
03
Once you’ve introduced more account security features, you need to educate your
workforce.Phishingemailsarethemostcommonemailthreat,soeducateyouremployees
on them.
In particular, discuss how cyber-attackers might hijack a brand to legitimise their phishing
email and trick people into clicking malicious links or attachments.
Likewise, make sure staff report harmful-looking spam instead of clicking on the
unsubscribe button.
Introduce Firm Email Policies
04
You don’t want to have any cracks in your email security armour, but the only way to
guarantee that is to introduce firm email policies.
Don’t allow your employees to use their work email address for personal use. Also, don’t
allow employees to connect their personal mobile devices to the company Wi-Fi – it is a
major security risk.
Make Email Security
Everyone’s Responsibility
05
Ultimately, you need to promote a culture of email security within your company to fully
combat fraud and cyber-crime.
Makeemailsecurityanddataprotectioneveryone’sresponsibility.Educateyourworkforce
and ensure they take a proactive approach to email security.
If your workforce stays vigilant, your organisation can head off most email threats.
87%
Of respondents believe email security threats
will increase over the next 12 months.
Don’t let the human element in your organisation be your downfall.
Co-opt them into your email security processes using our top five
email security best practices to secure your inbox.
Find out more about email security at
Intelligent Inbox
Visit

More Related Content

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Top 5 Email Security Best Practices

  • 1. Top 5 email security best practices Educating your workforce
  • 2. When it comes to email security, technological solutions aren’t enough. $12 billion In losses due to BEC scams in 2018 74.5% Of respondents say their organisation receive brand impersonation phishing emails WHY?
  • 3. The most common email threats go directly to humans. Technological solutions can help, but there’s only so much they can do to protect your organisation. You need to educate your workforce on email security best practices to achieve full security
  • 4. Top 5 email security best practices
  • 5. Strong, unique passwords (stored in a password manager) 01 First and foremost, you need to secure your email accounts. Provide your employees with the tools they need to understand how to create a secure password. Recommendations vary, but a selection of four random yet common words can be difficult to guess but easy to remember. Introduce a couple of special characters and you’ll make your password even more secure.
  • 6. Two-factor authentication 02 A strong password is the first line of defence for your inbox, but there’s more you can do to secure it. Two-factor authentication is a simple method that makes it harder to hack accounts. AuthenticationtoolslikeGoogleAuthenticatorgenerateasix-digitnumberthatrefreshes every few seconds. Users must enter this code to access the account. Other 2FA tools include sending a code to a mobile or email address.
  • 7. Phishing Emails Educating Your Workforce 03 Once you’ve introduced more account security features, you need to educate your workforce.Phishingemailsarethemostcommonemailthreat,soeducateyouremployees on them. In particular, discuss how cyber-attackers might hijack a brand to legitimise their phishing email and trick people into clicking malicious links or attachments. Likewise, make sure staff report harmful-looking spam instead of clicking on the unsubscribe button.
  • 8. Introduce Firm Email Policies 04 You don’t want to have any cracks in your email security armour, but the only way to guarantee that is to introduce firm email policies. Don’t allow your employees to use their work email address for personal use. Also, don’t allow employees to connect their personal mobile devices to the company Wi-Fi – it is a major security risk.
  • 9. Make Email Security Everyone’s Responsibility 05 Ultimately, you need to promote a culture of email security within your company to fully combat fraud and cyber-crime. Makeemailsecurityanddataprotectioneveryone’sresponsibility.Educateyourworkforce and ensure they take a proactive approach to email security. If your workforce stays vigilant, your organisation can head off most email threats.
  • 10. 87% Of respondents believe email security threats will increase over the next 12 months. Don’t let the human element in your organisation be your downfall. Co-opt them into your email security processes using our top five email security best practices to secure your inbox.
  • 11. Find out more about email security at Intelligent Inbox Visit