The Best Email Security Practices
- Nine out of every 10 viruses a computer contracts are from email attachments, according to IT Security. Even email attachments from friends may pose a threat if their computers have been infected with a virus designed to send out more viruses to other computers. To protect your computer and cell phone, check with your anti-virus program and email provider. Do either provide a way to scan email attachments for viruses? A sure way to protect your computer and cell phone is to scan every attachment before you download it.
- Sending out emails to many people at a time either by forwarding jokes or for business purposes may leave every email address vulnerable to receiving a virus. The blind carbon copy or BCC field allows you to send a mass email without any recipient obtaining the email addresses of the other recipients. Some email addresses and providers are set to add every new sender to the contacts page, according to IT Security. If one of these recipients has a virus designed to infect other computers by repeating itself in emails, not only will your email and computer be vulnerable, but so will the computers of every person to whom the email was sent. Senders using the BCC field do not allow recipients to see or obtain (knowingly or unknowingly) the email addresses of the other recipients. Choosing this email security practice will help protect many computers and cell phones.
Number of Email Addresses
- Often e-newsletters, Internet contests and many other sites require an email contact address. By using one email address for everything, users open themselves to viruses and large amounts of spam. IT Security suggests that users have at least three separate email addresses. One email should be devoted to work, one to personal friends and family and a third, throw-away email address to obtaining access to sites, signing up for e-newsletters or leaking your email address on the Web. The last type of email address should be one from a free provider such as Yahoo!, Gmail or MSN, according to IT Security. Not only can companies with whom you provide your email address sell the listing to third parties, but they may knowingly or unknowingly spam your email or send you viruses. Designating particular email addresses for particular people and activities is a great email security practice to better protect your email and computer.