Archives - Email Tips


Use an encrypted email service

Secure email services can encrypt your messages to ensure they’re only accessible to authorized parties – not even the email provider will be able to access them. Some services go one step further and allow you to create aliases that protect your private correspondence and keep your primary address anonymous.

Watch out for email autocomplete

Many times, just entering a couple of letters in the “to:” field of an email often results in your email client filling an auto-completion. Sometimes it may be great feature, but one that may backfire. It might for instance, result in you mistakenly sending sensitive information to someone who shouldn’t have received it.

Be aware of common email scams

One of the best-known email scams the “Nigerian prince” scheme is important to recognize, but it’s hardly the only one. Some others to keep an eye out for include emails purporting to be from government agencies (which almost never communicate with individuals in this manner) and communications from Internet service providers (ISPs) and software companies, […]

Hover over a link before you click on it

You can never really be sure you’re clicking on a malicious link until you do. Bad actors often attempt to fool their victims with seemingly real links to web pages that emulate legitimate sites. Below the surface, however, those pages are riddled with malware and other threats. To avoid these scams, you should always hover […]

Be extra wary of email scams around or weekends or holidays

These times are especially busy for bad actors. They’ll often target their attacks around the weekends or holidays, when IT infrastructures are at their most vulnerable. Whether at home or work, be extra cautious when opening emails. Phishing scams are especially deceptive at these times. If you receive a suspicious email offering you a great […]

Divvy up your online presence by compartmentalizing accounts

Don’t use the same email address to sign up for multiple accounts. If that email is compromised, so are all the accounts connected to it. Assign a different email address with a unique password to every type of action you take on the internet (i.e. social media, work, e-commerce, etc.)