Archives - Email Tips


When possible, use cloud sharing instead of email attachments

Email attachments are pervasive, but risky – you never know what they could include. It’s usually more secure to share content with links to cloud services, since you’re not actually downloading anything onto your system.

Use email filters to wrangle risky messages

Most major consumer email services offer filtering options, most times you can choose what happens to any message coming from a specific sender and/or contains a specific subject line or particular words. For example, you can immediately archive any email with “free” or “unsubscribe” in its body. This can help you clear out high risk […]

Have an iPhone? Try the “Hide My Email” feature

The rollout of iOS 15 included a new security capability for iPhone users: The ability to hide your email address from sites and services you register with online. In essence, this feature creates a random email address to use in place of your actual address. In doing, you gain a little more control over the […]

Use an encrypted email service

Secure email services can encrypt your messages to ensure they’re only accessible to authorized parties – not even the email provider will be able to access them. Some services go one step further and allow you to create aliases that protect your private correspondence and keep your primary address anonymous.

Watch out for email autocomplete

Many times, just entering a couple of letters in the “to:” field of an email often results in your email client filling an auto-completion. Sometimes it may be great feature, but one that may backfire. It might for instance, result in you mistakenly sending sensitive information to someone who shouldn’t have received it.

Be aware of common email scams

One of the best-known email scams the “Nigerian prince” scheme is important to recognize, but it’s hardly the only one. Some others to keep an eye out for include emails purporting to be from government agencies (which almost never communicate with individuals in this manner) and communications from Internet service providers (ISPs) and software companies, […]