E-mail is no longer the most popular form of communication in everyday life, especially among young people, but it remains an important part of digital life. In 2017, about 320 billion emails were sent worldwide. What many do not know is that electronic mail has very little security. Hacks are frequent and access by third parties, such as employers and security forces, is quite easy to happen. In addition, a message goes through several intermediaries – such as Internet service providers and e-mail clients, for example – leaving little space for privacy. These problems, however, can be avoided with some security measures.
Six tips for concentrating all your emails in one place
E-mail can be less private than most believe Photo: Marvin Costa / TechTudo
Many users still use passwords that are too simple and too common, which can be easily discovered. The list of most used passwords in the past year includes 123456, Password and starwars. Another common mistake is to use the same password on several services, which facilitates the breach of multiple accounts at the same time.
So, create bigger and stronger passwords. The idea of ??a secure password has changed and it is now known that a complex combination of upper and lower case letters, numbers and special characters does not necessarily mean a good password. more important to form long passwords. In addition, if you choose a phrase, it becomes much easier to remember that password.
Weak and repeated passwords are a risk to your email security Photo: Pond5
Another option is to use a password manager, programs that automatically generate strong passwords for various accounts and log in to these services for you. everything encrypted. Just save the software access password in memory. LastPass, Dashlane and RoboForm are some of the alternatives.
Also, consider not being limited to just a password as a security mechanism. Enable 2-step verification to log in to email. This feature can use SMS, but gives preference to an authentication application, such as Google Authenticator or Authy. Yahoo already allows users to abandon common passwords and use unique codes generated by an application each time they access the email.
Using a virtual private network, the VPN, increases your security, as these tools hide the user from the ISP. VPNs use encryption and isolate data to be sent to the web in a kind of tunnel. But restricted protection, because the email service still has normal access to messages. Besides that I need to be very careful when choosing a VPN, as free ones usually have pitfalls.
3. Encrypted emails
The best way to keep your emails private is to directly encrypt the service. Some customers already do that, but it's not that simple. Gmail has been encrypting messages since 2014, but the service only works within Google apps or the Chrome browser, and both the recipient and the sender must use Gmail. Furthermore, it is no secret that Google monitors users' emails to target ads.
The paid version of Outlook, Microsoft's email service, offers email encryption, but using the feature is not practical. It is necessary for the sender and recipient to exchange a digital signature consisting of a certificate, a public key and a digital identification.
ProtonMail is an encrypted email service Photo: Divulgao / ProtonMail
There are also e-mail services created especially to work with end-to-end encryption, such as Tutanota, Ghostmail and Protonmail. They do protect messages, but require that all users involved in the exchange use the same customer or at least that the recipient enter a password to open each incoming email. There are also size limits and attached files.
Another strategy is to use temporary emails. MailDrop, for example, makes it free to create temporary addresses without any registration. It can be random or your choice. The user has access to an inbox for a limited time and gains a second address that will also have messages directed to the same inbox. Thus, there is no risk of someone eavesdropping on emails using the original, as this is the only requirement for opening the inbox. Useful, in particular, to register on the Internet.
In addition to considering the methods mentioned above, users should pay attention to some precautions. Keep in mind that work email accounts belong to the company, so they can be inspected as they pass through the firm's network and servers. Also, be on the lookout for fake email addresses that try to impersonate an organization. And, of course, always make sure you select the right Reply or Reply to all, so your message will not stop in the wrong hands.