Archives - Email Tips


Switch to encrypted messaging apps for secure chats

Text messages, sent via carrier SMS, have been a mainstay of mobile communication. However, they have increasingly been replaced by over-the-top (i.e., internet-based) services like Apple iMessage, WhatsApp, and Telegram. These alternatives not only offer more features but also provide end-to-end encryption, a security measure not supported by SMS or its successor, RCS. Why encrypted […]

Stay safe in your inbox: manage html image downloads

In today’s digital world, email remains a primary communication tool, but it also carries potential security risks. One common practice is for email services to automatically download images embedded in the body of emails. While this can enhance the visual appeal of emails, it also introduces potential security vulnerabilities. Cybercriminals can exploit these embedded images […]

Never lose access to your email lifeline

Imagine not being able to check your email, access important documents, or communicate with friends and family. This could happen if you lose access to your email account. To prevent this scenario, setting up a recovery email address or phone number is essential. Why a recovery email or phone number matters Your email account serves […]

How to avoid being a phishing victim

Phishing is a type of cyberattack where criminals try to trick you into revealing personal information or clicking on malicious links. Phishing emails often look like they’re from a legitimate company, such as your bank or credit card company. But they’re actually designed to steal your information or infect your device with malware. Here are […]

Implement email filtering rules to automatically categorize and prioritize incoming messages

The main objective of email filtering is a reduction in phishing risk. By analyzing sender information, content and attachments, these filters identify suspicious emails and arrange them into categories relative to their nature. You can set up email filtering rules either by using the built-in features of your email provider or by utilizing a dedicated […]

Use a hardware security key for two-factor authentication (2FA)

Leveraging a hardware security key for 2FA adds an additional layer of security, making it considerably more difficult for cybercriminals to gain access — even if they have your password. Specifically, such measures facilitate strong authentication, protection from phishing, offline protection and a streamlined authentication process, among other benefits.