Categories
Casserly Consulting Blog

The Major Points of A Secure Email Solution

email_security_encryption_400.jpg

It’s not out of the ordinary for employees to not know the best practices surrounding email management, but it’s something that any self-respecting employer needs to consider. How are your employees using their email, and are they putting your organization at risk? The best way to address these issues is taking a two-pronged approach involving training employees on proper best practices, as well as taking technical measures to keep the risk of a breach to a minimum.

We’ll go over some of the most viable options for keeping your email communications as secure as possible, including encryption, spam protection, and employee awareness.

Email Encryption
Encryption is extremely important for keeping your data safe from prying eyes. Encryption is easy to understand when it’s explained in terms that aren’t mind-bogglingly complex. Data that’s sent through a connection that isn’t encrypted can be intercepted. When data is sent through an encrypted connection, it’s scrambled so that it can’t be read by those who might steal it while it’s in transit. Only those who hold an encryption key can unscramble it, making it a much more secure method of sending and receiving important data. Some industries, such as healthcare and government organizations, mandate compliance standards that may include encryption to send and receive email.

Spam Protection
Employees are almost certain to encounter email hazards like spam messages and phishing attempts, and if they don’t know how to identify these dangerous messages, they could expose your organization to data breaches. This is because hackers can ask employees for various information, such as passwords, usernames, and other credentials that aid them in infiltrating your carefully laid-out defenses. The best way to keep this from happening is to keep spam and phishing messages from hitting the inbox in the first place with spam protection systems.

Phishing attempts are a bit trickier, as they will need to be handled in a careful and calculated manner. Scammers often personalize messages to optimize their odds of the message being opened or an attachment being downloaded. Therefore, you need to consider employee training to properly defend against it.

Conditioning Your Employees for Security
Your network’s security can’t be complete without taking care of the ones actually using the technology. Since your end users are going to be using the organization’s email, it’s only natural that you prepare them for the act of keeping it secure. You can provide your users with a list of best practices for them to keep in mind while going about their duties. They are the following:

  • Check the sender: Who has sent the message? Is it a suspicious email address that can’t be traced to any of your contacts? Does it come from a strange email domain? If the answer to any of these is in question, you might have a spam message.
  • Identify the intent: Hackers want you to click on their spam messages as quickly as possible. Therefore, they will often try to incite immediate action to prevent you from thinking twice.
  • Check the spelling and grammar: Many hackers come from countries where English isn’t the hacker’s first language, making their messages quite identifiable compared to others. If you receive messages filled with these inconsistencies, you can bet they are either unprofessional or likely a hacker.
  • Don’t open unrequested attachments: Attachments are a big way for hackers to spread threats, as a lot of people don’t think twice before downloading a supposed receipt or statement. Double-check who sent the attachment before downloading it.
  • Don’t click sketchy links: Before clicking on any links in an email, make sure it’s going where you expect it to. You can do this by hovering over the link without clicking on it. If the link goes to a weird URL or an IP address (a string of numbers and periods), it might be a phishing attempt. The destination might look legitimate and ask you to log in, but it will capture your credentials and give access to the bad guys.

Of course, the biggest thing to keep in mind is when in doubt, ask your IT department about the message. For more information on how to keep your organization safe from spam and email threats, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

Tip of the Week: Creating Canned Responses in Gmail

totw_canned_response_gmail_400.jpg

If you’re like most business users, you rely on email quite a bit to stay apprised of what is going on, as do most of the people you are likely in communication with. As such, you most likely understand that, while most emails require some kind of response or confirmation of receipt, not all of these messages require a heartfelt message. This is where Gmail’s Canned Responses come in handy.

This week’s tip will go over how to set up your own canned responses to streamline your repetitive, but necessary, communications.

How to Set Up Canned Responses
First, you’ll need to log in to the browser version of Gmail. Once there, click on the Gear icon in the top right under your profile image and select Settings from the menu. From there, you’ll see a horizontal menu that will display Advanced, click into it. You will see the option to enable Canned Responses. Click the radio button to select enable, and then save your changes. You can now create canned responses to use in your correspondence.

Creating and Using Your Canned Responses
To create a canned response to use, open the message composer and write out what you want your message to say. Once you are satisfied with your return message, access the message window options by clicking the button in the bottom-right corner. That menu should now have a Canned responses option, with a sub-menu that allows you to save a New canned response. You will be prompted to give your new response a name, and then it will be saved for future use in that sub-menu.

What kind of messages would you anticipate using canned responses for? Tell us what you think in the comments!

Categories
Casserly Consulting Blog

Email Attachments are Schrӧdinger’s New Cat

Schrdingers_Cat_Lives_Dies_400.jpg

Have you ever heard of the physicist Erwin Schrӧdinger? He is most well-known for explaining a paradox related to quantum physics which involves a cat. Even though the theory behind Schrӧdinger’s cat is meant to explain something quite different, it can still be applied to a lot of different concepts. In particular, when explaining email security.

The thought experiment works as follows. The Schrӧdinger’s Cat scenario was created to strike down an interpretation of quantum mechanics that states an object can exist in all states but will revert to just one if it’s observed. As for Schrӧdinger’s experiment, a cat was hypothetically shut in a box with a small amount of radioactive material. This material had about a 50% chance of setting off a geiger counter. In this case, a hammer would smash a container filled with poison, killing the cat. If the Copenhagen interpretation is presumed to be correct, the cat would be both alive and dead until you see which one it really is.

At the time, Schrӧdinger’s cat was designed to challenge the Copenhagen interpretation, but a more modern version of this experiment can be seen in a business email solution. The primary topic associated with this line of thought is email attachments.

Spam and phishing emails are some of the more popular ways that cybercriminals use to spread their influence. The idea of how this ties into Schrӧdinger’s hypothetical cat involves approaching each email as both a normal message and a real threat at the same time. The only issue here is that there’s a lot more at risk with your business’s infrastructure than with a hypothetical scenario (no cats were harmed in the creation of this blog). After all, you don’t want to click on an email attachment unless you’re absolutely sure that it’s not going to cause problems for your organization.

Thankfully, there are ways that your business can protect itself from advanced threats that make their home attached to email messages, especially spam and phishing threats. Preventative measures like antivirus and anti-malware tools are great for keeping threats off of your infrastructure, and spam protection can help remove messages from your inbox before they become a cause for concern.

Your inbox needs to be secure, so why not do it the right way? To get started with network security solutions, call COMPANYNAME at PHONENUMBER today.

Categories
Casserly Consulting Blog

Tip of the Week: How to Avoid Spam Emails

Spam_avoid_emails_400.jpg

Would you just give your bank account information to anyone who called you up and asked for it? Probably not. For the same reason, you wouldn’t just download attachments from your email messages without a second thought. This can be a dangerous practice, as some of the most common threats nowadays spread themselves via unwanted email attachments. It’s important that you can identify when it’s the right time to download an attachment, and when it’s best to just leave it be without exposing your business to unnecessary risk.

First, a little information about why you might be forced to make this decision in the first place. Spam messages are often the easiest way to spread the influence of malware and other threats. It’s simply a fact that you can send one message to countless individuals knowing that at least some of them will be fooled into downloading the attachment, and in turn, downloading all of the nasty things found on it.

For example, ransomware makes its home on workstations due to infected attachments. Your company might receive an unsolicited message from a prospective employee, who has attached their resume for review. Before your HR department knows what’s happening, their files are encrypted due to the attachment actually containing malware from a hacker. Surprise–your organization has fallen victim to a targeted phishing attack, with an infected infrastructure being the fallout.

While your spam filter might flag some of these messages as dangerous, it’s unlikely that the most dangerous ones will be caught in its web. Be wary of messages that claim to be receipts, shipping information, resumes/CVs, and other information that might be important for your organization. Hackers understand this and want to take advantage of that knowledge, which could potentially put your company in a tight spot.

Ultimately, the best way to keep your company safe is by taking a two-pronged approach–educating your employees on the importance of email security, and a technology solution designed to eliminate the majority of spam in the first place. The first can be maintained simply by holding awareness training and actively practicing proper email etiquette. Teach your employees that they should never open attachments from anyone they don’t know, and to always investigate the source of the message before declaring that it’s safe enough.

For the second measure, you can rely on COMPANYNAME to help you out. Our technicians can hook you up with an enterprise-level spam blocker to keep the majority of dangerous messages from making their way to your inbox in the first place. It’s a great measure that can minimize your employees’ exposure to risky elements. To learn more, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

Tip of the Week: Sync Your Inboxes with IMAP

multi-device_email_400.jpg

How many emails do you send on a daily basis? You use it so frequently that you might not second-guess how it actually works. Depending on the way your business uses email, you might be able to optimize the way that it works for your mobile devices. There are two types of protocol that work to varying degrees for your email solution.

The first kind of email protocol is called POP, or Post Office Protocol. This can be seen in a similar way to snail mail. POP works by downloading messages to your device from the mail server through your email client. However, this keeps you from downloading the messages onto other devices. If you want to check your email on your smartphone, the same messages will not be accessible on your desktop–it’s just the way it works.

On the other hand, you have the preferred method of handling multi-device email: IMAP, or Internet Message Access Protocol. IMAP stores the messages live on an email server rather than downloading them directly to the devices. This means that the messages remain on the email server and are accessed by a mail client on any device you use. Any actions performed on the messages are done so through the mail server. This is the best way to use email if you’re hoping to keep your messages in sync across your devices.

Modern email systems generally allow for IMAP, including Google’s Gmail, Microsoft Outlook, and Mozilla’s Thunderbird. Some, like Apple’s iCloud, even default to it. Depending on your business’ needs, you’ll want to implement a communications solution that allows your team to access email on a multitude of devices–that’s where we come in.

If your business is unfamiliar with mobile devices, COMPANYNAME can work with your organization to ensure that your mobile device policy matches up properly with your email client. You want to ensure that any devices accessing company information are secured from end to end. Furthermore, these devices need access to information unimpeded so that productivity can commence. We can work with your organization to make this happen.

To learn more about email, mobile devices, and business technology for a modern workforce, reach out to COMPANYNAME at PHONENUMBER.

Categories
Casserly Consulting Blog

Tip of the Week: How to Write a Better Email

email_envelopes_purple_400.jpg

Writing an email is one of the most prevalent methods of communication in the business world, but it’s not as easy as you might think. There are considerable details and intricacies to mastering this art, and we’re here to help. By the end of this blog article, you’ll be armed with five tips to write the most effective email that you can.

Keep It Short
Nobody wants to read a long message in their email. After all, they likely have more pressing matters to attend to, and many more messages that they have to read. Therefore, it makes sense that you get right to the point when you have to send an email. Try to include only information that’s absolutely critical. Remember, concision is the friend of any businessperson, as they only have so much time in a day to read and respond to messages that aren’t mission-critical.

Present a Clear Subject Line
Similarly, you want to use only the most clear and concise subject lines, as anything less could mislead the recipient into thinking that the message either isn’t important or doesn’t warrant immediate attention. Basically, you want to provide enough information in the subject line to give the recipient a reason to open it.

Personalize the Email
You shouldn’t be copying and pasting a catch-all message into an email. You should take the time to personalize each message that you send so that it looks as authentic and genuine as possible. You should always use your full name, as well as the organization you belong to–especially if you are sending messages to vendors or clients.

Perform a Spelling and Grammar Check
Nothing is more embarrassing than making a major spelling or grammar error in an important email. Thankfully, this can be avoided by giving your message a quick proofreading before hitting the Send button. Try to avoid statements in all caps, as they can create a subtext that you don’t necessarily want to convey.

Keep it Business-Friendly
If you’re going to send a bunch of memes or other fun things to your employees, it’s best not to do it through email. It’s one thing if you have a dedicated email thread designed for sharing information unrelated to work, but when you have your employees sending things that have no place in a professional environment, you get clutter (and a general lack of focus), both of which can create an unproductive workplace environment.

For more information on how to make the most of your email, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

Someone’s Trying To Phish You… Do You Play Along?

phishers_man_400.jpg

Phishing scams have been popping up for years–their most infamous attack vector has even become a punchline: some long-lost relative stuck in a far-off country suddenly reaches out, offering riches, but only if so-much money is provided first. People from all walks of life have been duped by these scams, and while not all of them are this transparent, most are pretty easy to spot.

There may be some temptation to strike back in retribution against the criminal who targeted you, in the form of driving them crazy by wasting their time. Unfortunately, as tempting as such activities may be, they are not a good idea. Take it from the cyber security researchers who have tried–cybercriminals do not take well to mockery, or having their time wasted. A researcher from Malwarebytes, Jerome Segura, found out firsthand when he used a virtual machine to follow a scam to see where it would lead.’

With his device recording everything that played out, Segura first interacted with a female who claimed to have found many, many issues on his device that needed to be resolved before his system was corrupted. Not only that, but Segura was told that his software warranty had recently expired, and he would have to pay the $299 renewal fee to another representative.

Of course, Segura didn’t supply the correct payment credentials, which tipped off the hackers. The hackers then seized control of Segura’s computer, deleting all of his files and his Ethernet adapter driver before calling Segura a rude word and disconnecting.

While these sorts of stories may seem comical in hindsight, they are no laughing matter. This is especially true when things get much more serious.

Take Jakob Dulisse’s story. The wildlife photographer received a call to his home in British Columbia from “Windows Technical Support” in Los Angeles. Coming to the conclusion that this was an attempt to scam him, Dulisse played along before accusing the caller of being “a scammer, a thief, and a bad person.”

The person on the line did not react well at all. Describing himself as a killer, the caller claimed that his group had people in Canada who would cut their victims into pieces and dispose of them in the river.

Other scammers will simply install remote access software as their target decides to mess with them, opening the door for them to come back later, as other cyber security professionals have found.

It is important to remember that these are, in fact, professionals, which means they are better equipped to deal with such threats. It is their job to discover what means of attack cyber criminals are using, and share the best response. This is not how the average business user should handle this situation, the business owner should file a report with the authorities and alert both their Internet service provider and their managed service provider.

An MSP can help make sure that you are fully prepared to handle any cyber security threat that darkens your business’ door. Give COMPANYNAME a call at PHONENUMBER today.

Categories
Casserly Consulting Blog

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

outlook_tips_400.jpg

Microsoft Outlook is a great tool that can help your business stay in touch with clients and vendors, as well as stay updated regarding your internal operations. However, did you know that you probably aren’t using Outlook to the best of its abilities? We’ll walk you through some of the easiest ways to help you take even greater advantage of Microsoft Outlook for your organization: keyboard shortcuts.

Many of the shortcuts that work in Microsoft Word, like bolding or underlining text, remain unchanged through the Office 365 productivity suite, but the following are exclusive to Outlook. Here are some great shortcuts that you can use in Microsoft Outlook versions 2013 and 2016. In fact, you can print out this blog and place it on your desk so that you’ll never have to look up another Microsoft Outlook keyboard shortcut again!

  • Alt + S: This will send an email.
  • Ctrl + Enter: Send the message you’re currently writing.
  • Ctrl + R: Reply to an email.
  • Ctrl + F: Forward an email.
  • Ctrl + K: Complete the name or email you are typing into the address bar.
  • Ctrl + N: Create a new email folder.
  • Ctrl + Shift + A: Create a new appointment on your calendar.
  • Ctrl + Shift + O: Open your Outbox.
  • Ctrl + Shift + I: Open your Inbox.
  • Ctrl + Shift + C: Create a new contact.

As previously mentioned, many other shortcuts exist, and they all function in similar ways to the way they work in other Microsoft products.

By using all of these shortcuts to your best advantage, you can cut down on time wasted by fumbling through Outlook to click on several buttons that can be replaced by keyboard shortcuts. To learn more about how you can take full advantage of your business technology, be sure to subscribe to our blog.

Categories
Security

3 Time-Saving Benefits to Outsourced Email Management

b2ap3_thumbnail_email_management_400.jpg You don’t have time to worry about managing your email solution, but it’s still a vital aspect of your business’s operations. You never know when someone will fall for a spam message, and you certainly can’t look over the shoulders of each employee to make sure they don’t. What’s the busy business owner to do? How can you get quality email management without it eating up too much time and effort on your part?

The answer, like many technological pain points of SMBs, is to outsource the responsibility to a managed IT provider. Managed IT is great for businesses that want to focus on their operations rather than spending time managing technology. We’ll discuss three of the ways that email management helps your organization stay on task and ahead of the game.

Strengthen Security with Spam Blocking
Spam is the favored vehicle for major online threats, including phishing and ransomware schemes, specifically because it allows hackers to spread their work in a way which allows them to target as many people as possible without devoting much individual work. Users can accidentally download attachments or click on links to malicious websites. Enterprise-level spam blocking solutions allow your organization to keep threatening or suspicious messages out of your inbox indefinitely, significantly reducing the risk of finding such messages in your email solution.

Hosting and Management
If you’re the one who has to constantly add new users or check to see that your email servers are working properly, you’ll find that you have less time to spend doing your actual work. Of course, nothing is more important than making sure operations proceed as intended. COMPANYNAME can manage your technology and free up incredible amounts of time to focus on building your company’s profitability. We can ensure maximum uptime and optimal mail flow so that you don’t have to.

Archive Messages for Future Viewing
Email archiving is a great way to ensure that your business retains a record of any incoming and outgoing messages for your business. This helps you keep a better track of who shares information with who, and more importantly, why information might be shared with those outside of your business. Furthermore, if an employee has recently left your business, but you weren’t privy to their reasons, you might find some clues in your email system that could strengthen retention and prevent turnover in the future.

If you want your business to flourish, managing email effectively is a great place to start. In the hands of professionals like those at COMPANYNAME, you can focus on operations without worrying about keeping mail flow from working as intended. For more information about email management, reach out to us at PHONENUMBER.