Secure Online Behavior, Part 2: E-Mail

by Dr. Sunil Hazari
Sept. 23, 2017 0 comments Symantec firewall

This is the second article in a series devoted to introducing readers to secure online behaviors. In the first article, we saw how users have come to rely on the Internet for exchanging business and personal information. The largest amount of traffic being carried over the Internet today is in the form of electronic mail. Today's sophisticated e-mail programs handle not only text, but also graphics, animation, video, and attachments that can include executable programs, word processing and spreadsheets. Despite the use of firewalls and anti-virus programs that are intended to protect Internet and e-mail users, user behavior is still the key to Internet security. As a result, proper e-mail behavior is very important. This article will discuss secure e-mail behavior by looking at the various threats posed by using e-mail applications, as well as the steps users should take to minimize those risks.