Tips: Keep E-Mail Secure

The Internet Education Foundation offers tips to secure e-mail communication.

  • Understand the concerns associated with e-mail. First you should understand some of the privacy concerns that may be associated when communicating online via e-mail.
  • Know the recipient. Make sure that your e-mail recipient is a trustworthy person and will not forward your e-mail on to others without your consent.
  • Use a password. If you share your computer with others -- such as family members or roommates -- use an e-mail application that can be password protected.
  • Use Web-based applications -- Using Web-based e-mail (like Hotmail or Yahoo) may be a good approach if you're concerned about people who have access to your computer reading your locally stored e-mail.
  • Delete local copies of messages -- You can also delete the local copy of your sent e-mail message by opening the "sent" or "out" folder in your e-mail program and deleting the message. You will also need to then open the "deleted" or "trash" folder in your email program and delete the message one more time to make sure that it is removed from your e-mail application.

Featured

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.