If a hacker gains access to your inbox, it provides a gateway for your other accounts to be compromised through password resets, and for your information to leak (think about how much bank, travel, and medical data has been sent to you over the years). Therefore, email security is paramount for your digital safety.
0 out of 12 (0%) complete, 0 ignored
Done? | Advice | Level | Details |
---|---|---|---|
Essential | The companies providing "free" email service don't have a good reputation for respecting users' privacy: Gmail was caught tracking all of your purchases. Any US provider will provide your data on request by US government agencies. Advertisers were granted access to Yahoo and AOL users messages to “identify and segment potential customers by picking up on contextual buying signals, and past purchases.” Start by registering a new mailbox and switching the most important communications to it one by one. Secure and reputable email providers such as: Tuta Mail, Proton Mail, Posteo, Mailbox.org, or Disroot allow mailbox encryption, are privacy-focused, as well as offer more security-focused features. | ||
Essential | Use a long and unique password, enable 2FA, enable hardware key authentication, disable recovery using phone number and follow every advice from the Authentication Checklist. Your email account provides an easy entry point to all your other online accounts for an attacker. | ||
Essential | Consider using a different email address for security-critical communications from trivial mail such as newsletters or shopping. This compartmentalization would reduce the amount of damage caused by a data breach, and also make it easier to recover a compromised account. Email aliases and email forwarding are your friends on this path. | ||
Essential | Do not share your primary email publicly, as mail addresses are often the starting point for most phishing attacks. Use separate aliases for different activities and set up mail filters to apply distinct labels to incoming emails based on the recipient. | ||
Essential | Emails can be intercepted and recorded during transit. Additionally, you cannot be certain of the security of your recipient's mail provider. Therefore, email should not be considered safe for exchanging confidential information unless it is PGP-encrypted. If your recipient does not support encryption, instead of attaching a sensitive file consider emailing a private link to the file, where you can later revoke the access by that link. | ||
Optional | If you give a third-party app access to your inbox, they effectively have full unhindered access to all your emails and their contents, which poses significant security and privacy risks. For Google accounts it's advised to enable Advanced Protection Program, which limits what applications can be connected and what they are allowed to do with your account. | ||
Optional | Registering a custom domain allows you to switch email providers easily without losing your email address. This flexibility ensures you are not tied to a single provider and can avoid disruptions if a service is discontinued. You can get your own domain from providers like Namecheap for under $15/year, which can be used for both website and email purposes. | ||
Optional | Email aliasing allows messages to be sent to | ||
Optional | If you don't own a custom domain, an alternative to aliasing is subaddressing, where anything after the | ||
Optional | To avoid losing access to your emails during an outage or account lock, Thunderbird can sync/backup messages from multiple accounts via IMAP and store locally on your computer. For Gmail you could use got-your-back tool. | ||
Advanced | Do not write your phone number or social network handles when you set email signatures. There are several marketing extensions that automatically crawl messages, and gather a detailed database of contact information based upon email signatures for sale. One of your recipients will have it. | ||
Advanced | Out-of-office automatic replies are very useful for informing others there will be a delay in replying, but sometimes people reveal too much information - which can be used in social engineering and targeted attacks right when they are away and cannot keep an eye on the account. Your email provider should offer you a choice who would get the auto-reply. |