Page 31 - index
P. 31
You would realize how this can be risky if we deal with an open-society countries such as the
western ones where many expert’s, government’s or business e-mail addresses got available
publically through the web.
There are still many parts of the world that got untrusted and which could misuse those
professional security applications, so it is strongly advised that a distribution of such tools
should be better controlled.
Luckily, there are still some good ways to protect your e-mail asset and we would talk about
them through this article.
The ways to protect your e-mail account
There are still many good ways to assure your e-mail asset. As we said before through our
articles, there are two basic sorts of e-mail accounts: (1) cloud-based e-mail clients and (2)
computer-based e-mail clients.
The both types of those e-clients got a quite good protection systems which are currently
available on the market. For an average user and some regular business applications, they are
quite reliable, but they still cannot guarantee an absolute security.
For instance, if we deal with a web-based e-client such as the Gmail, we can notice that we
could access our protected e-mail account from many trusted machines as well as disable an
option of the e-checking from a remote service, but what we need to login to such an account is
a verification code which can be received on our cell phone.
You would agree that this method is still quite good for an everyday peaceful use, but in case of
cyber wars when your opponents are trying so aggressively to obtain your confidential
information, it’s not that suitable.
Say, those bad guys got your cell phone number and they also have a software for a SMS
tracking as well as your e-mail account login details; it’s getting clear that they could easily try to
login to your e-asset, send a request for your verification code and obtain it without any
difficulties simply tracking your text messages.
Indeed, those folks could be located so easily and you would, nodoubtly, get an information on
that login attempt and your web-based service would resolve such a concern for you.
But the headache is those bad guys would already make a breach and potentially change
something within your cyber asset.
31 Cyber Warnings E-Magazine – May 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide