ICT Frame

Steps To Secure Government Issued Email

Image: Bryant PC Solutions

Recently, the government of Nepal has mandated the compulsory use of email in all the government workstation. The rule came up under a government directive entitled “Government entities email management directives 2075”. As there have been massive changes in the world of information communication and technology, this initiation by the government can play a significant role for all the service seekers.

Since it is very confident of the government, it can face some challenges and threats in the future. Emails are very sensitive as it includes lots of official data and information. The essential thing for email is protection and privacy. Hackers have grown immensely, who knows if the government email ID’s are their next target.

To avoid different kinds of challenges and threats we have prepared an essential security guide which might teach them of secure computer and online usage practices.

Create a secure and strong password
Creating a stable and robust password always lies at the top of the list. It is essential to put a strong password. While creating pass do not include only numbers or alphabets on it. Try to create a password that is composed of different alphabet numbers and symbols.   Passwords should always be involved and unguessable.

Record your password safely
You should never save or store your password in a place where there is easy access to other people. Do not turn on the password saving feature. If you find it difficult to remember your password you can use a password manager. Some of the highly recommended password managers are LastPass, KeePass, 1password and among others.

Be careful while logging in to your email from other’s computer
As much as possible do not use others computer for signing in your email address. Sometimes it can be urgent or necessary to use different computers, at that time you can exercise individual windows or incognito mode to log in to your email.

Use shortcut “ctrl+shift+p” to open private browsing mode in Mozilla Firefox, Microsoft Edge and Internet Explorer, and use “ctrl+shift+n” to open incognito mode in Google Chrome. In these modes, none of your data is stored by the browser. At last the most important thing do not forget to log out.

Be away of the spoofed emails
It is easy to spoof Email addresses that mean attackers can employ actual email addresses to send emails to steal information and data. So, immediately report the emails to the authorized IT administrator if it claims to be official and asks for sensitive information, access to your computer or for your password.

Verify the authenticity of any email that seems valid before giving away any information by contacting the relevant department. Attackers can also use social engineering tricks like making official appearing calls in an attempt to steal information so you must also be wary of such requests.

The points as mentioned earlier are taken as a reference from ThreatNix.