Information security on the Internet

When communicating with traditional e-mail, messages pass unencrypted through
several servers before reaching the recipient. The messages of the part between
the servers travel via a secure tunnel, but inside the servers they are
unencrypted, so the messages can be read, changed and forged.

“Thousands of computer servers around the world were targeted by hackers over the weekend,
according to Italy’s National Cyber Security Agency (ACN).”

More and more work e-mail accounts have been hijacked with the help of scam e-mails. A
scam message can resemble a security email, where it is claimed that the
recipient can open the message by clicking on a link and entering their work
email address and password.

In an external e-mail service, interception can be prevented using multi-step
identification. In addition to the normal password, a code from the service
user’s phone is also required. The code can come from the phone’s
identification application or from a sent voice or text message.

Attacks based on credentials and passwords obtained through internet traffic are often
carried out using public and unprotected Wi-Fi networks or infected home
internet routers. These can be protected against with reliable VPN software.

The preservation of confidential information can be ensured by backing it up to an
external mass memory or memory stick, if you want to avoid storing it on
external internet servers.

Find out how Edico works!