If you have trouble remembering this combination, you can use a free password management program from the Google Play Store or Apple App Store.ĭo not record your passwords in notes or similar applications. To protect email, choose a strong password in the form of a combination of numbers, characters, symbols, or capital letters, for example *c0nt0hpasSword. Even if someone has your login and password, you can still use this function to verify your identity because you have to enter the verification code sent to the phone number or email email associated with your account. Indeed, there is no certainty that enabling this function will prevent online data theft. Use Two-Factor Authentication (TFA)Įnabling Two-Factor Authentication can provide an email account with an additional layer of security by sending a security code by phone number. List of Email Security Tipsīelow are some steps you need to take to secure your email so that it is difficult to be hacked by unknown people, as follows: 1. This type can be said to be an intermediary, because it functions as an e-mail address intermediary. Forward Mailįinally, this type is often used for users who frequently change their email addresses. This email is like the email service on google and yahoo, it can only be accessed by opening the website page. The second type is the most popular email in the community. The first type is POP Mail or it can also be called post office protocol which is a special type of email that can be opened and carried through the internet service provider used.
0 Comments
Leave a Reply. |