Skip to content
Tweak Your Biz home.
MENUMENU
  • Home
  • Categories
    • Reviews
    • Business
    • Finance
    • Technology
    • Growth
    • Sales
    • Marketing
    • Management
  • Who We Are

6 Tips to Improve Email Security

By Jack Warner Published April 8, 2019 Updated October 14, 2022

Your data is valuable and sensitive. This is especially true for your email account, which contains personal and professional emails, bank correspondence, CVs, and plenty of receipts. Using the contents of your email account, one could easily reconstruct your entire life.

 

Additionally, somebody with access to your email account could use it to:

 

  • Reset your passwords with other platforms and gain access to more accounts
  • Impersonate you in your correspondence with colleagues and friends and cause irreparable financial or reputational damage to you and your company.

 

Your email account should receive the most care of all your accounts. Without a secure email account, no other accounts are secure. Here’s how you can make sure your email is safe.

#1 Set a good password for your device

Your email may be stored on your computer, alongside the credentials to log in, meaning that anyone with access to your computer may have the ability to access your email.

 

Luckily, this is limited to those with physical access to the computer (and not hackers on the internet), but in case you lose your phone or computer or have it stolen, you should spare yourself the additional headache of losing control of your email.

 

Any computer or phone will make it easy for you to set a password. Go to your device’s settings and set a strong yet memorable password. You’ll enter it every time you start up your device or install software, so you’ll remember it easily.

 

This password is supposed to protect against physical intruders, so don’t write it down on the bottom on your device, or on a note in your drawer.

 

If you are afraid you might forget the password, possibly because you use the device rarely:

 

  • Store a note with the password in a different, secure location
  • Use a password manager on a device you regularly use
  • Test the strength of the password as an attacker may use machines to guess millions of common passwords at a time

#2 Encrypt your hard drive

Your password gives access to your computer, but unless your hard drive is encrypted, anybody with access to your machine could copy your hard drive or remove it from the computer and read your emails.

 

Most modern laptops will encrypt the drive automatically. You can check Bitlocker on Windows or FileVault on Mac OS whether this feature is enabled on your machine. iOS will have this feature always enabled by default, and on Android, you will be able to check in the phone settings. On Linux, such features can be enabled, too.

#3 Use a password manager

Remembering passwords can be a difficult task, especially given the dozens (or even hundreds) of online shopping, social media, or forums we may have signed up for. Reusing passwords across different services is an absolute taboo, as this makes it easy to phish (fraudulently obtain) your password, and if any of the services you use is exposed or run by an evil administrator, all your other accounts are instantly compromised.

 

A password manager is one of these gadgets that not only improve your security but also make your life more convenient. With a password manager, you will no longer:

 

  • Have to think of new passwords for your accounts
  • Remember which email you used for which account

 

Even extra information such as encryption keys or recovery phrases can be stored in there.

 

Some password managers can autofill your login pages so you’ll only ever have to click the login field, and they will automatically create a save password and store it for you when you sign up for a new service.

 

The only passwords you’ll ever have to remember are the password to your computer and the password to your password manager.

#4 Use two-factor authentication

Even when using a password manager, there is still a minor chance somebody will obtain your password, for example, by directing you to a phishing site (a fake but convincing site where you enter your password). Also, somebody who hacks the password database of the service you use might be able to get your password and log into your account.

 

To prevent this, use Two-factor authentication (2FA).  2FA means we use two different types of credentials, usually:

 

  1. The password
  2. Something you have in your possession

 

The ‘something’ is usually your phone (using SMS or an authenticator app) or a specialized encryption key you carry with you.

○     SMS

  • The most common type of 2FA method is SMS. You enter your phone number to the email service you use, and every time you log into from a new device you are sent a one-time password by text message. This makes it a lot harder for anyone to take over your account because they not only need to know your password but also be in possession of your phone.
  • Of all, SMS is by far the least secure 2FA option. Some mobile phone providers (especially in the United States) make it easy for anyone to fraudulently take over your phone number, while in others (such as China) the government has access to your text messages.

○     Authenticator App

  • An Authenticator App is an app you install on your phone that creates a new code every minute. This code pairs with the site or app you want to use to authenticate yourself. Unlike the SMS option, it also works if you don’t have cell phone reception and nobody can intercept your codes.

○     Hardware token

  • The strongest method for two-factor authentication is a hardware token, such as a FIDO U2F key. This open standard allows you to carry an encryption key on your keychain, which you can slide it into your USB port or past your NFC antenna for authentication. Unlike other options of two-factor authentication, a hardware token can also verify the identity of the service you are logging in to, efficiently protecting you from phishing attacks.

#5 Take care of backup codes

The majority of your work securing your account is now done. Many providers allow you to create backup codes for the case that you lose your phone or don’t have your hardware token at hand. That’s a great feature, but be careful with where you store these codes. If you leave them on your desk, anybody who walks past might be able to use them to get into your account. Best to put them in a safe!

#6 Review apps and connected devices

Before you log out of your account, review the list of connected apps and devices. If there is an app you don’t recognize, or aren’t sure if they are yours, best to disconnect them! Worst case, you’ll have to grant permission them again on the next login.

Next up: Financial services, cloud storage & social media

Now that you have a secure email account, it’s time to give other accounts the same treatment. Since your computer now has a good password and you are using a password manager, start with:

 

  1. Changing your passwords on your accounts
  2. Enabling two-factor authentication
  3. Reviewing the connected apps and devices

 

By following these simple steps diligently, you’re now pretty much unhackable.

 

a financial security concept

Posted in Technology

Enjoy the article? Share it:

  • Share on Facebook
  • Share on X
  • Share on LinkedIn
  • Share on Email

Jack Warner

Jack is an accomplished cybersecurity expert with years of experience under his belt at TechWarn, a trusted digital agency to world-class cybersecurity companies. A passionate digital safety advocate himself, Jack frequently contributes to tech blogs and digital media sharing expert insights on topics such as whistleblowing and cybersecurity tools.

Contact author via email

View all posts by Jack Warner

Signup for the newsletter

Sign For Our Newsletter To Get Actionable Business Advice

* indicates required
Contents
#1 Set a good password for your device
#2 Encrypt your hard drive
#3 Use a password manager
#4 Use two-factor authentication
○ SMS
○ Authenticator App
○ Hardware token
#5 Take care of backup codes
#6 Review apps and connected devices
Next up: Financial services, cloud storage & social media

Related Articles

Finance
Technology

What Is Render Token (RENDER)?

Deborah Pretty August 22, 2025
Business
Technology

What Is the Best Email Verification Tool for Cold Email Outreach?

Hanna Kim August 21, 2025
Business
Technology

How to Improve Deliverability: 5 Email Warmup Tools to Consider

Eric Knellinger August 21, 2025

Footer

Tweak Your Biz
Visit us on Facebook Visit us on X Visit us on LinkedIn

Privacy Settings

Company

  • Contact
  • Terms of Service
  • Privacy Statement
  • Accessibility Statement
  • Sitemap

Signup for the newsletter

Sign For Our Newsletter To Get Actionable Business Advice

* indicates required

Copyright © 2025. All rights reserved. Tweak Your Biz.

Disclaimer: If you click on some of the links throughout our website and decide to make a purchase, Tweak Your Biz may receive compensation. These are products that we have used ourselves and recommend wholeheartedly. Please note that this site is for entertainment purposes only and is not intended to provide financial advice. You can read our complete disclosure statement regarding affiliates in our privacy policy. Cookie Policy.

Tweak Your Biz
Sign For Our Newsletter To Get Actionable Business Advice
[email protected]