Hackproof Email
()
About this ebook
Your email travels over local transmissions twice and over the Internet three times before it reaches the recipient. That’s a lot of exposure. Your email is the cornerstone of your cybersecurity. If someone hacks into your email and steals your identity, it exposes your entire cyber presence to fraud or digital mischief. What can you do to make your use of email secure from hacking?
Since there are multiple opportunities for a hacker to hack into your email transmission, no one defense fits all. You need multiple defenses. The book focuses on the unique suite of RMail secure email services, which provides:
•Several defenses, which enable you to make your email secure along the entire email path from you to your recipient.
•A suite of secure email services that work with all other email systems and email software. You never have to worry about compatibility with recipients.
•Special services that are very useful to large and small businesses and even individuals.
With RMail services you can continue to use your current email service and software. The basic use of RMail services is free, and the extensive use is at a nominal cost charged by the amount of use.
The ebook covers why and how to make your email secure using RMail services. With all the headlines about Yahoo, Equifax, Adobe, Target, AOL, and endless others suffering from security breaches affecting hundreds of millions of people, you need to be concerned about your online activities.
This ebook gives you the easy, convenient, and inexpensive steps you need to take to make your email hackproof.
Joseph Sinclair
University of Michigan BA, JD, US Navy, practiced law in Michigan and Colorado. After a 20-year career in commercial and investment real estate, the author wrote the definitive book on real estate investment analysis, Real Numbers, as his first book. Living in the San Francisco Bay Area, however, he got sucked into the vortex of digital technology and had a 12-year career writing technology books for non-programmers. For a decade he returned to investments but now has resumed his activities as an author. His books follow: Real Numbers, Business One Irwin, 1993 Creating Cool Web Databases, IDG Books Worldwide, 1996 Intranet vs. Lotus Notes, AP Professional, 1997 Java Web Magic, Hayden Books, 1997 Developing Web Pages with TV HTML, Charles River Media, 1998 Typography on the Web, AP Professional, 1999 Thin Clients Clearly Explained, Morgan Kaufmann, 2000 eBay the Smart Way, Amacom, 2000-2007, Five Editions Web Pages the Smart Way, Amacom, 2001 Creating Web Based Training, Amacom, 2002 eBay Business the Smart Way, Amacom, 2003-2007, Three Editions eBay Motors the Smart Way, Amacom, 2004 eBay Global the Smart Way, Amacom, 2004 Building eBay Traffic the Smart Way, Amacom, 2005 eBay Photography the Smart Way, Amacom, 2005 eBay Inventory the Smart Way, Amacom, 2006 Publishing by Voice, Appworth Media, 2016 The author has several books in progress to be published in 2018. Hackproof Email, Appworth Media, 2018 In his spare time, the author is a fine arts photographer, typographer, downhill skier, cross-country skier, snowshoer, hiker, backpacker, peak bagger, canyoneer, and fly fisherman mostly in Utah, Colorado, Arizona, and New Mexico.
Related to Hackproof Email
Related ebooks
Seven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratingsMind-blowing Signal 101 Guide for Beginners and Experts: Unravel the Best Signal Private Messenger Tips for Secured Calls and Chats Rating: 0 out of 5 stars0 ratingsBlind Spot: Smartphone and Computer Personal Security Guide Rating: 3 out of 5 stars3/5Software Security For You Rating: 0 out of 5 stars0 ratingsClient-Side Attacks and Defense Rating: 0 out of 5 stars0 ratingsLearning zANTI2 for Android Pentesting Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsEasy Private Browsing: How to Send Anonymous Email, Hide Your IP address, Delete Browsing History and Become Invisible on the Web Rating: 0 out of 5 stars0 ratings#HACKED: 10 Practical Cybersecurity Tips to Help Protect Personal or Business Inform Rating: 0 out of 5 stars0 ratingsHack Proofing Your Network Rating: 0 out of 5 stars0 ratingsCompsec: For the Home User Rating: 0 out of 5 stars0 ratingsMobile Malware Attacks and Defense Rating: 5 out of 5 stars5/5Digital Cop: A Digital Cop's Guide to Cyber Security Rating: 0 out of 5 stars0 ratingsComprehensive Guide to Personal Cybersecurity: Personal Cybersecurity Practices for a Safer Digital Life Rating: 0 out of 5 stars0 ratingsHack Proof Yourself!: The essential guide for securing your digital world Rating: 0 out of 5 stars0 ratingsDetecting and Combating Malicious Email Rating: 0 out of 5 stars0 ratingsPersonal Information & Identification Security Made Easy Rating: 0 out of 5 stars0 ratingsKeep Your PC Safe From Virus And Data Loss Rating: 0 out of 5 stars0 ratingsEthical Hacking: A Comprehensive Beginner's Guide to Learn and Understand the Concept of Ethical Hacking Rating: 0 out of 5 stars0 ratingsTrojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code Rating: 4 out of 5 stars4/5The Art of Email Security: Putting Cybersecurity In Simple Terms Rating: 2 out of 5 stars2/5Data Recovery A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsHacking Web Apps: Detecting and Preventing Web Application Security Problems Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsUltimate Hack Rating: 0 out of 5 stars0 ratingsAndroid Programming: Pushing the Limits Rating: 0 out of 5 stars0 ratingsWireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks! Rating: 5 out of 5 stars5/5Cybersecurity Experts Rating: 0 out of 5 stars0 ratingsThe Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime Rating: 0 out of 5 stars0 ratings
Internet & Web For You
The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsHow to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Get Rich or Lie Trying: Ambition and Deceit in the New Influencer Economy Rating: 0 out of 5 stars0 ratingsPodcasting For Dummies Rating: 4 out of 5 stars4/5Coding For Dummies Rating: 5 out of 5 stars5/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5Beginner's Guide To Starting An Etsy Print-On-Demand Shop Rating: 0 out of 5 stars0 ratingsGrokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5How To Start A Podcast Rating: 4 out of 5 stars4/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 5 out of 5 stars5/5The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning Rating: 4 out of 5 stars4/5200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline Rating: 0 out of 5 stars0 ratingsMore Porn - Faster!: 50 Tips & Tools for Faster and More Efficient Porn Browsing Rating: 3 out of 5 stars3/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHow To Make Money Blogging: How I Replaced My Day-Job With My Blog and How You Can Start A Blog Today Rating: 4 out of 5 stars4/5
Reviews for Hackproof Email
0 ratings0 reviews
Book preview
Hackproof Email - Joseph Sinclair
Hackproof Email
Make Your Email Secure with RMail Services
By Joseph T. Sinclair
The publisher of Hackproof Email is Appworth® Media an imprint of Caithness Multimedia Publishing, Vallejo, California, USA. Distributed by Amazon and Smashwords.
This publication is designed to provide accurate and authoritative information about the subject matter covered. It is published and sold with the understanding that the publisher and author are not engaged in rendering legal, accounting, marketing, technical, digital, security, or other professional services. If specialized advice or other expert assistance is required, the services of an appropriate and competent professional person should be sought.
Version: 180130
ISBN-10: 1-886907-04-8
ISBN-13: 978-1-886907-04-1
All design, text, graphics, photos, audio, video, the selection and arrangement thereof, and all software are:
Copyright 2018 Joseph T. Sinclair. All rights reserved.
Created in the United States of America.
Any use of materials on this application, including reproduction, modification, distribution, republication, or transmission in any form or by any means, electronic or mechanical, including photocopy, recording or any information storage or retrieval system without the prior written consent of Joseph T. Sinclair is not permitted. This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each recipient. If you’re reading this book and did not purchase it, or it was not purchased for your use only, then please return to your favorite online retailer and purchase your own copy. Thank you for respecting the hard work of this author.
Table of Contents
Front of Book
Cover - Title/Copyright Page - Dedication - Table of Contents - Foreword - Preface - Acknowledgements
Part I Introduction to Email
Chapter 1 Introduction
Chapter 2 The Email System
Chapter 3 The Email Phone System
Chapter 4 Risks and Defenses in the Email System
Chapter 5 The Secure Email System
Part II Protect Your Email with RMail Services
Chapter 6 RMail Inbox
Chapter 7 RMail Web
Chapter 8 Why Registered Email Is Better Than US Postal Service Registered Mail
Chapter 9 Message-Level Encryption
Chapter 10 E-sign
Chapter 11 LargeMail File Transfer
Chapter 12 Using Complex Documents
Chapter 13 RMail Extras
Chapter 14 Using Secure Email Services
Part III What You Should Know About Security
Chapter 15 Business and the Law
Chapter 16 Hackers’ Delight: The Social Side of Cybersecurity
Chapter 17 Subtle Security Breaches
Chapter 18 Security Review
Chapter 19 Developing Safe Practices for Secure Email
Chapter 20 Business Examples
Chapter 21 The Last Word
Back of Book
Glossary
Index
About the Publisher and Author
Other Publications of Appworth®
Part I
Introduction to Email
This part is an analysis of the internet email system that everyone uses. It is intended to give you the background to determine what you need to do to make your email more secure and less susceptible to hacking.
[ 1 ]
Introduction
I probably don’t need to recite a litany of famous cybersecurity breaches, but I will. The media has provided us with plenty of headlines over the last few years. And those are just the ones we know about. It is said there are plenty of other big stories that have never come to light.
A Partial List
A partial list of well-known companies that have had their customer's data breached since the middle of the last decade: TD Ameritrade, National Archive and Records Administration, Citigroup, Healthnet, eBay, Honda, Defense Department, Chase, Scotttrade, Target, At&T, T-Mobile, Yahoo, Democratic National Committee, Wyndham Hotels, Equifax, Department of Veterans Affairs, Sony, Home Depot, IRS, Bank of America, Texas Attorney General, Allied Insurance, JP Morgan, TJ Max, Hyatt Hotel, Kmart, Blue Cross/Blue Shield, Facebook, and Adobe.
According to FBI Public Service Announcement, May 4, 2017, in the US between October 2013 and December 2016 there were 40,203 complaints of email security breaches from small and large businesses with total losses of $5,320,890,448. That’s an average loss of $131,902 per complaint. Between January 2015 and December 2016 there was a 2,370% increase in losses reported. Who knows how many breaches went unreported. And the report doesn’t include personal complaints. (The FBI announcement is very useful and includes scenarios, trends, and suggestions for protection.)
The January issue of PC Magazine predicts that email will continue to be a major target for cyber criminals in 2018.
The big question is how does this seemingly endless threat affect you? We all tend to think that that we are of little interest to hackers and in any case our chances of being hacked by cyber criminals from Nigeria, Romania, China, or Russia seem remote. Unfortunately, whatever we may think, we still have bank, brokerage, credit, and shopping accounts online vulnerable to hacking. It’s not a matter of IF. It’s a matter of WHEN. And when it comes, are you ready for it?
If you’re ready for the hack that comes your way, you’ll likely never know it was attempted. If you’re not ready, then shame on you. It’s not likely to end well. But then, there has been plenty of warning.
This book is about getting you ready by making your email secure. Since your email is the cornerstone of your online world, making your email secure goes a long way toward making your entire online presence secure. Indeed, if your email is hijacked or otherwise compromised, it can lead to a serious breach of security in your overall cyber presence, a breach that can result in a substantial financial loss or a critical loss of secrecy (e.g., proprietary information).
It’s true there is no absolute defense to email hacking. Nonetheless, there are simple, convenient, and inexpensive things you can do to change the statistics from being a real threat to being an unlikely occurrence.
There are plenty of solutions to security threats. Many are difficult to understand, complex to implement, or expensive to use. The ones that are more practical tend to be defenses that solve only one security threat, leaving you susceptible to others. That’s why I consider RMail services important. It’s a suite of security services.
RMail services are comprehensive, easy to implement, easy to use, and inexpensive. RMail has been around since 2000 (started out as RPost) and has substantial experience in successfully providing specialized security to email users. Recently it has expanded its security services to be more comprehensive. Hence, this book uses RMail as the prime example of defense against hackers.
Flexible
You can use RMail in place of your current email service, or you can use it as an addition to your current email service to make your email activities more secure. Moreover, it works with whatever email programs and services recipients use.
But anti-hacking security is only part of the RMail story. The huge bonus for businesspeople is that the RMail suite of services is at the same time a suite of convenient and inexpensive business services. Indeed, this book is really a business book. It’s a book about how to conduct business securely in the new digital environment where everyone is connected to everyone else, for better or worse. It’s a book about how to keep things straight (honest) with everyone you deal with whether friends, family, co-workers, colleagues, clients, customers, vendors, collaborators, or the like. After all, almost everyone does some business on the internet.
If you’re an individual with few business responsibilities, there’s plenty here for you to digest too. But if you’re a businessperson, this book is essential for your secure business practices moving forward into a cyber future that’s getting to be more useful yet more hostile every day.
To begin, in order to easily understand the topics in each chapter, you need to understand some of the specific terms the book defines and uses. With that in mind, this introductory chapter sets forth some basic definitions.
Internet Service Provider (ISP)
An internet service provider (ISP) provides you with internet service. This means that your ISP gives you the means of hooking up to the internet. Typical ISPs are AT&T, Verizon, Comcast, Cox, and other major communications corporations (telecoms).
There are also plenty of local ISPs. Local ISPs typically do not serve a nationwide market and in many cases do not even serve a statewide market. Some are so small that they serve only part of a city or county.
Profit and non-profit organizations, such as corporations and colleges, also provide internet service internally to their employees and other constituents, but not to the public.
Whatever their size and market, ISPs are the entities that give you a connection to the internet. That connection is via phone line, cable, or satellite transmission.
Host ISP
A host ISP is simply a provider that specializes in Web hosting services. It doesn’t necessarily provide you with a connection to the internet, but it does provide you with a smorgasbord of services for establishing and managing your website(s). Your normal ISP is typically a host ISP too, but most people prefer to use a separate host ISP due to the specialized Web hosting services that a host ISP typically offers. HostGator and 1&1 are good examples.
Email Program
To handle your email, you use email software; that is, you use an email program. Your email program (on your computer) sends, receives, stores, and manages your email. Email programs are such software as Microsoft’s Outlook, Mozilla’s Thunderbird, Apple’s Mail, Synacor’s Zimbra, and the like. Some email service providers provide email programs, too, such as Google (Gmail). For tablets and phones, email programs are known as email apps. (There is also the technical and decades-old term of email client, but this book does not use that term.)
Email Service Provider
An email service provider runs an email server on the internet. When you send an email, it goes to an email server as outlined in Chapter 2. An email service provider operates that email server.
For instance, if your ISP is Comcast but you use Google’s Gmail, Google is your email service provider. When you send an email, it goes to the Google email server.
Many of the email service providers such as Google Gmail, Microsoft Outlook.com (Hotmail), and Yahoo Mail offer free email service. ISP’s also offer email service typically at no additional charge.
Marketing Email Services
There is also a large industry of email service providers that handle mass email marketing campaigns sending hundreds or thousands of marketing email messages at one time. Such email service providers are beyond the scope of this book. Examples are AWeber and Constant Contact.
Email Server
An email server is software that can run on any computer connected to the internet. It sends email messages out across the internet; and it receives email messages from the internet and holds those messages in storage. An email server is a program that runs on the email service provider’s computer, not your computer.
When you send a message from your email program it goes to an email server, which sends it on to its destination. An email server also receives your email messages from the internet and holds the messages in storage until your email program retrieves them.
Can you operate your own email server? Sure. You can take an old laptop (or desktop), install a free email server program on it, hook it up to the internet via your router, and run it 24/7. Anyone can do it. But if it doesn’t run 24/7, it misses incoming email. And it requires management that sometimes requires expertise. Consequently, few people run their own email server. It’s just easier to use an email service provided by an ISP, a host ISP, or an email service provider.
Avoid Confusion
The previous definitions make simple distinctions, but everyday realities often hide such distinctions. For instance, most ISPs also provide email service at no extra cost. That is, as well as hooking you up to the internet, they also provide you with an email server. Hence, you may easily overlook the distinction between your ISP and your email service provider, if they are one and the same.
There are three distinctions to remember:
ISP (internet connection)
Email service provider (email server)
Email program
Each is independent. Each service that you use can be supplied by a different provider, or one provider can supply them all.
So, keep in mind that you don’t have to use the email service that your ISP offers. As long as you have a connection to the internet, you can use any email service that you desire. That’s why many people who have ISPs such as AT&T, Comcast, or other major telecoms may also use Gmail provided by Google for free.
(Note that if you operate a website, your host ISP, also provides email service typically at no extra cost giving you yet another choice for your email service.)
Most ISPs, host ISPs, and email service providers not only provide email service but also provide a free email program. Nonetheless, email service and an email program don’t necessarily go together. You can use an email service yet still use a separate and independent email program. And even if you use Gmail provided by Google, you may opt to use it with an email program such as Outlook rather than with the Google Gmail program.
To gain an understanding of the email system and basic email security, it’s necessary to keep all these distinctions in mind.
Secure Email Service Provider
A secure email service provider is