Home Views & Opinions E-mail accounts and their ID’s

E-mail accounts and their ID’s


Now in this contemporary world most of young’s and elders are using email accounts with their specific IDs. Its process and management is now in every body’s mind but just for remembrance we repeat it with following sketch.

An email address is essential for most transactions these days, from activating a mobile smartphone, to making online purchases, to setting up an online account. An email address is more than just another method for someone to contact you. Your email account may contain sensitive and important communication and is often connected to important accounts, such as your bank. Ensuring that your email address is secure – that only you have access to it – is critical.

Major email providers will let you set up as many email addresses as you want, for free. Some of these email providers include: Gmail, Yahoo Mail, or Microsoft Outlook (formerly Hotmail). The benefit of these email services is that they are fairly easy to use. You can access them online via a web browser or set it up so that email is accessed via a mobile email app or computer email program.

If you are worried about someone hacking your email (via man-in-the-middle-attacks), an end-to-end encrypted email service may be what you want. There are email providers that offer email encryption. For example, Proton Mail is completely encrypted, and you can set it so that the email is no longer available after a certain time period. Other free encrypted email services include Tutanota and Mailfence.

Keep in mind, however, that these services may be slightly more complicated to use than traditional email. For example, some encrypted email service may require that the person to whom you’re sending the email also use the same email service or that to read the email, they click a link and read the email on a web browser. Also keep in mind that encrypted email will not prevent someone from seeing your email if they know your email address and password or if you are using a monitored device.

Other ways in which you may have an email address is when you activate certain services, such as a broadband or DSL/ADSL (internet) service or when you create an apple ID (e.g., youremail@bigpond.com or youremail@icloud.com). Your school or your employer may also create an email address for you. Generally, these email accounts are automatically created and limited to your association with the school, employer, or service.

It is possible to use a popular commercial email service, such as Gmail or Yahoo, and still have a secure account. Email security often comes down to passwords, the security of the device used to access email, and good email security and privacy habits.

Email privacy and security starts when you first create the email account.
During the setup, the email service provider will ask for information to associate with your email address, including your name and date of birth. You can use a pseudonym and a fake date of birth. Just remember the pseudonym and birthdate you use in case you need that information to verify your account. Some email services also ask for (and some require) your gender, mobile number, and a secondary email address. Some services allow you to bypass those questions without entering anything; if it requires the information, it will not let you complete setting up the email until you do. For example, Gmail requires a name, username, password, date of birth, and gender; however, you can leave the mobile number and current email address blank and continue. Yahoo Mail requires a name, email address, date of birth, and mobile number while gender is optional. Outlook mail only requires your name, email address, and password.

For most people, the security of their email account comes down to someone knowing their email address and password. Don’t use a password that someone else can guess or a password that you also use for other accounts. Create a password that is unique, that you can remember without having to write it down, and is either a long phrase or contains letters, numbers, and characters.

If you have more than one email address or a mobile number – and it is secure (no one else has access to it) – you can set up two-step verification. If someone tries to log into your email account from another device or location, the email service will send a code to the second email or mobile number, which will be required (in addition to the password) to sign into the email account. If you (or the person trying to log into your email account) don’t have access to that secondary email or mobile number, you can’t sign into your account.

This is useful only if you have a secondary email or mobile number that no one else has access to. If someone else does have access to that email/mobile phone, they could sign into your account even with two-step verification or it may let them know when you try to sign into your account from a new location or device. Depending on your situation, you may not want to have two-step verification turned on until you first secure the secondary email and mobile number.

If you don’t provide a secondary email or mobile number, the email service may periodically ask that you provide one when you sign into your email account later on. In most cases, you can ignore these requests and hit continue or OK without entering anything.

Secondary email and mobile numbers can be a very useful security step – but only if it works for you. If you don’t have a secondary email or mobile number or the email and mobile number you have has been compromised by someone else, using it as your second step of verification will not make your account more secure. Make sure your secondary email account and mobile number is secure before you use it.

In addition to having a strong password and using the security features (such as two-step verification) the email service provides, practicing good email security and privacy habits are important to ensure that no else can sign into your email account or see your email. The followings are some steps to ensure security.
1. Use secure devices
2. Always log out
3. Be cautious when giving out your email address
4. Don’t click on links from unknown or suspicious individuals
If you use a secure email service that offers end-to-end encryption, you have taken a huge step toward making your email truly secure and private.
To make life difficult for even the most dedicated hackers, you can take a few more precautions:
n Beware of key logging software that captures what you type right from your keyboard. These can completely thwart all encryption if the password is all the hacker needs to access your account.
n Do not leave your mobile devices and computers unguarded. Also, make sure your devices themselves are protected with strong passwords or biometrics and do not allow for guest accounts or similarly unprotected access.
n Be vigilant of social engineering. Phishing attempts often come by email, instant messages, VoIP, or social networking messages, and can be cleverly designed or tailored specifically to you. These are tricks that get you to hand out personal details such as passwords and bank information.
n Do not write down or share any passwords. Never make a note of the password that lets you decrypt secure emails. That is unless you store it in a secure password manager.