Proton

Hacks are surprisingly commonplace. In 2014, for instance, nearly half of all American adults had some form of data stolen from corporate servers in a 12-month span, according to CNN(new window). Credit cards, telephone numbers, and login credentials are falling into the hands of bad actors who can use that information to access linked accounts.

And that’s just one way hackers can work their way into your most private information. Whether you’re trying to secure your personal correspondence or lock down trade secrets, these five rules for email safety can save you from some of the most common and preventable hacks.

1. Always enable two-factor authentication

Using two-factor authentication (2FA) is a simple but powerful security measure. It ensures that even if someone has your password, they still need something else before they can get into your account. That something else may be a variety of things, from the answer to a secret question to a fingerprint. Some forms of authentication, such as SMS or email verification, are less secure than others. Be sure to choose an email provider with safe 2FA. Many smaller email companies still do not offer any two-factor authentication, and some big providers, such as Yahoo! Mail, only offer 2FA via SMS. Proton Mail users can enable 2FA via a software token, in which a unique code is delivered to an app on a second device.

2. Take password security seriously

Everyone says this, but it doesn’t appear to be sinking in. A recent Google study(new window) found that the most common passwords are 123456, password, and 123456789. If you’ve got unhealthy password habits, we recommend using a password manager like Proton Pass, which helps you create a different, strong password for each of your online accounts. (Make sure you use the encrypted backup feature.) Your passwords should be at least 16 characters using a mix of numbers, letters, and punctuation. In this way you can fend off brute force attacks. Avoid writing down your passwords, and never share them with anyone. Never re-use passwords between different accounts.

3. Use encrypted email

Corporate data breaches have affected millions of people. Hackers have gotten into the servers of some of the largest companies in the world, including Yahoo!, LinkedIn, and Tumblr, stealing passwords, phone numbers, and credit cards. Switching to an encrypted email provider, specifically one with end-to-end encryption and zero access encryption, provides a technical solution to this problem.

For example, because all emails stored on Proton Mail are protected with zero access encryption, even a break of Proton Mail’s servers won’t leak your private communications (unlike what happened with Yahoo! Mail). In short, encryption can dramatically improve the security of your communications.

4. Protect yourself from phishing attacks

Phishing is a common way hackers can gain access to your devices and accounts, and millions of people fall victim each year. Criminals send a legitimate-looking email asking you to click a link or download an attachment. The link may ask you to enter your password (i.e. send your credentials to the hacker) or automatically download malicious software. We talked in depth about how to prevent phishing attacks in a previous article. Among our tips, pay close attention to tell-tale signs of phishing, like unofficial or misspelled email addresses. Never download or click on anything from someone you don’t know. Your email provider may offer additional protection. Proton Mail is unique in that we provide a special set of security features(new window) designed specifically to prevent Proton Mail users from being phished.

5. Protect your devices

Here’s an easy way to hack into someone’s email account: Steal their phone while they’re using it. Often the most effective hacks are also the least low-tech. Device theft is one. Keylogging software and other types of spyware are also concerns. Be aware of your physical security when traveling and in public, and always set a password for your device (many apps, including Proton Mail’s, also allow you to add extra security, such as entering a PIN or Touch ID for each new session). To prevent device hacking, check out our article on phishing, don’t click untrusted links, and always install the official security patches and updates for your device. If you are using a public computer, don’t forget to log off!

We spend a lot of time thinking about security here at Proton Mail, particularly since we protect the communications of many high profile targets, like journalists. If you feel you might be at heightened risk of cyberattack, we also recommend reading our online security guide for journalists, which contains some more advanced tips for overall digital security.

You can get a free secure email account from Proton Mail here.

We also provide a free VPN service(new window) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan. Thank you for your support!

Related articles

A phone screen with a speech bubble with a phone number in it
en
Your email address and passwords aren't the only information hackers can use to scam you. Here's what someone can do with your phone number — and how to protect it.
A web application screen with an unlock icon in the bottom right corner
en
Your best defense against a data breach could be improving your web application security: Find out how Proton Pass can help.
Investigative journalist Vegas Tenold explains the gear he uses to protect his privacy and stay safe.
en
  • Privacy news
Follow investigative journalist Vegas Tenold as he explains his gear and how it keeps him safe from surveillance as he works in the field.
Coinbase, the largest Bitcoin exchange in the US, suffered a data breach
en
  • Privacy news
  • Proton Wallet
Coinbase employees sold sensitive personal information to attackers, including government IDs and BTC transaction history. Proton Wallet is built to avoid these risks.
Whistleblower's whistle. Journalists must use secure channels to communicate with whistleblowers.
en
Whistleblowers risk everything to expose the truth. This guide helps journalists keep their sources safe using secure tools like Proton Mail, Signal, and SecureDrop.
An image showing a phone screen with a child icon and three icons with '17+' '8-12' and '3-5' to indicate age ratings
en
Parents can help their children develop healthy screen habits by learning about dark design patterns — Proton investigates how