ProtonBlog

Email wasn’t initially designed to be secure. From spam and phishing attempts to malware(new window), unethical marketers and cybercriminals try to undermine the security and privacy of your inbox every day. Since your inbox stores plenty of sensitive information about your interests, contacts, work, and daily schedule (such as online shopping receipts, hotel bookings, and event invites), these cyberthreats pose a serious risk to your email security. 

Fortunately, you can still take precautions to secure your emails. Here are nine top tips to keep your emails safe.

1. Use a private and secure email service (like Proton Mail)

Most popular email providers don’t provide adequate protection for your emails. Until 2017, Gmail was still reading your emails(new window) to target you with personalized ads. Today, it tracks your online purchases(new window), scans your emails to enable smart features, and keeps a record of almost everything you do(new window) in its apps.

The best way to prevent your email provider from reading your emails is to use an encrypted email provider, such as Proton Mail. Encrypted email providers use end-to-end encryption (E2EE) and zero-access encryption to secure your messages, ensuring they can only be read by you and your recipient. 

As the world’s largest encrypted email provider, we make sending fully encrypted emails easy and intuitive. All of our encryption happens in the background — all you need to do is compose your email as usual and hit “send”. Besides E2EE and zero-access encryption, we’ve also equipped Proton Mail with other advanced security features.

Get Proton Mail button

2. Block spy pixels and trackers

Most marketing emails you receive, including newsletters and other promotional materials, contain invisible spy pixels. When you open an email containing a spy pixel, it records sensitive information and sends it back to the sender. This information can include:

  • If and when you opened the email
  • Your device type and operating system
  • Your IP address and location

This sender then uses this data to profile you and target you with personalized ads. 

At Proton, we believe you should be able to read your emails without worrying about who’s spying on you. With our enhanced tracking protection feature (which is enabled by default), all spy trackers are automatically blocked, allowing you to view images in your emails safely while keeping your email activity private. You can also click on the shield icon at the top right of the email to see the blocked trackers.

3. Use a strong password and password manager 

A strong password provides essential protection against unauthorized access to your inbox. Every password you create for your online accounts should be unique and complex enough to deter hackers. 

Since remembering complex passwords for all your online accounts is impossible, using an open-source password manager is the easiest and safest way to manage all your passwords. A password manager generates and stores strong passwords for you, so all you need to do is to remember the master password that unlocks your password manager. 

Learn how to create strong passwords

4. Be wary of phishing scams 

Cybercriminals use phishing emails to lure you into clicking on malicious links, opening fake attachments, and disclosing sensitive information. They impersonate a well-known brand or someone you know, leading you to believe that these emails come from a trusted source.

Thankfully, it only takes a little common sense to protect yourself against phishing scams. If you receive an email that looks suspicious (for example, one that insists you take urgent action immediately), or comes from an unknown sender using a non-official email address, don’t click on any links or open any attachments. Report the email to your email provider immediately and block the sender.

If you’re using Proton Mail, you’re automatically protected from phishing scams with PhishGuard, a set of advanced technologies specifically designed to combat phishing. If a phishing email lands in your Proton Mail inbox, you’ll see a red warning label at the top:

You can also use Proton Mail’s link confirmation feature to inspect URL links before opening them in your browser. 

5. Enable two-factor authentication 

Two-factor authentication (2FA) adds an additional layer of security to your email account by requiring you to prove your identity when you sign in. This means that even if your password is leaked or stolen by a hacker, they won’t be able to access your account. 

When you enable 2FA, you’re typically asked to download an authenticator app on your mobile device, which generates random, one-time codes you’ll need to sign in to services. You can also use biometric 2FA methods, such as Passkey from Apple which requires you to use FaceID or TouchID to sign in. However, hardware security keys, such as YubiKey, make for the easiest 2FA method, since you don’t need to download an additional app. 

At Proton, we support two 2FA methods:

  • One-time passcodes generated by authenticator apps
  • Security keys, also known as 2FA keys or hardware keys, as long as they adhere to the FIDO2 standard 

After setting up your 2FA, safely store any emergency list of codes, and learn how to back up or transfer your 2FA account to a new device if you switch to a new mobile phone. While 2FA might seem like a small measure to incorporate into your digital hygiene routine, it substantially increases the security of your email account.  

6. Set a password on your emails 

Even if you use an encrypted email service like Proton Mail, if the person you’re writing to uses a standard email service, your messages in their inbox could be scanned, accessed, and read at any time. Some email providers allow you to protect your emails with a password. If this feature is available and you know the person you’re writing to doesn’t use an encrypted inbox, you should set a password.

All emails sent and received between Proton Mail addresses are automatically encrypted with E2EE. This means only you and your recipient can read your messages, and you don’t need to password protect them since they’re fully private. However, if you’re sending an email to a non-Proton Mail address, you can easily use our Password-protected Emails feature to send a secure, end-to-end encrypted message to any email address. You can also set a message expiration timer to determine how long your recipient should have access to your email. 

7. Block spam and unwanted senders 

From annoying spam newsletters to overly persistent salespeople, there are certain senders whose messages you don’t ever want to see in your inbox. For these situations, it’s  better to simply block them and never worry about unwanted attention again.

Thankfully, if you’re using Proton Mail, you can block a sender in just a few clicks. The block applies across all platforms, including the Proton mobile apps. Likewise, you can also use our spam and block lists to customize existing spam and block filters for granular control. 

8. Protect your real email address with aliases 

Your email address is part of your online identity, and you should keep it safe. There’s no need to give out your real email address if you don’t have a reason to, and you shouldn’t post it on public platforms, such as in a social media post.  

The best way to protect it is to use an email alias, which is an additional email address that can help preserve your privacy and reduce spam. All emails sent to your email alias will arrive in your existing inbox, and you can also choose which email alias to use when sending emails. 

You can have different aliases for different purposes — for example, one for online shopping and one for newsletters. If you need to create an email alias while signing up for an online service, simply tack on a plus sign (+) to your username. If your email address is bobsmith@proton.me, your email alias could be bobsmith+newsletters@proton.me. 

In Proton Mail, you can create email aliases in three ways:

  • With the plus sign (+) method described above (without needing to create new email addresses in Proton Mail)
  • By creating a new email alias in your existing Proton Mail account
  • Generating email aliases with SimpleLogin

Depending on your subscription plan, you can create at least 10 additional email aliases, either with a Proton Mail domain (@proton.me) or your own custom domain (@bobsmith.com). You can also use our SimpleLogin browser extension, web app, and mobile app to create anonymous email addresses whenever you sign up for a new online service.

9. Sign out of your email account

It’s always a good idea to sign out of your email account when you’re not using it, especially if you’re logged in on a public computer or a shared device. If you don’t sign out of your email account, there’s a risk that someone else might read your emails or interfere with your account settings. They could even send abusive messages to your contacts while pretending to be you.

We also strongly recommend using the private browsing mode (also known as incognito mode) to sign into your Proton Mail account. Select the Keep me signed in checkbox only if you’re using your personal device that nobody else has access to.

The best way to secure your emails

Since our launch in 2014, one of our goals at Proton has been to make online privacy accessible to everyone. If you’d like to send fully encrypted messages and enjoy a more secure inbox, sign up for a free Proton Mail account. Together, we can build an internet where privacy is the default. 

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

Google is one of the biggest obstacles to privacy. The Big Tech giant may offer quick access to information online, but it also controls vast amounts of your personal or business data. Recently, more people are becoming aware of the actual price you
What to do if someone steals your Social Security number
If you’re a United States citizen or permanent resident, you have a Social Security number (SSN). This number is the linchpin of much of your existence, linked to everything from your tax records to your credit cards. Theft is a massive problem, whic
compromised passwords
Compromised passwords are a common issue and probably one of the biggest cybersecurity threats for regular people. How do passwords get compromised, and is there anything you can do to prevent it? * What does compromised password mean? * How do pa
Is WeTransfer safe?
  • Privacy basics
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi
Data breaches are increasingly common. Whenever you sign up for an online service, you provide it with personal information that’s valuable to hackers, such as email addresses, passwords, phone numbers, and more. Unfortunately, many online services f