fbpx

You are viewing our site as an Agent, Switch Your View:

Agent | Broker     Reset Filters to Default     Back to List

5 Email Security Tips for Real Estate Agents

March 28 2016

ixact email securityReal estate agents are good at multi-tasking on the fly! But the fast-paced, mobile nature of your career means that your email security could be at risk. To help you, we're sharing some email security tips from Inc. magazine, along with suggestions of our own!

1. There's no such thing as truly private email. All information stored and sent over email is vulnerable. Avoid sending highly personal information, including financial information and passwords, through email.

2. Public, unsecured Wi-Fi connections are vulnerable to email hackers. Your mobile device may invite you to use such a connection, when you are in a public location with free Wi-Fi. For security reasons, do not use unsecured Wi-Fi when checking your email account, or doing mobile banking or any online transactions.

3. Never open attachments in unfamiliar emails. Email attachments are a common carrier of malware. If you do not know the sender, OR the message seems incongruous with the source, do not open the attachment.

4. The same goes for links embedded in an email; do not click on suspect links. Watch for "counterfeit" link addresses that look like a known company name, but contain alterations in spelling or syntax. Use special caution when the URL link is shortened; if you do not know the sender, or have doubts about the veracity of the message, do not click.

5. Have a strong email password that includes upper and lower-case letters, numbers and symbols. Avoid using predictable passwords that are based on not-so-secret elements of your personal life, like the names of your children or pets. Don't make a password out of anything or anyone you've mentioned on Facebook!

Keeping your email account secure protects you and your clients! And when using a CRM for real estate marketing, use a trustworthy company like IXACT Contact that provides you with data security and privacy.

To view the original article, visit the IXACT Contact blog.