{"id":43037,"date":"2021-11-29T13:13:41","date_gmt":"2021-11-29T18:13:41","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=43037"},"modified":"2021-11-29T13:13:41","modified_gmt":"2021-11-29T18:13:41","slug":"sensitive-information-in-inbox","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/sensitive-information-in-inbox\/43037\/","title":{"rendered":"What not to keep in your mailbox"},"content":{"rendered":"<p>If someone gets access to your mailbox, one possible consequence is a <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-bec-attack\/34135\/\" target=\"_blank\" rel=\"noopener nofollow\">BEC attack<\/a>, in which case your correspondence can contribute greatly to its success. Of course, security software helps adjust the odds in your favor, but anyone can fall for phishing, so it\u2019s important to minimize potential damage by removing any messages you would not want to fall into someone else\u2019s hands\u00a0\u2014 just in case. Here is what to remove first.<\/p>\n<h2>Authentication data<\/h2>\n<p>Most modern services avoid sending even temporary passwords, instead providing unique links to a password-change interface. Sending passwords through unencrypted e-mail is a terrible idea, after all. But some companies do still send passwords by e-mail, and the practice is somewhat more common with internal services and resources. Moreover, employees sometimes send themselves passwords, logins, and their answers to secret questions.<\/p>\n<p>Such letters are exactly what attackers are looking for: With access to corporate resources, they can get extra information for social engineering manipulations and further develop attacks.<\/p>\n<h2>Online service notifications<\/h2>\n<p>We get all sorts of notifications from online services: registration confirmations, password reset links, privacy policy update notifications. The letters per se are of no interest to anybody, but they show what services you subscribe to. The attackers will most likely have scripts ready to automate their search for these notifications.<\/p>\n<p>In most cases your mailbox is the master key to all of these services. Knowing which ones you use, the attackers can request a password change and get in through your mailbox.<\/p>\n<h2>Scans of personal documents<\/h2>\n<p>Corporate users (particularly those in small business) are often tempted to use their mailboxes as a sort of cloud file storage, especially if the office scanner delivers scans by e-mail. Copies of passports, taxpayer IDs, and other documents are often required for routine paperwork or business trips.<\/p>\n<p>We recommend deleting any messages containing personal information <a href=\"https:\/\/www.multitran.com\/m.exe?s=immediately+upon&amp;l1=1&amp;l2=2\" target=\"_blank\" rel=\"noopener nofollow\">immediately<\/a>. Download the documents and keep them in encrypted storage.<\/p>\n<h2>Sensitive business documents<\/h2>\n<p>For many employees, document exchange is an integral part of business workflow. That said, some documents may be of value not only for your colleagues, but also for attackers.<\/p>\n<p>Take, for example, a financial report. Likely to be found in the accountant\u2019s mailbox, a financial report provides a wealth of powerful information \u2014 and an ideal starting point for BEC attacks. Instead of sending scattershot scam letters to colleagues, for example, cybercriminals with such information can directly use real info about specific contractors, accounts, and transaction sums to craft appealing subject lines. They can also obtain useful information about the company\u2019s business context, partners, and contractors so as to attack them as well. In some cases, careful study of a financial report may also present an opportunity for stock exchange manipulation.<\/p>\n<p>Therefore, it is important to delete sensitive information on receipt and never to exchange it unencrypted.<\/p>\n<h2>Personal data<\/h2>\n<p>Other people\u2019s personal data, such as resumes and CVs, application and registration documents, and so forth, can find their way into your mailbox, too. When people give your company permission to store and process their personal data, they expect you to keep that information safe and secure. Regulators expect that as well, especially in countries with strict PII laws.<\/p>\n<h2>How to secure yourself against a mailbox compromise<\/h2>\n<p>We recommend deleting any information that may be of interest to attackers \u2014 not only from your inbox but also from your Sent and Deleted folders. If your business requires you to send commercially sensitive information by e-mail, use encryption, which most e-mail clients for business support.<\/p>\n<p>Additionally, we recommend using two-factor authentication wherever possible. If you do, then even if an attacker compromises your mailbox, your other accounts won\u2019t end up in their hands.<\/p>\n<p>Store passwords and scanned documents\u00a0in specialized applications such as our Password Manager.<\/p>\n<p>Practice prevention by keeping your mailbox secure, carefully screening your incoming mail at the <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___\" target=\"_blank\" rel=\"noopener nofollow\">mail server<\/a> level and, as an additional layer of protection, using <a href=\"https:\/\/www.kaspersky.com\/small-business-security\/small-office-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener nofollow\">reliable security solutions<\/a> on corporate computers.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Getting e-mail through a Web interface may be convenient, but attackers are after corporate mailboxes, and one day they may visit yours.<\/p>\n","protected":false},"author":2598,"featured_media":43038,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[3521,19],"class_list":{"0":"post-43037","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-bec","10":"tag-email"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/sensitive-information-in-inbox\/43037\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/sensitive-information-in-inbox\/23502\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/sensitive-information-in-inbox\/26513\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/sensitive-information-in-inbox\/26091\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/sensitive-information-in-inbox\/10320\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/sensitive-information-in-inbox\/18209\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/sensitive-information-in-inbox\/18600\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/sensitive-information-in-inbox\/15590\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/sensitive-information-in-inbox\/27808\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/sensitive-information-in-inbox\/27890\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/email\/","name":"email"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/43037","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=43037"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/43037\/revisions"}],"predecessor-version":[{"id":43039,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/43037\/revisions\/43039"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/43038"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=43037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=43037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=43037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}