Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»Separate email accounts
    Cyber Security Awareness Month Tip

    Separate email accounts

    By Gerald Johnson Jr.October 28, 20213 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    Using one email account for everything may be very convenient and easy, but it can increase your vulnerability. If that email is compromised, then all the accounts connected to it become vulnerable. It’s a good idea to have separate email accounts for different purposes. One suggestion is to start with four different email addresses.

    The first account can be your “spam” account. This account can be used for things requiring you to provide an email address, but there’s a good chance you’ll only have a single or a handful of interactions with that individual or organization. An example that comes to mind is a spy museum I went to with friends a few months ago. The museum asked for an email address so that we could keep track of our progress as we went through all the activities. So I gave them what I call my junk email address.

    Your work email address should be used for just work-related business. This email address should only be distributed to business contacts. Malicious actors target individual employees to gain access to a company’s systems and information. So if you are freely giving out your work email address and posting it everywhere, you may become a target for phishing campaigns and other social engineering tactics.

    The third email address can be used for social media accounts. This can be used to sign up for accounts and to recover access if needed. Having your social media separated from everything else helps isolate any incidents with your public profiles. This ensures that any compromises don’t bleed over to other aspects of your life, like your financial accounts.

    This leads us to the last email address. This email should be used for personal stuff like your utilities, banking, and all the critical correspondence you need to conduct everyday personal business. You want to ensure that this information can be kept away from other things that may not be as valuable. Some people consider going a step further and separating their banking accounts to a fifth email so that it is completely isolated from everything else.

    Separating these different aspects of your life to separate email addresses can help reduce your vulnerability. It can also help you manage all of the information you get daily. You can easily find the vital correspondence without having to sift through the noise of all the other emails sent your way. So if anything, it just helps organize your information while decreasing your risk.

    Lastly, we remind you to make sure that you use strong and unique passwords for each email account. This will ensure the security of your email accounts if one becomes compromised. Enable multi-factor authentication (MFA) if the option is available for those email accounts. This will further protect them in case of a password disclosure. For more information on creating strong passwords and enabling MFA, please reference our previous blog posts:

    • Creating A Strong Password
    • Multi-factor Authentication

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Cybersecurity Awareness Month Tip email Security Awareness
    Previous ArticleWhy you should not give in to scare tactics
    Next Article The Internet of Things (IoT)

    Related Posts

    10 Critical Network Pentest Findings IT Teams Overlook

    Password Reuse Epidemic: Nearly Half of User Logins Compromised

    Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d