{"id":737,"date":"2012-04-30T09:00:25","date_gmt":"2012-04-30T09:00:25","guid":{"rendered":"http:\/\/pingler.com\/blog\/?p=737"},"modified":"2014-08-20T11:03:04","modified_gmt":"2014-08-20T11:03:04","slug":"protect-your-email-account-and-privacy","status":"publish","type":"post","link":"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/","title":{"rendered":"Protect Your Email Account and Privacy"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-5953\" src=\"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2012\/04\/23863545_s-300x225.jpg\" alt=\"Password\" width=\"300\" height=\"225\" srcset=\"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2012\/04\/23863545_s-300x225.jpg 300w, https:\/\/pingler.com\/blog\/wp-content\/uploads\/2012\/04\/23863545_s.jpg 450w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>When conducting business or personal interaction on the internet, email is traditionally the primary form of communication. \u00a0As a result, gaining access to an individual&#8217;s email can be quite lucrative and you can bet that there are plenty of people out there just waiting \u2013 and maybe even actively trying \u2013 to gain access to your account and in the process, access to your banking information, sensitive personal data and personal correspondence. \u00a0There are plenty of reasons for somebody to break into your email, but there are no excuses for letting it happen. These tips will give you a better idea of what actions to take in order to protect your identity and email account.<\/p>\n<p><strong>Flavor Up Your Password<\/strong><\/p>\n<p>One of the easiest ways that email accounts are compromised is by users using a password that is easy to guess or similar to their email address. \u00a0Programs designed to break into email accounts through rapid password guessing can also break many easy to guess passwords in just a few seconds. \u00a0Protect yourself against this scenario by making sure that your password contains numbers, letters and even variations on capitalization. \u00a0It is also a good rule of thumb to never use the same password for your email and any other account; if that account is compromised, they may try the same password on your email account as well.<\/p>\n<p><strong>Use PGP Encryption<\/strong><\/p>\n<p>Whenever working with other businesses or individuals on certain tasks, it is a good idea to encrypt your emails so nobody else can read them. PGP encryption allows you to generate a key that is used to identify the person to which the email is being sent. Only that person \u2013 with their key and their own password \u2013 can open the email from you. Likewise, you must have your key and password to open any email from them. This prevents any sensitive information from being in limbo or vulnerable while in transit and also while stored on your email account.<\/p>\n<p><strong>Send Anonymous Emails<\/strong><\/p>\n<p>If you are needing to communicate with someone whom you would like to hide your email address from, then Pingler&#8217;s <a href=\"..\/..\/seo-tools\/anonymous-email\/\" data-wpel-link=\"internal\">Anonymous Email Tool<\/a> can be a lifesaver. Simply input the email address of the person you are sending it to, an email address from which it appears to come from, a subject and the content of the message. You can send an email to anyone without using your name or email address. We can easily think of many good reasons for using this tool and we&#8217;re sure you can, too.<\/p>\n<p><strong>Employ Common Sense<\/strong><\/p>\n<p>Finally, there are plenty of old school tactics that you can use to minimize the threat of someone invading your email. Never open an attachment from a source you do not recognize, never give out your email password and avoid giving out your email address to everybody. Many people keep two accounts: one for personal use and one for use with accounts and junk mail. Remember: the fewer people and entities that are aware of your email address, the fewer people who will potentially have access to it.<\/p>\n<p><i><html><br \/>\n\t<head><br \/>\n\t\t<title><\/title><br \/>\n\t<\/head><br \/>\n\t<body><\/p>\n<p style=\"text-align: center;\">\n\t\t\t<a href=\"http:\/\/www.pingler.com\/account\/register\/\" data-wpel-link=\"external\"><img decoding=\"async\" alt=\"\" src=\"http:\/\/www.pingler.com\/affiliates\/banners\/Pingler-468x60-01A.gif\" style=\"width: 468px; height: 60px;\" \/><\/a><\/p>\n<p>\t<\/body><br \/>\n<\/html><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When conducting business or personal interaction on the internet, email is traditionally the primary form of communication. \u00a0As a result, gaining access to an individual&#8217;s email can be quite lucrative and you can bet that there are plenty of people out there just waiting \u2013 and maybe even actively trying \u2013 to gain access to [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":5953,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,25],"tags":[242,239,240,241],"class_list":["post-737","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-plugins-and-tools","tag-anonymous-email-tool","tag-email-privacy","tag-email-protection","tag-password"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect Your Email Account and Privacy - Pingler Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Your Email Account and Privacy - Pingler Blog\" \/>\n<meta property=\"og:description\" content=\"When conducting business or personal interaction on the internet, email is traditionally the primary form of communication. \u00a0As a result, gaining access to an individual&#8217;s email can be quite lucrative and you can bet that there are plenty of people out there just waiting \u2013 and maybe even actively trying \u2013 to gain access to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"Pingler Blog\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/pinglerdotcom\" \/>\n<meta property=\"article:published_time\" content=\"2012-04-30T09:00:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-08-20T11:03:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2012\/04\/23863545_s.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"450\" \/>\n\t<meta property=\"og:image:height\" content=\"338\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pingler\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pingler\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/\"},\"author\":{\"name\":\"Pingler\",\"@id\":\"https:\/\/pingler.com\/blog\/#\/schema\/person\/4995c81e4dee73f9670af7fd1e1529b9\"},\"headline\":\"Protect Your Email Account and Privacy\",\"datePublished\":\"2012-04-30T09:00:25+00:00\",\"dateModified\":\"2014-08-20T11:03:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/\"},\"wordCount\":517,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/pingler.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2012\/04\/23863545_s.jpg\",\"keywords\":[\"Anonymous Email Tool\",\"Email Privacy\",\"Email Protection\",\"Password\"],\"articleSection\":[\"General\",\"Plugins and Tools\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/\",\"url\":\"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/\",\"name\":\"Protect Your Email Account and Privacy - Pingler Blog\",\"isPartOf\":{\"@id\":\"https:\/\/pingler.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2012\/04\/23863545_s.jpg\",\"datePublished\":\"2012-04-30T09:00:25+00:00\",\"dateModified\":\"2014-08-20T11:03:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/#primaryimage\",\"url\":\"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2012\/04\/23863545_s.jpg\",\"contentUrl\":\"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2012\/04\/23863545_s.jpg\",\"width\":450,\"height\":338},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/pingler.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect Your Email Account and Privacy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pingler.com\/blog\/#website\",\"url\":\"https:\/\/pingler.com\/blog\/\",\"name\":\"Pingler.com\",\"description\":\"Ping\",\"publisher\":{\"@id\":\"https:\/\/pingler.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pingler.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pingler.com\/blog\/#organization\",\"name\":\"Pingler.com\",\"url\":\"https:\/\/pingler.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pingler.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2024\/09\/pingler-logo.jpg\",\"contentUrl\":\"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2024\/09\/pingler-logo.jpg\",\"width\":300,\"height\":160,\"caption\":\"Pingler.com\"},\"image\":{\"@id\":\"https:\/\/pingler.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/facebook.com\/pinglerdotcom\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/pingler.com\/blog\/#\/schema\/person\/4995c81e4dee73f9670af7fd1e1529b9\",\"name\":\"Pingler\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pingler.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/db71def0321a21d7d90da93e8a25172df87a2673a1d70d32d64cc075558a9597?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/db71def0321a21d7d90da93e8a25172df87a2673a1d70d32d64cc075558a9597?s=96&d=mm&r=g\",\"caption\":\"Pingler\"},\"sameAs\":[\"http:\/\/www.pingler.com\"],\"url\":\"https:\/\/pingler.com\/blog\/author\/pingler\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect Your Email Account and Privacy - Pingler Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/","og_locale":"en_US","og_type":"article","og_title":"Protect Your Email Account and Privacy - Pingler Blog","og_description":"When conducting business or personal interaction on the internet, email is traditionally the primary form of communication. \u00a0As a result, gaining access to an individual&#8217;s email can be quite lucrative and you can bet that there are plenty of people out there just waiting \u2013 and maybe even actively trying \u2013 to gain access to [&hellip;]","og_url":"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/","og_site_name":"Pingler Blog","article_publisher":"http:\/\/facebook.com\/pinglerdotcom","article_published_time":"2012-04-30T09:00:25+00:00","article_modified_time":"2014-08-20T11:03:04+00:00","og_image":[{"width":450,"height":338,"url":"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2012\/04\/23863545_s.jpg","type":"image\/jpeg"}],"author":"Pingler","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pingler","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/#article","isPartOf":{"@id":"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/"},"author":{"name":"Pingler","@id":"https:\/\/pingler.com\/blog\/#\/schema\/person\/4995c81e4dee73f9670af7fd1e1529b9"},"headline":"Protect Your Email Account and Privacy","datePublished":"2012-04-30T09:00:25+00:00","dateModified":"2014-08-20T11:03:04+00:00","mainEntityOfPage":{"@id":"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/"},"wordCount":517,"commentCount":2,"publisher":{"@id":"https:\/\/pingler.com\/blog\/#organization"},"image":{"@id":"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2012\/04\/23863545_s.jpg","keywords":["Anonymous Email Tool","Email Privacy","Email Protection","Password"],"articleSection":["General","Plugins and Tools"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/","url":"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/","name":"Protect Your Email Account and Privacy - Pingler Blog","isPartOf":{"@id":"https:\/\/pingler.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/#primaryimage"},"image":{"@id":"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2012\/04\/23863545_s.jpg","datePublished":"2012-04-30T09:00:25+00:00","dateModified":"2014-08-20T11:03:04+00:00","breadcrumb":{"@id":"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/#primaryimage","url":"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2012\/04\/23863545_s.jpg","contentUrl":"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2012\/04\/23863545_s.jpg","width":450,"height":338},{"@type":"BreadcrumbList","@id":"https:\/\/pingler.com\/blog\/protect-your-email-account-and-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pingler.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Protect Your Email Account and Privacy"}]},{"@type":"WebSite","@id":"https:\/\/pingler.com\/blog\/#website","url":"https:\/\/pingler.com\/blog\/","name":"Pingler.com","description":"Ping","publisher":{"@id":"https:\/\/pingler.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pingler.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pingler.com\/blog\/#organization","name":"Pingler.com","url":"https:\/\/pingler.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pingler.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2024\/09\/pingler-logo.jpg","contentUrl":"https:\/\/pingler.com\/blog\/wp-content\/uploads\/2024\/09\/pingler-logo.jpg","width":300,"height":160,"caption":"Pingler.com"},"image":{"@id":"https:\/\/pingler.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/pinglerdotcom"]},{"@type":"Person","@id":"https:\/\/pingler.com\/blog\/#\/schema\/person\/4995c81e4dee73f9670af7fd1e1529b9","name":"Pingler","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pingler.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/db71def0321a21d7d90da93e8a25172df87a2673a1d70d32d64cc075558a9597?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db71def0321a21d7d90da93e8a25172df87a2673a1d70d32d64cc075558a9597?s=96&d=mm&r=g","caption":"Pingler"},"sameAs":["http:\/\/www.pingler.com"],"url":"https:\/\/pingler.com\/blog\/author\/pingler\/"}]}},"_links":{"self":[{"href":"https:\/\/pingler.com\/blog\/wp-json\/wp\/v2\/posts\/737","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pingler.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pingler.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pingler.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/pingler.com\/blog\/wp-json\/wp\/v2\/comments?post=737"}],"version-history":[{"count":4,"href":"https:\/\/pingler.com\/blog\/wp-json\/wp\/v2\/posts\/737\/revisions"}],"predecessor-version":[{"id":5955,"href":"https:\/\/pingler.com\/blog\/wp-json\/wp\/v2\/posts\/737\/revisions\/5955"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pingler.com\/blog\/wp-json\/wp\/v2\/media\/5953"}],"wp:attachment":[{"href":"https:\/\/pingler.com\/blog\/wp-json\/wp\/v2\/media?parent=737"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pingler.com\/blog\/wp-json\/wp\/v2\/categories?post=737"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pingler.com\/blog\/wp-json\/wp\/v2\/tags?post=737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}