{"id":23064,"date":"2025-03-13T10:05:58","date_gmt":"2025-03-13T09:05:58","guid":{"rendered":"https:\/\/rosoft.si\/?p=23064"},"modified":"2025-03-17T10:36:48","modified_gmt":"2025-03-17T09:36:48","slug":"end-of-support-for-office-2016-and-2019-2","status":"publish","type":"post","link":"https:\/\/rosoft.si\/index.php\/2025\/03\/13\/end-of-support-for-office-2016-and-2019-2\/","title":{"rendered":"5 best practices for Email security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"23064\" class=\"elementor elementor-23064\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f337e07 e-flex e-con-boxed e-con e-parent\" data-id=\"1f337e07\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-650c28af elementor-widget elementor-widget-text-editor\" data-id=\"650c28af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"0\" data-end=\"30\"><span style=\"color: #000000;\"><strong data-start=\"0\" data-end=\"28\">1. Use a strong password<\/strong><\/span><\/p><p data-start=\"32\" data-end=\"146\"><span style=\"color: #000000;\">Your password is the first and most important layer of protection for your account. A strong password should be:<\/span><\/p><ul data-start=\"148\" data-end=\"454\"><li data-start=\"148\" data-end=\"197\"><span style=\"color: #000000;\"><strong data-start=\"150\" data-end=\"158\">Long<\/strong> (at least 12 characters recommended)<\/span><\/li><li data-start=\"198\" data-end=\"293\"><span style=\"color: #000000;\"><strong data-start=\"200\" data-end=\"211\">Complex<\/strong> (use a mix of uppercase and lowercase letters, numbers, and special characters)<\/span><\/li><li data-start=\"294\" data-end=\"358\"><span style=\"color: #000000;\"><strong data-start=\"296\" data-end=\"306\">Unique<\/strong> (never reuse passwords across different accounts)<\/span><\/li><li data-start=\"359\" data-end=\"454\"><span style=\"color: #000000;\"><strong data-start=\"361\" data-end=\"378\">Unpredictable<\/strong> (avoid simple words or personal information like your name or birth date)<\/span><\/li><\/ul><p data-start=\"456\" data-end=\"589\"><span style=\"color: #000000;\"><strong data-start=\"456\" data-end=\"464\">Tip:<\/strong> Consider using a password manager to generate and store strong passwords securely, so you don\u2019t have to remember them all.<\/span><\/p><hr data-start=\"591\" data-end=\"596\" \/><p data-start=\"598\" data-end=\"645\"><span style=\"color: #000000;\"><strong data-start=\"598\" data-end=\"643\">2. Enable two-factor authentication (2FA)<\/strong><\/span><\/p><p data-start=\"647\" data-end=\"783\"><span style=\"color: #000000;\">Two-factor authentication adds an extra layer of security by requiring a one-time code in addition to your password. This code can be:<\/span><\/p><ul data-start=\"785\" data-end=\"970\"><li data-start=\"785\" data-end=\"823\"><span style=\"color: #000000;\">An <strong data-start=\"790\" data-end=\"802\">SMS code<\/strong> sent to your phone<\/span><\/li><li data-start=\"824\" data-end=\"907\"><span style=\"color: #000000;\">A <strong data-start=\"828\" data-end=\"848\">verification app<\/strong>, such as Microsoft Authenticator or Google Authenticator<\/span><\/li><li data-start=\"908\" data-end=\"970\"><span style=\"color: #000000;\"><strong data-start=\"910\" data-end=\"928\">Biometric data<\/strong>, like fingerprint or facial recognition<\/span><\/li><\/ul><p data-start=\"972\" data-end=\"1113\"><span style=\"color: #000000;\"><strong data-start=\"972\" data-end=\"980\">Tip:<\/strong> Once you set up 2FA, your account security significantly increases, as hackers won\u2019t be able to access it with just your password.<\/span><\/p><hr data-start=\"1115\" data-end=\"1120\" \/><p data-start=\"1122\" data-end=\"1162\"><span style=\"color: #000000;\"><strong data-start=\"1122\" data-end=\"1160\">3. Watch out for suspicious Emails<\/strong><\/span><\/p><p data-start=\"1164\" data-end=\"1360\"><span style=\"color: #000000;\">Phishing attacks are one of the most common ways hackers gain access to your account. Attackers try to trick you into entering your credentials on fake websites or opening malicious attachments.<\/span><\/p><p data-start=\"1362\" data-end=\"1398\"><span style=\"color: #000000;\"><strong data-start=\"1362\" data-end=\"1396\">How to spot suspicious emails:<\/strong><\/span><\/p><ul data-start=\"1400\" data-end=\"1736\"><li data-start=\"1400\" data-end=\"1504\"><span style=\"color: #000000;\"><strong data-start=\"1402\" data-end=\"1422\">Check the sender<\/strong> (if the name seems slightly off or comes from an unknown address, be cautious).<\/span><\/li><li data-start=\"1505\" data-end=\"1589\"><span style=\"color: #000000;\"><strong data-start=\"1507\" data-end=\"1527\">Hover over links<\/strong> before clicking to see if they lead to an official website.<\/span><\/li><li data-start=\"1590\" data-end=\"1645\"><span style=\"color: #000000;\"><strong data-start=\"1592\" data-end=\"1621\">Avoid opening attachments<\/strong> from unknown senders.<\/span><\/li><li data-start=\"1646\" data-end=\"1736\"><span style=\"color: #000000;\"><strong data-start=\"1648\" data-end=\"1698\">Look for spelling mistakes and unusual wording<\/strong>, as these can be signs of phishing.<\/span><\/li><\/ul><hr data-start=\"1738\" data-end=\"1743\" \/><p data-start=\"1745\" data-end=\"1784\"><span style=\"color: #000000;\"><strong data-start=\"1745\" data-end=\"1782\">4. Change your password regularly<\/strong><\/span><\/p><p data-start=\"1786\" data-end=\"1912\"><span style=\"color: #000000;\">Regularly updating your password (every 3-6 months) reduces the risk of your account being compromised. To improve security:<\/span><\/p><ul data-start=\"1914\" data-end=\"2106\"><li data-start=\"1914\" data-end=\"1965\"><span style=\"color: #000000;\">Never reuse passwords across multiple accounts.<\/span><\/li><li data-start=\"1966\" data-end=\"2029\"><span style=\"color: #000000;\">Ensure every important account has its own unique password.<\/span><\/li><li data-start=\"2030\" data-end=\"2106\"><span style=\"color: #000000;\">Check your Outlook login history to monitor for any unauthorized access.<\/span><\/li><\/ul><p data-start=\"2108\" data-end=\"2205\"><span style=\"color: #000000;\"><strong data-start=\"2108\" data-end=\"2116\">Tip:<\/strong> When you change your password, review your 2FA settings and update all linked devices.<\/span><\/p><hr data-start=\"2207\" data-end=\"2212\" \/><p data-start=\"2214\" data-end=\"2249\"><span style=\"color: #000000;\"><strong data-start=\"2214\" data-end=\"2247\">5. Monitor your login history<\/strong><\/span><\/p><p data-start=\"2251\" data-end=\"2396\"><span style=\"color: #000000;\">Outlook allows you to track which devices have accessed your account. If you notice any unexpected logins, someone else may have gained access.<\/span><\/p><p data-start=\"2398\" data-end=\"2436\"><span style=\"color: #000000;\"><strong data-start=\"2398\" data-end=\"2434\">How to check your login history:<\/strong><\/span><\/p><ul data-start=\"2438\" data-end=\"2673\"><li data-start=\"2438\" data-end=\"2476\"><span style=\"color: #000000;\">Go to Outlook\u2019s security settings.<\/span><\/li><li data-start=\"2477\" data-end=\"2580\"><span style=\"color: #000000;\">Review the list of devices that have logged into your account (including date, time, and location).<\/span><\/li><li data-start=\"2581\" data-end=\"2673\"><span style=\"color: #000000;\">If anything looks suspicious, change your password immediately and report it to support.<\/span><\/li><\/ul><p data-start=\"2675\" data-end=\"2792\" data-is-last-node=\"\" data-is-only-node=\"\"><span style=\"color: #000000;\"><strong data-start=\"2675\" data-end=\"2683\">Tip:<\/strong> Regularly reviewing your login history helps you detect unusual activity early and keep your account secure.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>1. Use a strong password Your password is the first and most important layer of protection for your account. A strong password should be: Long (at least 12 characters recommended) Complex (use a mix of uppercase and lowercase letters, numbers, and special characters) Unique (never reuse passwords across different accounts) Unpredictable (avoid simple words or&#8230;<\/p>\n","protected":false},"author":1,"featured_media":23063,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19,18],"tags":[],"class_list":["post-23064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-novice_1","category-digital-technology"],"rttpg_featured_image_url":{"full":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409.webp",1024,576,false],"landscape":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409.webp",1024,576,false],"portraits":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409.webp",1024,576,false],"thumbnail":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409-150x150.webp",150,150,true],"medium":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409-300x169.webp",300,169,true],"large":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409.webp",640,360,false],"rsaddon-team-round-style":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409-500x500.webp",500,500,true],"1536x1536":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409.webp",1024,576,false],"2048x2048":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409.webp",1024,576,false],"trp-custom-language-flag":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409-18x10.webp",18,10,true],"braintech_portfolio-slider":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409-520x576.webp",520,576,true],"braintech_portfolio-full-slider":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409.webp",1024,576,false],"braintech_portfolios-slider":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409-1000x576.webp",1000,576,true],"braintech_blog-slider":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409-365x243.webp",365,243,true],"braintech_blog_long_height":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409-365x480.webp",365,480,true],"braintech_latest_blog_small":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409-255x157.webp",255,157,true],"braintech_latest_blog_medium":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409-340x270.webp",340,270,true],"braintech_image_slider_big":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409-860x450.webp",860,450,true],"braintech_blog-footer":["https:\/\/rosoft.si\/wp-content\/uploads\/3486789-0-26105900-1723679267-shutterstock_530331409-80x68.webp",80,68,true]},"rttpg_author":{"display_name":"admin","author_link":"https:\/\/rosoft.si\/author\/rosoft_admin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/rosoft.si\/index.php\/category\/novice_1\/\" rel=\"category tag\">Novice<\/a> <a href=\"https:\/\/rosoft.si\/index.php\/category\/digital-technology\/\" rel=\"category tag\">Digitalne tehnologije<\/a>","rttpg_excerpt":"1. Use a strong password Your password is the first and most important layer of protection for your account. A strong password should be: Long (at least 12 characters recommended) Complex (use a mix of uppercase and lowercase letters, numbers, and special characters) Unique (never reuse passwords across different accounts) Unpredictable (avoid simple words or...","_links":{"self":[{"href":"https:\/\/rosoft.si\/index.php\/wp-json\/wp\/v2\/posts\/23064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rosoft.si\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rosoft.si\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rosoft.si\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rosoft.si\/index.php\/wp-json\/wp\/v2\/comments?post=23064"}],"version-history":[{"count":9,"href":"https:\/\/rosoft.si\/index.php\/wp-json\/wp\/v2\/posts\/23064\/revisions"}],"predecessor-version":[{"id":23080,"href":"https:\/\/rosoft.si\/index.php\/wp-json\/wp\/v2\/posts\/23064\/revisions\/23080"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rosoft.si\/index.php\/wp-json\/wp\/v2\/media\/23063"}],"wp:attachment":[{"href":"https:\/\/rosoft.si\/index.php\/wp-json\/wp\/v2\/media?parent=23064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rosoft.si\/index.php\/wp-json\/wp\/v2\/categories?post=23064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rosoft.si\/index.php\/wp-json\/wp\/v2\/tags?post=23064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}