Sheryl wants to move her domain from her current web host. She doesn't need a website and just wants to keep her email. Can she do that? Leo says sure! She can even park it over at Google and use Gmail with her domain name. No need to pay a web host. Leo does that all the time with GMail and SoftLayer. Sheryl can just contact her current webhost and advise them that she's taking back her domain name, and then move it to Gmail.
If you've had your email account hacked, then it may be time to take further security measures to keep it from happening in the future. Here are some simple steps you can take right now to better secure your account:
- Change your account password
Robin is getting those emails that seem to be bounced from her own Yahoo email account. Leo says that's likely a "spoofed" return email address, but it's always wise to change the password just in case. She should use a password vault so it can generate long passwords which can't as easily be hacked. But Leo also says there's something fundamentally wrong with Yahoo's email security and Leo advises getting off it. Go with Gmail instead.
Leo says that Google Docs is great and it's secure, and he won't have to have a managed exchange server. But he can also subscribe to Microsoft Office 365 and avoid that as well. Google for work is just fine, and Gmail is a better email solution.
Bill has a Windows desktop and a MacBook Pro and he wants to sync them together with email. He uses POP3. Leo says to stop using that, and use IMAP instead. IMAP is the best way to go because it doesn't take his email off the server. POP3 downloads email and then deletes it from the server. So Bill should go with IMAP and then he can have a central location for all of his email that's accessible from any device.
Hank always gets unsolicited emails and he suspects that when those emails are opened, they send a confirmation of it being read. So he disconnects before reading to prevent that from happening. Leo says he never opens spam because he wants to discourage the practice. Spammers often put beacons in messages, which are actually links to invisible image files that are 1 pixel in size. Those images are actually on their servers, so when a message is opened and the image is loaded, it hits their servers.
Virginia needs a computer just for email and some internet. Leo recommends an iPad for that. But if she needs a keyboard and larger screen, then Leo recommends a Chromebook. These are ideal because they are very simple and secure. Acer's 15" Chromebook is just $349, and that's a great deal.
Margie has an iPad 2 with iOS 8.1. Now she's finding that she can't get Yahoo Mail. Leo says that there's an issue with iOS that corrupts the name of Yahoo Email. One way to fix that is to remove the account, and then add it back with the full email address.
Another option is to bypass the use of Apple Mail and use Yahoo's own app. She should also update to iOS 8.2.
Elizabeth got an email from her friend that included suspicious links, and she's wondering if his email account was spoofed. She looked in the header, but didn't see anything. How can she find out if it was spoofed? Leo says the tale is the CCs. They would only be able to put so many addresses in a field, and if they are using multiple fields, then she'll know the person has cracked the account. Yahoo has always had security issues. So the account has been hacked and there's all kinds of ways to do it. First thing to do is change the password, and make it a difficult one.
Steve was using Google to send email for film festivals, but Google has been cutting his messages short. Leo says that the original idea was to hide responses to messages, but it seems to have extended to longer form messages or emails with attachments. Leo says he could list the images as links within his email so that they can access those pictures online. Unfortunately, it's Google's sandbox and he has to play by their rules if he wants free email.