Posts

Email (is still) Like a Postcard

Postcard
With all of the advancement in email servers, services, and cloud solutions, fundamentally, email is still like a postcard.

When you mail a postcard, the postal service will make its best attempt to get it delivered in a reasonable period of time.  While most postcards make it, occasionally a few get lost in the mail.

And while your message from vacation, your short message to a friend, or a quick thank you makes its travels, everybody that touches the postcard along the way can read it. Not that everybody, or even anybody will, but they can.

For the type of messages we send on postcards, we do not really care about privacy. Our email messages, however, often contain personal, sensitive, or corporate data that we want or need to keep private.

It is relatively easy for hackers to capture corporate data from emails as it travels across the public Internet. It is also easy for the staff at your MSP or IT service firm to read or intercept messages.

Yes, when we deploy Google Apps and other services, we put technology in place such as policy-based TLS encryption that helps mitigate risks and forced SLL encryption.  Many on-premise email servers have these features active as well.

But for many businesses, this is not enough. Government and industry regulatory requirements, including HIPAA, PCI, and PII, affect nearly every business with employees, that accepts credit cards, or keeps a customer file. Financial firms and publicly traded firms also face regulatory requirements from the SEC, FINRA, and Sarbanes/Oxley.

To meet increasing demands for data privacy and protection, you need message level encryption for at least those employees that deal with sensitive or protected information. If your solution is difficult to use, or inconvenient for recipients, employees will look to circumvent the system or opt not to encrypt messages, customers and partners will complain, and your business will suffer.

When looking at email encryption solutions, evaluate solutions that require little or no user involvement, make it easy for recipients to read encrypted messages, and work well on mobile devices. The good news, is that these solutions are affordable and can be deployed based on need.


For more information, contact us about selecting the right email encryption solution for you and your business.


 

Webcasts

Email Security and Reliability

3T@3 Webcast Series: Tuesday, August 17th at 3:00 PM ET

Cyber attacks are up more than 400% over the past 18 months. More than two-thirds of all attacks begin with email. Most organizations have Sender Policy Framework (SPF) records to identify authorized IP addresses; Some use Domain Keys Identified Mail (DKIM) to validate email integrity. Very few use Domain Authentication Reporting & Conformance (DMARC) to prevent inbound attacks and ensure your email is trusted and delivered.

DMARC prevents business email compromises, spoofing, and phishing attacks. In addition to protecting you from inbound attacks, DMARC protects your domain’s reputation and helps ensure reliable email deliverability.

In this month’s 3T@3 Webcast, we explore the tenants of email security and will discuss how adding DMARC to your security profile protects your business. Our CEO, Allen Falcon, will be joined by Brian Westnedge of Red Sift. The team will present onDMARC as a DMARC-as-a-Service solution. More than half of all companies fail to complete their DMARC implementation projects. onDMARC ensures a successful deployment and on-going management of your email integrity.

Please join Allen and Brian to learn about risk, reputation, and reliability for your email communications.

View the Recording On-Demand:



Data Protection & Security

Email Security and Compliance

3T@3 Webcast Series: Tuesday, July 20th at 3:00 PM

79% of cyber attacks involve compromised identities; more than 80% of these start with an email.  Email security and compliance is not an option; basic protections are no longer enough. Beyond blocking spam, ransomware, and malware, you need to protect your business from phishing, business email compromise, and identity spoofing and theft.

Tiered email security protects against inbound threats, outbound risks, and identity misuse and theft.

In this month’s 3T@3 Webcast, we give an updated look at email security and compliance. Summarizing risks and trends, we dive into a tiered approach to ensuring your business, data, employees, and reputation are protected.  We also discuss emerging compliance requirements and steps you can take to ensure you operate within regulatory, industry, and policy expectations.

Please join Cumulus Global CEO Allen Falcon for this essential webcast.

View the recording on-demand.


Data Protection & Security