Today, companies are confronted with an ever-increasing volume of electronic communication. Messages and files containing sensitive information need to be exchanged securely and conveniently around the globe.
Consumer platforms and apps, mostly financed through collection of data and advertising, steadily grow and extend their reach.
Meanwhile, organisations see themselves confronted with multiple challenges and threats: Criminals, competitors, and foreign governments want to get hold of their sensitive data.
In order to protect businesses and their clients, laws, regulations, and internal compliance standards must be adhered to. Examples include the Australian Privacy Principles (APPs) and The European EU Data Protection Directive 95/46/E that is expected to be replaced soon by the General Data Protection Regulation (GDPR). Aside from general regulations there are also topic- and industry-specific laws like the US Health Insurance Portability and Accountability Act (HIPAA) which ensures that patient data are handled in a secure way, or the Consumer Financial Protection Bureau (CFPB) which regulates the privacy of clients in industries like real estate. While these are only a few examples, they are part of an increasing trend that will include more laws and specific regulations to come.
Employees are used to the convenience of consumer grade technologies - tools that rarely comply with carefully established security standards and privacy regulations. Also, currently available technologies for encryption like S/MIME and PGP are often too complicated to install and use, and leave metadata vulnerable without solving the problem of exchanging large file attachments. The existing enterprise solutions that try to resolve these issues are generally complex and expensive.
Advantages of email encryption with Cryptshare
Email Pros and Cons
Click on the panels to learn more
Universally available but insecure and can't handle large files. Click on the following panels to learn more.
Email is the backbone of communication in most companies. Since it's established, effective, and paid for, it is unlikely to change . Large data stores for each user drive higher and higher costs, while established policies are often breached for the sake of convenience.
Unless supplemented by expensive and complex encryption email is not secure. Beyond enterprise boundaries, loss of confidential information in email is one of the most common security and compliance breaches.
Good governance demands better security than email alone can provide. Any data more sensitive than a simple message requires the protection of encryption.
Email's simplicity is both its strength and its weakness. There's a reason we all use it all the time. Its ubiquity, however, can gives us a false sense of security, especially, when we use it to transfer the wrong kind of information.
Complex and expensive and suited better to security between known senders and recipients encrypted e-mail is very expensive to buy to install to administer and to run. Whilst the cost is high there is no doubt of the strength of security offered albeit with lost flexibility.
Encryption of e-mails and file attachments is end to end and so highly secure. By not helping the ad hoc transfers there is a risk of breach by use of removable media when this demand arises.
Because of the high cost, inflexibility and slow execution encrypted e-mail is often not deployed in favor of greater flexibility. In particular the fact of needing a client to exchange files creates a significant weakness as real world needs extend into third party companies.
For the user inside the domain ecrypted email is simple to use once set up. However if the requirement is to exchange files or e-mails beyond the firewall things are not so easy. Furthermore first set up is very complex and time consuming.
About "E-mail encryption"
Cryptshare users can now transfer passwords to their recipients in a new and very easy, quick convenient way via SMS message – from within their...
With midterm elections looming, the personal email accounts of politicians and their staffers are becoming hackers’ prime targets.