Today, companies are confronted with an ever-increasing volume of electronic communication. Messages and files containing sensitive information need to be exchanged securely and conveniently around the globe.
Consumer platforms and apps, mostly financed through collection of data and advertising, steadily grow and extend their reach.
Meanwhile, organisations see themselves confronted with multiple challenges and threats: Criminals, competitors, and foreign governments want to get hold of their sensitive data.
Table of contents
In order to protect businesses and their clients, laws, regulations, and internal compliance standards must be adhered to. Examples include the Australian Privacy Principles (APPs) and The European EU Data Protection Directive 95/46/E that is expected to be replaced soon by the General Data Protection Regulation (GDPR). Aside from general regulations there are also topic- and industry-specific laws like the US Health Insurance Portability and Accountability Act (HIPAA) which ensures that patient data are handled in a secure way, or the Consumer Financial Protection Bureau (CFPB) which regulates the privacy of clients in industries like real estate. While these are only a few examples, they are part of an increasing trend that will include more laws and specific regulations to come.
Employees are used to the convenience of consumer grade technologies - tools that rarely comply with carefully established security standards and privacy regulations. Also, currently available technologies for encryption like S/MIME and PGP are often too complicated to install and use, and leave metadata vulnerable without solving the problem of exchanging large file attachments. The existing enterprise solutions that try to resolve these issues are generally complex and expensive.
Advantages of securing emails with Cryptshare
Email Pros and Cons
Click on the panels to learn more
Universally available but insecure and can't handle large files. Click on the following panels to learn more.
Email is the backbone of communication in most companies. Since it's established, effective, and paid for, it is unlikely to change . Large data stores for each user drive higher and higher costs, while established policies are often breached for the sake of convenience.
Unless supplemented by expensive and complex encryption email is not secure. Beyond enterprise boundaries, loss of confidential information in email is one of the most common security and compliance breaches.
Good governance demands better security than email alone can provide. Any data more sensitive than a simple message requires the protection of encryption.
Email's simplicity is both its strength and its weakness. There's a reason we all use it all the time. Its ubiquity, however, can gives us a false sense of security, especially, when we use it to transfer the wrong kind of information.
Complex and expensive and suited better to security between known senders and recipients encrypted email is very expensive to buy to install to administer and to run. Whilst the cost is high there is no doubt of the strength of security offered albeit with lost flexibility.
Encryption of emails and file attachments is end to end and so highly secure. By not helping the ad hoc transfers there is a risk of breach by use of removable media when this demand arises.
Because of the high cost, inflexibility and slow execution encrypted email is often not deployed in favor of greater flexibility. In particular the fact of needing a client to exchange files creates a significant weakness as real world needs extend into third party companies.
For the user inside the domain ecrypted email is simple to use once set up. However if the requirement is to exchange files or emails beyond the firewall things are not so easy. Furthermore first set up is very complex and time consuming.
Create your free account
You can test all the features of Cryptshare for Office 365 & Outlook,
Cryptshare for Notes and the Cryptshare web application.
About "Email Security"
While the use of email as we know it today has really taken off in the last 25 years or so, its underlying technology has been around for much longer....
The technology of quantum computing offers many new and unprecedented possibilities for what technology is capable of doing. While ‘regular’ digital...