The encryption of e-mail should be at the top of the budget requirements list for all CISO’s in 2017, but what is it we love and hate about e-mail, and what legacy systems can we get shot of?

Table of contents:

  1. Management summary
  2. External influences may force the issue
  3. Traditional e-mail encryption methods are no longer fit for purpose
  4. There are savings to be made
  5. The world of malware is changing fast making it harder to detect threats and making e-mail encryption a must have technology
  6. Understanding the motives of those seeking to steal your data helps you build better defences
  7. We are familiar with applications such as MS Office and e-mail that are powerful and help us do far more than almost any other tools in the workplace, but the addition of new and complex demands on your staff is creating files that are far too large for regular e-mail
  8. E-mail and the Internet have long been established as the leading medium for the exchange of business information
  9. It is time to get rid of FTP, SFTP and legacy PGP and S/MIME based solutions
  10. Sending files unencrypted over the Internet carries some special risks
  11. Direct economic damage
  12. Which may lead to damage to reputation and financial loss or fines
  13. EDP and GDPR legislation brings some stringent requirements for data transfer for all, specialised rules such as HIPPA set the bar higher for key services
  14. So what are the common attributes?
  15. This makes a good requirements list
  16. Conclusion

Consent to the use of data for sales & marketing purposes

By submitting this form, I agree that befine Solutions AG may use my data for sales and marketing purposes and contact me for these purposes by telephone, e-mail and/or post until I withdraw my consent. My data will not be passed on to uninvolved third parties.

I can revoke this consent to befine Solutions AG at any time, also in part, by e-mail to info@befine-solutions.com or by post to befine Solutions AG, Schwarzwaldstraße 151 in 79102 Freiburg, Germany.


Click here to read our complete Privacy Policy.