Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity

    Debunking Nine Myths About New-Gen Email Encryption

    By
    Chris Preimesberger
    -
    April 24, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Debunking Nine Myths About New-Gen Email Encryption

      1 - Debunking Nine Myths About New-Gen Email Encryption

      by Chris Preimesberger

      2Myth: Any Email Encryption Will Keep It Secure

      2 - Myth: Any Email Encryption Will Keep It Secure

      Not all email encryption solutions are created equal. For instance, Yahoo offers https for Yahoo users, which encrypts mail as it travels between the user’s Web browser and Yahoo servers. While this helps keep Yahoo users secure, any email sent outside the Yahoo ecosystem to email platforms such as Outlook, Office 365, Hotmail and Google is not encrypted. For any business that needs to maintain or comply with federal regulations that protect personal privacy, there’s still a need for heavy-duty email encryption options, such as Google Apps Email Encryption.

      3Myth: Laws Prevent Unauthorized People From Intercepting Email

      3 - Myth: Laws Prevent Unauthorized People From Intercepting Email

      Federal and state legislation outlaws the theft of electronic communication. Other laws exist to protect personal property, but that doesn’t mean people don’t lock their homes or cars. Laws don’t prevent anyone from breaking into your home or car, so why would they prevent hackers from intercepting your email and stealing valuable data? Security solutions, like anti-spam and antivirus, have become foundational for email hygiene for your enterprise. Email encryption also should be foundational.

      4Myth: Email Encryption Is Too Complex to Be Practical

      4 - Myth: Email Encryption Is Too Complex to Be Practical

      Historically, email encryption packages have required users to jump through hoops to encrypt and decrypt emails, and they have often been associated with slow, inefficient processes. To stay productive, employees avoided using email encryption and found other ways to communicate that can be more vulnerable. However, email encryption has evolved substantially in recent years. The more advanced email encryption systems allow employees to exchange encrypted emails the same way they would with conventional email workflow isn’t interrupted, and no extra steps or passwords are required for senders or recipients.

      5Myth: Email Encryption Is Hard to Use on Mobile Devices

      5 - Myth: Email Encryption Is Hard to Use on Mobile Devices

      Mobile users spend more time using email on their devices than any other mobile activity. Distorted layouts and cumbersome extra steps would diminish the benefits of email encryption and force users to find workarounds. To address the increasing demands of mobile users, email encryption solutions have integrated seamless navigation from desktop to mobile device that takes advantage of the user’s environment and removes extra steps.

      6Myth: Secure Read-Only Storage Is Safest Way to Share Sensitive Info

      6 - Myth: Secure Read-Only Storage Is Safest Way to Share Sensitive Info

      Many companies have secure eRoom or SharePoint sites where documents can be shared in read-only mode with other employees, boards of directors, auditors and investors. While this approach can work, it doesn’t support a dialogue if there is a discussion occurring about any of the materials. Often discussions about sensitive information start in personal email, which may violate compliance and security policies.

      7Myth: Email Cannot Be Intercepted in Transit

      7 - Myth: Email Cannot Be Intercepted in Transit

      Email messages can be stored on a number of public servers along the way to the recipient, so sensitive information can be intercepted and captured by anyone, anywhere along the way. Organizations that must comply with regulatory requirements for data privacy have additional risks and penalties if messages are not secured. The best way to ensure that emails are private and their sensitive data is protected is to use encryption that meets regulatory standards.

      8Myth: Email Encryption Is Expensive and Complex to Deploy

      8 - Myth: Email Encryption Is Expensive and Complex to Deploy

      Email encryption has evolved, and enterprises can access new-generation email encryption that is easy for senders, recipients and administrators. Email encryption through software-as-a-service (SaaS) architecture has simplified the process for specifying and deploying secure messaging solutions. New-generation email encryption can be easily integrated and deployed in hours, not days. For security managers, compliance managers and IT managers, many solutions also offer management consoles and dashboards to alleviate management headaches and improve processes.

      9Myth: Email Encryption Is Only for Firms With Compliance Requirements

      9 - Myth: Email Encryption Is Only for Firms With Compliance Requirements

      If you have sensitive data, then you should always encrypt it, whether there’s a legal obligation or not. Even though your company may not incur legal penalties, there could still be serious business and public relations ramifications. Whatever encryption option you choose, make sure it meets necessary corporate and regulatory requirements and that it works well for your organization.

      10Myth: Confidentiality Notices Keep Email Private

      10 - Myth: Confidentiality Notices Keep Email Private

      Boilerplate notices do nothing to protect confidentiality of the email message content and attachments. Email is often misaddressed, and wrong receivers have no obligation to respect the notice. And there is no chance hackers who intercept emails—whether they work for the National Security Agency or for a criminal organization—are going to respect a confidentiality notice. The surest way to protect the privacy of a message is to encrypt it.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×