The Risks of Unsecure Email Attachments

Posted by Gary Cooke on November 15 2016

Having spent most of my business career managing and designing corporate messaging systems and/or consulting with companies on messaging and archiving best practices, there is one common thread that’s persisted throughout that entire experience: people sharing data with others through unsecured attachments.

This practice has been happening since the first email systems were created for business and personal use, and those of us on the administrative side of messaging have tried different methods to secure data being shared internally or externally.  If you worked in a large corporation you had a network team that had the single function of protecting the company’s network infrastructure from the evildoers outside of the network. The messaging team was responsible for ensuring that all the emails were delivered to their intended recipients and that no harmful messages (virus, malware, scams or even pornography, in the old days) entered the sanctity of the corporate environment. If you worked in a small to medium company those two teams might be a single person. Yet the job description was the same: protect the company’s data.

In these endeavors, the major concern was then as it is now: Do we know what our employees are sharing and, more importantly, with whom they’re sharing?

Secure your data

Read More

Topics: file security, email, secure email attachment, network security, DRM, control over email

Straw to Brick to Stone: Don’t Get Caught Up in the Network Defense Race

Posted by Mark Chow on October 13 2016

When many people think about data security, they think about network and server security – firewalls, anti-virus, etc. In other words, they think about protection against external threats. Given the press attention paid to breaches caused by “hackers,” this is unsurprising. But external threats only make up less than half of what puts sensitive data, documents and files at risk. At its root, data security is a human error problem, and more often than not breaches and leaks stem from problems within a company’s own ranks.

Read More

Topics: file security, data breach, data leakage, eDRM,, network security, healthcare, EFSS

Free White Paper: 6 Essentials For 100% Secure Enterprise File Sharing

Subscribe To The Blog By Email

Blog Topics