Send Anonymous Email | Stealth Internet Rotating Header Image

September 23rd, 2008:

Managing the E-Mail Security Risk in Business Today

Companies should consider developing an encryption policy. This includes defining the information that should be encrypted and who has permission to send encrypted messages. Not every employee should have access to sending encrypted messages, and unauthorized encrypted e-mails should be treated as a potential security breach.

It’s a rare week when the news doesn’t include a report about a corporate data breach — putting personal, financial, or medical records at risk for theft. Often — all too often, say security experts — these breaches are caused by a lack of a solid email policy. Email has not just revolutionized the way we communicate, it has transformed the way we do business today. Along the way, it also added a significant layer of risk. An employee can now easily share confidential information with an unauthorized co-worker or friend. Former employees are often kept on an email circulation list long after they’ve left the company or continue to have access to their old work accounts months after leaving an organization. And then there are issues such as sending personal emails and forwarding jokes, which may not necessarily be risks but do put a drain on company resources.

However, despite the clear security risks, an Osterman Research survey found that 86% of companies do not have a tool in place to address email usage, a practice that, according to Avivah Litan, VP and distinguished analyst at Gartner, Inc., needs to be rectified. “Email accounts are often compromised.” She points out that email should not be used as a secondary channel (e.g., in addition to the web or a call center) to convey sensitive information such as example passwords or secret questions and answers used to log into an account.

There are three reasons a company should put an email policy in place, according to Litan:

  1. Email is a major attack vector for crooks. For example, it is used to spread malware across enterprise and individual PCs and to entice individuals to give credentials and other sensitive information away through phishing attacks.
  2. Email account credentials are often compromised (e.g., email user IDs and passwords).
  3. Email trails are valuable tools for investigators and can implicate a company or individual in legal or forensic investigations.

“Companies need to recognize that email should not be relied on to convey sensitive, timely and/or confidential information,” Litan says. “For example, banks can’t rely on email to send financial statements to customers since they may not trust or read it.”

Yet an alarming amount of risky email still gets sent. According to a survey commissioned by Proofpoint, Inc. and fielded by Forrester Consulting, one out of 10 outbound emails poses a risk for organizations, whether legal, financial, or regulatory. In addition, only half of the email that should be encrypted actually is.

Web and email security boxed up

BorderWare Technologies has introduced BorderWare Security Platform 8.0, describing it as the industry’s first security appliance to provide comprehensive email and Web security with anti-data leakage in a single, consolidated and correlated product and administrative interface.

“Until now, organisations globally were forced to purchase, deploy and manage disparate point products that exposed security gaps and increased complexity and operational costs,” says Shawn Eldridge, vice president of marketing and products for BorderWare.

“With BorderWare Security Platform 8.0, organizations can infinitely scale to correlate security across email and Web, consolidate administration and policy management, leverage data loss prevention across email and Web, and enable value-added features and functionalities based on each customer’s security and privacy needs and goals.”

Featuring data loss prevention (DLP) across multiple protocols, the company reports that the new BorderWare Security Platform 8.0 is specifically designed to prevent threats via a flexible and efficient approach for quickly integrating new and customer-selected security and privacy features, accommodating unlimited customer growth, and consolidating administration, reporting and policy management.

“Security breaches no longer appear in just one communication channel, but as sophisticated, blended threats across email and Web. Mid-market organizations are looking not only for DLP but also for proficient management capabilities,” notes Brian Burke, program director for IDC’s security products program.

It enables instant-on data loss prevention, encryption and content filtering with integrated threat prevention for viruses, spam, spyware, phishing, crimeware and malware attacks. Other features that can be individually enabled include email encryption or Web caching. The management console consolidates all email and Web features in a single interface, providing security operations of reporting, policy management, policy remediation, on-demand feature enablement and clustering. BorderWare Security Platform can be managed both remotely and locally.

T-Mobile G1 (HTC Dream) Features Integrated Push Gmail

When the Google Chrome web browser launched a short while ago, people found it strange that Google didn’t integrate more of its services into it. Clicking on email link directs you to your default email client rather than to Gmail, for example. Well, it seems that Google isn’t exactly taking the same approach with Android. There’s much more integration here.

As curious as this may sound, the integrated push Gmail application found within the T-Mobile G1, which you may know better as the Android-powered HTC Dream G1, is actually separate from the other email client. The push Gmail app is more powerful too, sending all other email services to a lesser and simpler app. Furthermore, there is no support for Outlook or Exchange at this point. You can only sync your contacts and appointments via Google’s services. In this way, you need a Google account.

Another integrated feature is Google Maps, which makes heavy use of the built-in GPS. You can use it to control a Street View compass simply be turning your phone. Accelerometers have become so commonplace, eh?