Tag: security tips

04 Aug 2015

Top Tips, Keeping Corporate Email Secure

Data breaches, on the rise

Cyber criminals are doing everything they can to steal sensitive corporate and private personal data. As innovation drives Internet into every area of our lives, cyber criminals continue to find new ways to take advantage of its vulnerabilities. A perfect example is last year’s catastrophic breach at Sony Entertainment, an event which underscores how no company is safe from attack.

For highly regulated industries like financial and legal services, the consequences of a breach can be disastrous. Email security solutions like email encryption are now a crucial asset for industry professionals, representing an important line of defence as well as facilitating compliance.

Here are a couple of top tips that companies can put in place to keep their email communications secure:

  1. Don’t forget about internal threats
    Despite companies installing anti-spam, anti-malware, encryption and monitoring tools, there is still a chance that attacks can get through. That’s because cyber criminals exploit a company’s weakest asset – it’s people. Employees are the biggest threat to any organisation’s cyber security policy. According to Gartner, 84 per cent of high cost security incidents result from employees sending confidential data outside of the company. Despite this, only half of companies are implementing employee training schemes. Employee training is the most effective way of combatting employee negligence resulting in data loss.
  2. Back to basics
    Email security can be complicated, but it doesn’t need to be. Good email encryption solutions should make the process simple for both senders and recipients, while still keeping non-public personal information secure. Policy based email solutions remove the responsibility for security from individual employees by detecting specified keywords, attachments or number patterns like credit cards or National Insurance numbers.
  3. Plan ahead
    Most email security solutions have very basic requirements that companies need to have in place before implementation. Sometimes an element or two might be missing, such as an updated version of an operating system or applications or having TLS implemented on an email server. Having up-to-date systems guarantees a simple and smooth implementation of email encryption.
  4. Don’t forget about mobile
    Nearly everyone today carries a smartphone, whether their own personal device, a corporate issued device, or a personal device that employees are using for work purposes. However, mobile devices can easily be lost or compromised by hackers or malicious software. Malware that attacks mobile devices is becoming more sophisticated than ever before. BYOD policies need to account for these risks and should include safeguarding and tips for device management.
  5. Stay ahead of the curve
    With security breaches constantly hitting the headlines, companies need to stay ahead of the curve when it comes to new security threats and management techniques. It’s not just IT that needs to be aware of the changing security landscape – every employee has a duty of care to ensure that all communications with clients and suppliers are secure. Reading up on the ever evolving industry is an important first step to ensure end-to-end data security and compliance.

Whether or not your business is legally required to keep data in transit safe, sending email in the clear is simply no longer acceptable. Your customers expect their data to be handled securely and your employees need an encryption solution that works across all of their devices and is easy to use.

By Jacob Ginsberg, Senior Director of Products, Echoworx

02 Jan 2014

2013 In Review

As 2013 draws to a close, we are looking back at our posts and want to thank all of our bloggers for their contributions. Here are some of our most popular topics discussed over the last 12 months:

Our goal with future articles and posts is to educate, stimulate conversation, and create an online resource for email encryption and data encryption approaches. We encourage visitors to read the content and participate.

Happy New Year to all our bloggers and readers and we  look forward to bringing you new stories in 2014.

10 Dec 2013

Top Information Security Tips for 2014

As the end of the year approaches, it’s a good idea to review your information security practices and look at what can be improved. Here are our top information security tips for 2014.

1. Keep Your Emails Confidential as They Travel Across the Internet

Email is critical to business communications – it ranks behind only portable storage devices at the top of the most common data loss channel. Make sure your outgoing emails are protected from prying eyes.

2. Choose Strong Passwords

We all get lazy when it comes to passwords. Many of us use the same passwords for different sites and systems. Having one system compromised in this case leaves your other accounts vulnerable too, so it’s recommended that you use different passwords for each account.

A strong password is at least 10 characters with at least one capital letter, one special character (such as a exclamation point), and a number. And try not to use common phrases such as “eatmorechicken” or “putyourbestfootforward.”

A good example would be !Catchleftball!01. For more tips on passwords, view our previous post 5 Tips for Stronger Passwords.

3. Control Access to Your Computer

This may sound obvious but do not leave your computer/laptop unattended. When you do leave your machine, make sure it is password protected with a strong password.

The physical security of your machine is just as important as the technical security.

4. Update Your Computer Regularly

Update your computer regularly. Both Microsoft and Apple regularly release security updates for their respective operating systems. Make sure you are running these updates as they are released; waiting could leave your computer vulnerable.

5. Protect Sensitive Data in Motion and at Rest

Encryption technology is important for both data you care about at rest and in motion. Use simple to use and cost effective solutions to encrypt files on your hard drive. If emailing this confidential information, use email encryption solutions readily available on the market today.