Filter by Category

How to Solve 4 Common Email Security Challenges

Sending information to others via email has become one of the easiest and most ubiquitous ways of sharing data. However, there are some important caveats to sharing files this way, as explained by Bob Luebbe, Chief Architect of GoAnywhere, in a recent webinar on how to achieve ad-hoc file transfers using GoAnywhere Secure Mail.

The Challenges

There are four big challenges that companies need to be aware of when transmitting files using email.

  1. Email is sent "in the clear" meaning that it is not encrypted, therefore can potentially be read by anyone seeing the traffic being sent across an internal network or the Internet.
  2. Large files are most often not permitted by the email provider or the company email server. There is a good reason for this as disk space is very quickly consumed by unlimited use of email attachments and especially when "cc:" is used to send to multiple recipients.
  3. Some file types may not be permitted. The reason that some file types are restricted, especially on company email servers, is to protect additional attacks from virus and spyware programs that are disguised behind the .zip, .exe, or .dat file types.
  4. There are no good audit trails for the email transaction. Many companies are required under compliance regulations and other constraints to provide a detailed record of where their information is going, where it changed hands along the way, and whether it arrived at the intended destination. With email systems, this capability is either difficult to use or is non-existent.

Secure Options

Again, the most critical reason for not sending information via email is that it is not secured. This can be addressed in several ways including these four common encryption methods.

  1. PGP - Using OpenPGP to first encrypt the file before attaching it to an email can be used to send the file securely.  This does not encrypt the body content of the email itself, just the file that is attached. The recipient needs to create a Public Key and get it to the sender before sending the encrypted file as this key will be needed to decrypt the file. Of course, the recipient must also have Open PGP software and the training to create these kinds of electronic keys. Then the sender would need to install and encrypt the file using this specific recipient's Public Key. Finally, the recipient would need to decrypt the file with their corresponding Private Key. This method cannot be used to send files to multiple recipients. Most users do not have the knowledge to perform this kind of secure file exchange and will usually resort to finding other easier though non-secure methods.
  2. Zip - Compressing the file using some freely available zip software can be used to secure the file as long as it has encryption capabilities such as AES included. After the file is zipped and assigned a password, it can be attached to an email and sent. The password would need to be sent separately perhaps by phone call or another separate email. The recipient would also need to have software with the same encryption capability to decrypt and unzip the file. A downside of this method is many corporate email systems block .zip attachments for security reasons.
  3. S/MIME -This encryption method requires that both the sender and the recipient email systems support S/MIME communications. The sender will need to create a certificate and send it to the recipient. The recipient would then need to know how to import the certificate into their email client. Once the certificate is in place, a secured email can be sent, received and decrypted.
  4. Secure FTP - This method does not use email for sending the file but encrypts the file and sends it directly across a network or the Internet using secure file transfer protocols. The sender needs to have a secure FTP client installed and the recipient needs to have a Secure FTP server setup. The recipient needs to set up a user ID and password for the sender. The sender can then log in with their secure FTP client and transmit the file.

While each of these methods certainly allows the sender to assure that the file is secure, it doesn't address some of the other challenges of file types being blocked and audit trails being easily obtained. The inconvenience of using these methods prevents their widespread use and make users reliant upon experts to implement, which explains why much of the data flowing in and out of our network is still unsecured.

Solution

There are solutions available that combine the ease of using email together with the option to secure both the file and the text of the email. These solutions are generally referred to as secure mail or secure ad-hoc file transfer.

Secure email uses the common Outlook email client in the form of an add-on utility and/or web client using secure HTTPS protocols.  The sender simply creates the email using the email client with which they are already familiar, while the add-on feature provides a separate "Send" button that's designated for sending the file using secure methods. Done.

It's a very simple one-button solution. The recipient gets the email with a link that redirects them to an HTTPS-secured web page with the files available to download. There are no certificates, electronic keys, or additional software combinations required for the sender or the recipient. Any files remain on the sender's secured network and there are no file size limitations. A very detailed and easily accessible audit log is kept for every single secured email transaction.

As Bob Luebbe puts it in the webinar, "it's as easy as pie."

See for Yourself How Easy Secure Mail Is

 

Add a Comment

Allowed tags: <b><i><br>

Latest Posts


The Pros and Cons of Open Source Managed File Transfer Software

April 24, 2019

There comes a day for many companies when it’s time to implement a managed file transfer (MFT) solution. Perhaps there are new compliance requirements to meet, new relationships with third…


Will Brexit Impact Your Data Transfers?

April 23, 2019

The Current Situation: The United Kingdom and European Union have agreed on the text of the Brexit withdrawal agreement, but it will only get the go-ahead if the European Parliament and UK…


Which is Better: AS2 vs. SFTP?

April 15, 2019

Over the last several months, we’ve compared many different file transfer protocols, including SFTP vs. FTPS and SFTP vs. MFT, and MFT vs. Dropbox for secure file sharing. Today, we’re…


Who’s Leading the Managed File Transfer Data Quadrant?

April 4, 2019

For most IT professionals, finding credible, third-party evaluations is critical when researching new software solutions. You want the most comprehensive, honest information you can find to help you…


PGP vs. GPG: What's the Difference?

March 28, 2019

PGP, GPG, GnuPG, Open PGP. These terms file under the same category but refer to slightly different things. If you’re wondering what they mean or what the difference is between them, especially…