The constantly-evolving email encryption landscape is a tell-tale clue as to email’s vulnerability. Email service providers and encryption software makers must continually up their game because they know organisations use email to transmit their most sensitive content – a fact that makes a valuable high-priority target for cybercriminals. Sending a document via email is like writing it on the back of a postcard and popping it into the mailbox, for it to then be read by every single person who handles it on its journey to its destination. When you click “send” on an email it travels through firewalls, ISPs,…
Author: Scott Wilson
There are very few cyber security scandals that caught the headlines like the Sony Pictures Hack. Thousands of documents were stolen and displayed online, including emails and messages between executives. In the wake of the hacks, Sony’s management team sought a way to avoid the vulnerabilities of email that caused such great problems. The result was they turned to fax machines. While Sony might have been alone in the scale of the security attacks against them, they were not alone looking for ways to protect their data from hackers and thieves. With data protection becoming more and more important to businesses, and the vulnerabilities…