7 Hot Advances In Email Security - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Government // Cybersecurity
News
8/18/2015
08:06 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail

7 Hot Advances In Email Security

Despite gaping security holes, email is too entrenched in business communications to go away. Consider these 7 ways to bolster email security and help IT admins sleep easier at night.
4 of 9

Self-Destructing Email

Google recently made headlines by releasing a new Chrome plugin that allows a Gmail user to set a time limit after which a sent email can't be read. The method used will encrypt messages sent using the Dmail plugin. Once the timer expires, or if the sender manually destroys the ability to read the email, the recipient no longer has the keys to decrypt the message, rendering it unreadable.

(Image: Geralt via Pixabay)

Self-Destructing Email

Google recently made headlines by releasing a new Chrome plugin that allows a Gmail user to set a time limit after which a sent email can't be read. The method used will encrypt messages sent using the Dmail plugin. Once the timer expires, or if the sender manually destroys the ability to read the email, the recipient no longer has the keys to decrypt the message, rendering it unreadable.

(Image: Geralt via Pixabay)

4 of 9
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
nomii
50%
50%
nomii,
User Rank: Ninja
8/20/2015 | 2:30:31 PM
Re: Encryption
"Sending sensitive information as encrypted attachments is an option...but just another example of hoops to jump through in order to achieve a secure method of [email protected]"

@Andrew i am sorry that i am not being able to understand your point. Can you please elaborate it for my understanding. thanks

Andrew Froehlich
50%
50%
Andrew Froehlich,
User Rank: Moderator
8/20/2015 | 1:37:58 AM
Re: Encryption
Sending sensitive information as encrypted attachments is an option...but just another example of hoops to jump through in order to achieve a secure method of communication.

And yes, I agree that encryption is the primary concern for most people.
nomii
50%
50%
nomii,
User Rank: Ninja
8/19/2015 | 10:03:21 AM
Re: Encryption

The security of email at individual level is very difficult to be ensured but it will be somewhat easier where a decision can be taken. In our organization where emails are being used to send something a bit sensitive, it is advised to send it as an attachment and first encrypt that document and then send it to other formation. But it is more applicable to formations within the organization. For outer organizations this security is a very hard thing to materialize and we need to find a viable solution which is still not available.

nomii
50%
50%
nomii,
User Rank: Ninja
8/19/2015 | 9:57:52 AM
Encryption

A good article indeed. I will personally be more interested in DNS authatication as well as Damil but still feel that encryption is the one of the best solution but masses do not take it seriously.

News
How to Create a Successful AI Program
Jessica Davis, Senior Editor, Enterprise Apps,  10/14/2020
News
Think Like a Chief Innovation Officer and Get Work Done
Joao-Pierre S. Ruth, Senior Writer,  10/13/2020
Slideshows
10 Trends Accelerating Edge Computing
Cynthia Harvey, Freelance Journalist, InformationWeek,  10/8/2020
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
[Special Report] Edge Computing: An IT Platform for the New Enterprise
Edge computing is poised to make a major splash within the next generation of corporate IT architectures. Here's what you need to know!
Slideshows
Flash Poll