Cyber Security Series: Email Management

Dec 13 • Financial Planning, Life Planning • 531 Views • No Comments on Cyber Security Series: Email Management

How many emails do you get per day?  Is it your primary source of communication?  At KHC, we take the following stringent measures to secure our email and we encourage you to do the same.

*Encryption. There are multiple types of email encryption. We use email certificates, which provide users with a public key, shared with parties we communicate with through email. Then, a private key is used to decrypt emails that are sent. Additionally, we use Transport Layer Security (TLS) to encrypt connections between email servers.

You should also use a secure file-sharing software or system when emailing an attachment with sensitive data.  We use ShareFile when sending all documents with client data and all employees have a ShareFile link in the email signatures, giving you the option to encrypt files you send to us.

*Avoid web-based email platforms. At KHC, we use Microsoft Outlook for all email.  While it isn’t always feasible or cost-effective for private individuals, using a business grade software solution with proper security measures is a safer bet than web-based platforms.

*Disable images in Outlook. Did you know that graphics code in an Outlook email can propagate computer viruses? Simply opening an image can allow a hidden virus to execute and spread to your device and others.

*Password Protocols. At KHC, we require regular password resets, set minimum character requirements, and encourage hard-to-guess passphrases rather than passwords.   Ideally, these would include symbols and words that can’t be found in the dictionary.  We encourage our clients to do the same for their individual passwords.

*2FA – Also known as Two Factor Authentication (2FA), we encourage this extra layer of security with most software systems, but especially email. 2FA requires that those logging in use not only a username and password but another fact that only the user would know – such as a fingerprint, security token, or code sent to the user’s cell phone or other device.

If you have any questions or would like to discuss these topics further, please call us (913) 345-1881.

Source: Pendello Solutions

Related Posts

« »