Tips: Avoid E-Mail Disasters

Proofpoint offers tips for businesses and employees to protect from data loss mishaps.

E-mail Tips For Businesses

1. Select your filtering solution wisely. Insist on a gateway-based solution that's easy to use, highly accurate, quick to deploy and scalable.

2. Act fast to minimize loss. Implement effective processes will help identify, track and resolve any rogue emails through a variety of options including quarantine, deletion, and re-routing back to the original sender for clarification.

3. Focus on your data. Know the value as there are clear differences between a customer's private information and company sensitive content.

4. Encrypt. Businesses should ensure that they have an enforcement mechanism in place to prevent sensitive information falling into the wrong hands.

5. Review and Audit. Continually review the information leaving your organization and make sure it adheres to your outbound security policies. Educate users and continually assessing effectiveness of the policies, updating where necessary.

E-mail Tips For Employees

1. Expect to be unlucky. Don't rely on luck, take care to follow the company guidelines and do your best to be practical. If you are not sure about the value of information -- ask. It is always better safe than sorry.

2. Manage your e-mail accounts. A good rule of thumb for the average e-mail user is to keep a minimum of three email accounts. Your work account should be used exclusively for work-related conversations. Your second e-mail account should be used for personal conversations and contacts, and your third e-mail account should be used as a general catch-all for less secure interactions e.g. signing up for newsletters, entering online competitions etc.

3. Avoid fraudulent e-mail. Never respond to an e-mail stating that you've won the lottery. If it looks too good to be true, it probably is.

4. Insure your financial information via e-mail. Banks and online stores provide, almost without exception, a secured section on its Web site where you can input your personal and financial information. The companies do this precisely because e-mail, no matter how well protected, is more easily hacked than well secured sites. Using your credit card wisely insures you against theft and fraud.

5. Look at your policy. There's an old saying that it's better to seek forgiveness than permission. Not in the case of your employer's sensitive information. If in doubt, don't send it. Make sure you are up to date on your employer's e-mail policy, especially when it comes to sensitive or confidential documents.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3