Introduction

Email continues to be the lifeblood of organizations. With changes to legislation and the increased attention on data breaches now is the time to revisit email solutions and policies to improve the security of the information that flows through organizations – both inbound and outbound.

While it has been commonplace to have antivirus scanning and anti-spam on the incoming email stream for many years, organizations are now improving security around outbound email, through the increased use of encryption and deployment of data loss prevention (DLP) solutions. The reason for this is two-fold; the first is understanding the benefits and differences of the myriad of options available. The second is around the cost and ease of use for the solutions. In the past, both encryption and DLP solutions have been notoriously difficult to configure and maintain, making them only options for larger organizations with specialist IT skills.

What Is Email Encryption?

Text

 

Email encryption is used to ensure that the contents of an email cannot be read or modified if it is intercepted. Email administrators know that the path of an email from sender to recipient will be processed by several different mail relays before it reaches its destination. This is why email encryption is paramount as people no control over security of these intermediate mail hops.

Encryption typically converts the information in an email from plain text to encrypted text. The text is then converted back to plain text when the recipient uses a private key to decipher the message. Each organization may have different levels of security, some may even require internal email is encrypted, but it is more common to encrypt content when it leaves an organization and sent to a third party.

The ideal place for encryption to occur is on the perimeter mail service, as the email enters or leaves the organization. Today’s email gateways, which protect against inbound threats, can also provide automatic encryption of outbound email and decryption of inbound email.

So, when should an email be encrypted? The answer depends on the email, but a lack of encryption means the email content can be read by anyone. An organization needs to encrypt its sensitive information to reduce risks of data loss. Data is valuable with trade secrets, intellectual property, and sensitive data (personal identifiable information and payment card information), and some have even considered data as a new currency.

The success of an email encryption project is based on the continued adoption by both sets of stakeholders. If it too complex to send a message securely – then the project has failed. If the recipient cannot receive and open the email to use the data – then again, the project has failed.

It must work for both senders and receivers for the deployment to be success.

Types of Email Encryption

The Secure Email Gateway (SEG) encryption options allow policies to be based on sender, recipient, subject content, message body, attachment types, attachment content, message header, or document metadata. SEG can detect information that shouldn’t be there. The data might be deliberately exfiltrated or someone could be sending out some content that may contain a hidden worksheet.

Securing the communications channel and securing the message itself are the essential categories of email encryption.

By providing multiple options to send data securely, organizations can choose the best method to deliver content to third parties in the most appropriate method. The following are various encryption methods used: 

 

Transport Layer Security (TLS)

TLS is built into every email service and is the equivalent of HTTPS for browsing. The email is sent from server to server via an “encrypted tunnel.” This is the absolute minimum level of email encryption that organizations should be using today.

This method relies on both the sending server and receiving server supporting the TLS protocol as an agreement where the sender is requesting a desired level of security. For example, if the sending server is configured to use the TLS 1.2 standard and the receiving server only supports the deprecated TLS 1.0 protocol, the sending server may not complete the connection due to a security concern.

Even though TLS usage is widespread and has been available for many years, there are renewed efforts to improve the security of TLS to avoid downgrade attacks and spoofing, including the new MTA-STS specification. This approach allows an organization to create a TLS policy which is published through DNS so that those who send to that organization are aware that they will be expected to communicate with TLS 1.2 or later and with valid TLS certificates.

Just to reiterate, this is purely covering server to server communications, and not sender to recipient communications.

Integrating Data Loss Prevention and Email Encryption

Image
Data loss prevention

For some information, even email encryption is not sufficient – this information needs to be kept within the organization at all times. For this, data loss prevention technologies need to be used to watch for restricted information crossing the egress points and automatically blocking it. A DLP solution enables an organization to inspect the content of an email and its attachments looking for specific information and then carrying out an action on the email should the information be found.

One simple use-case is to block any email leaving the organization that contains top secret content — which must not be sent out — but other policies may look for sensitive information such as credit card or bank information that needs to be shared with specific third parties. For example, external payroll services have information that must be sent, but sent securely using encryption. 

Protecting Web-Based Email

Text

For many organizations, when it comes to information security, there is now a need to consider web-based email as well as corporate email. Most organizations now require that employees use their work email for work and work alone – the result is that employees often have a personal email address for use with friends and for other social reasons. However, the rise of personal email has also resulted in a rise in corporate information risk, with employees
sending critical information to their home email accounts (often so they can work on the document at home). When looking at securing corporate information, this communication channel needs to be considered.

Summary

Text

Email continues to be a critical business tool for organizations big and small. Almost all an organization’s intellectual property and company confidential information will travel through email at some point in its lifecycle. This coupled with increased needs for collaboration, imposed legislation and cyberattacks on corporate information means organizations need to revisit their email security polices and solutions to protect their critical information. An increased emphasis on Information Governance, the understanding and protection of information, especially that which flows in and out of an organization, is driving all organizations regardless of size to look at technologies for securing email.

In the past secure email technology needed specialist skills to administer, but today even the smallest of organizations can readily encrypt their email and apply DLP policies without increasing management costs. The same security policies which are applied to corporate email can also be applied to web-based email by using combined web and email gateways, giving organizations the assurance, they need that their information is secured no matter which communication channel is used.

Furthermore, the increasing use of web-based collaboration tools and very large files means organizations need to look at secure file transfer technologies to enable the same policies that are applied to email to also be applied to files as they are moved between organizations or even departments.