{"id":10751,"date":"2024-10-15T15:38:10","date_gmt":"2024-10-15T13:38:10","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/en\/?p=10751"},"modified":"2024-10-15T15:38:15","modified_gmt":"2024-10-15T13:38:15","slug":"when-did-you-last-send-an-encrypted-email","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/en\/when-did-you-last-send-an-encrypted-email\/","title":{"rendered":"When did you last send an encrypted email?"},"content":{"rendered":"\n

The protection of sensitive email communication is of vital importance for companies. Or so you might think. However, email encryption is often perceived to be time-consuming and overly complex. Consequently, it is simply not used.<\/p>\n\n\n\n

The problem is known well enough. Sending an email via the Internet is analogous to sending a postcard. Anyone involved in the transmission process can read it without being noticed. Nevertheless, employees seldom encrypt their emails. It\u2019s too complex, too technical. End users often get hung up on the basics, let alone sparing a thought for private or public keys. On the admin side, the situation is hardly better. The effort required for implementation and management seems too huge. As a result, they simply forgo encryption. This situation is far from acceptable for companies. Only well-designed email encryption protects personal data and valuable company know-how, while safeguarding the confidentiality of a company\u2019s business communication.<\/p>\n\n\n\n

Uncomplicated email encryption \u2013 also for recipients lacking their own encryption solution<\/h2>\n\n\n\n

It is highly advisable to opt for a gateway-based encryption solution which runs automatically in the background. This enables employees to encrypt outbound emails directly in their email client, for instance by simply clicking on a lock symbol. Even if the recipient is not using their own encryption solution, a good encryption solution will make the email available via a secure webmail inbox.<\/p>\n\n\n\n

\"\"\n\t\t\t\n\t\t\t\t\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n

What\u2019s more, customer-specific rule sets can be used to specify that emails sent to a specific communication partner or domain should always be encrypted.<\/p>\n\n\n\n

High administrative effort is a deterrent<\/h2>\n\n\n\n

The high demands posed by email encryption often discourage IT departments. Among other things, certificates must always be kept up to date or assigned, for example when new employees are hired or leave the company. This implies taking into account both the regulations imposed by communication partners as well as the company’s own compliance requirements.<\/p>\n\n\n\n

Simplified administration thanks to automation<\/h2>\n\n\n\n

Synchronization with the company’s directory service (e.g., Retarus User Synchronization for Encryption) allows the admin to manage individual users, groups, keys, or certificates and policies independently. Based on these customer-specific rules, confidential messages \u2013 including all file attachments \u2013 are automatically encrypted. The service also facilitates the synchronization of S\/MIME and PGP keys. <\/p>\n\n\n\n

Uncomplicated key management<\/h2>\n\n\n\n

Administrators are notified immediately via email about the status of the synchronization and the keys which have been generated. In this way, IT managers retain full control over the keys used. In particular, large enterprises with many users, IT system houses, and distributors are able to reduce their manual workload and error rate significantly.<\/p>\n\n\n\n

Audit-ready archiving of encrypted emails<\/h2>\n\n\n\n

Business emails additionally need to be stored in an audit-ready, legally compliant manner. To ensure this, Retarus Email Encryption decrypts inbound emails centrally by way of a cloud platform, before they are encrypted again using a master archive key and stored away safely. This ensures that messages are also readable if the respective private key no longer exists at the time the message needs to be accessed.<\/p>\n\n\n\n

\"\"\n\t\t\t\n\t\t\t\t\n\t\t\t<\/svg>\n\t\t<\/button>
Ideally, emails are first decrypted centrally by the gateway, checked thoroughly for malware, phishing, and spoofing, and then stored in a secure archive in compliance with legal requirements.<\/figcaption><\/figure>\n\n\n\n

All-encompassing email protection from a single source<\/h2>\n\n\n\n

In addition to encryption, email security plays a critical role in safeguarding confidential data from unauthorized access and providing the best possible email communication protection. It\u2019s essential to check both inbound and outbound emails for malware, spam, and phishing. Ideally, companies should opt for a European provider who is not subject to the US Cloud Act and processes their data in redundant data centers located in Europe.<\/p>\n\n\n\n

\n

Checklist \u2013 What constitutes the ideal email encryption solution?<\/h2>\n\n\n\n