4118186_sWhen you send something in the mail you expect for it to be viewed by the intended recipient’s eyes only, right?  Right.  For the most part, our important mail is sent in a sealed envelope to protect against unwanted observation.  But, what about our e-mail?

Unless properly encrypted, your e-mail messages could be left exposed for the world to see.

After a Google transparency report recently revealed which e-mail services and websites offer encryption, a growing number of e-mail providers are working to increase security by encrypting messages using Transport Layer Security or (TLS).  Google claims to have always supported encryption in transit, but this alone isn’t enough.  Both sides of an e-mail need to support encryption in order for it to work.

The Google report publicly lists popular sites and services, along with a percentage of messages that are encrypted when sending and receiving messages using them.  Basically, the report publicly shames those services that don’t offer encryption, while praising the ones that do.  Comcast was one of the worst offenders on the list with Google’s findings indicating that less than 1 percent of e-mails received by and sent from Comcast e-mail addresses getting the encryption treatment.

Facebook, Twitter, and Google, along with other big name companies, are actively calling out e-mail providers to make sure they are doing all they can to ensure the safe and secure delivery of messages.

To help you better understand whether your e-mails are protected by encryption click here to read the Transparency Report.  http://www.google.com/transparencyreport/saferemail/?hl=en

Techno Advantage is committed to sharing information and resources with our clients to help you maintain a secure, productive and successful business.

Let us know how we can help you.  Contact Us! 

 

The Top 10 Ways Hackers Get Around Your Firewall And Anti-Virus To Rob You Blind

Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” Don’t be their next victim! This report reveals the most common ways that hackers get in and how to protect yourself today.
 

Recent Blog Posts

What is Multi-Factor Authentication (MFA)?

What is Multi-Factor Authentication (MFA)?

Setting up a new laptop recently, as I reinstalled all my software and logged into my various tools, my phone was going nuts sending me codes. These codes are the Multi-Factor Authentication in action! Real-Life Security Issues During this same time, a client suddenly...

read more

Get In Touch

 
Techno Advantage

317-857-0150

Pin It on Pinterest

Share This