4118186_sWhen you send something in the mail you expect for it to be viewed by the intended recipient’s eyes only, right?  Right.  For the most part, our important mail is sent in a sealed envelope to protect against unwanted observation.  But, what about our e-mail?

Unless properly encrypted, your e-mail messages could be left exposed for the world to see.

After a Google transparency report recently revealed which e-mail services and websites offer encryption, a growing number of e-mail providers are working to increase security by encrypting messages using Transport Layer Security or (TLS).  Google claims to have always supported encryption in transit, but this alone isn’t enough.  Both sides of an e-mail need to support encryption in order for it to work.

The Google report publicly lists popular sites and services, along with a percentage of messages that are encrypted when sending and receiving messages using them.  Basically, the report publicly shames those services that don’t offer encryption, while praising the ones that do.  Comcast was one of the worst offenders on the list with Google’s findings indicating that less than 1 percent of e-mails received by and sent from Comcast e-mail addresses getting the encryption treatment.

Facebook, Twitter, and Google, along with other big name companies, are actively calling out e-mail providers to make sure they are doing all they can to ensure the safe and secure delivery of messages.

To help you better understand whether your e-mails are protected by encryption click here to read the Transparency Report.  http://www.google.com/transparencyreport/saferemail/?hl=en

Techno Advantage is committed to sharing information and resources with our clients to help you maintain a secure, productive and successful business.

Let us know how we can help you.  Contact Us! 

 

The Top 10 Ways Hackers Get Around Your Firewall And Anti-Virus To Rob You Blind

Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” Don’t be their next victim! This report reveals the most common ways that hackers get in and how to protect yourself today.
 

Recent Blog Posts

Top 4 Data Backup Devices for Small Business

Top 4 Data Backup Devices for Small Business

You already know you need good, regular backups of all of your business data, but you may get stuck figuring out the best way to manage them. Fortunately, you don't need to spend a scary amount of money to buy and set up a reliable backup system.  Let’s look at a...

read more
IT Disaster Recovery Plan: A Simple Guide

IT Disaster Recovery Plan: A Simple Guide

Imagine this: your business is running smoothly, customers are happy, and everything seems to be on track. Then, out of nowhere, a disaster strikes—maybe it's a cyberattack, a natural disaster, or even a simple hardware failure. Suddenly, your IT systems are down, and...

read more

Get In Touch

 
Techno Advantage

317-857-0150

Pin It on Pinterest

Share This