We share all types of information on a regular basis, rather it’s our own information or that of our clients; often we share that information via email. But how secure is our email?

According to a paper “Why Should You Encrypt Email and What Happens if You Don’t” by Symantec, “roughly 95% of the contents that flows through corporate email systems consists of file attachments, making email the primary method for sharing files in most organizations.” That could mean medical, insurance, financial or other Personal Identification Information (PII) being passed around at an alarming rate, in plain text.

Most large corporations use encryption software to secure files within their organization. Some industries have compliance requirements that set the level of encryption they must use. They protect the transmission of information within their organization as well as to outside recipients. But what about small businesses and individuals? You still need a secure way to transmit your personal and financial information safely.

We all know that emails can easily be intercepted and them being sent in clear text, this means they can easily be read by anyone who intercepts them. Often, we overestimate how secure our emails are. Afterall, we must use a password to retrieve our emails, so that means they’re secure, right?

But it’s more than just sending information via emails, we store personal and financial information in cloud-based software, such as Google Docs, Dropbox, Trello, and many others. Recently, the Naked Security by Sophos published an article entitled “Trello Exposed! Search Turns Up Huge Trove of Private Data”. The weakness identified was not in the Trello software, but rather that people were storing financial and personal information without taking proper precautions to secure the data. In this case, people set the Trello board to public, which allowed internet searches to find the information.

So, as an Individual, what can I do?  Say I need to send a payment authorization form. How can I protect my credit card information but still get this form submitted?  Here are some solutions to help that do not require additional software.

Encryption or Password Protection

Encryption or Password Protection

When sending a PDF file using Acrobat Reader or other versions:

  1. Open the file in Acrobat Reader or other version
  2. Choose “Tools” > “Protect.”
  3. Select encryptthe file with a password.
  4. Set password as desired. Click “OK” and then click “Save.”
  5. Email the encrypted file.
  6. Call or text the person receiving the encrypted file and give them the password. It will be case sensitive.

How about your Excel or Word files?  Those files types, as well as any of Office suite can easily be password protected. This is a great way to keep your information protected. Just make sure you remember the password!

  1. Open the file within the Excel.
  2. Choose “File” > “Info”.
  3. Choose “Protect Workbook”
  4. Select Encrypt with Password. The password is case sensitive and will be required every time the file is opened.
  5. Set a password as desired. Click “OK” and then click “Save”.

If you have an Office 365 subscription and want to use encryption, you will need to purchase an add-on to the standard subscription.  This add-on cost $2/month for each Office 365 user.

If you need a more secure solution for transmitting, Microsoft Outlook allow you to send encrypted emails. This option does require a Digital ID.  You can write and send these messages the same as any other messages, but they do require you to have a Digital ID and the recipients must have your Digital ID to view the message.

So first, you need a Digital ID. But what exactly is this Digital ID?

Digital IDs, also known as digital certificates, is a validate process to ensure your identity and help protect messages by giving a unique code to your messages, called a digital signature. This ensures that you are sending the message, not an imposer and that the contents have not been altered in transit.

To get your own digital ID and set it to be used with Outlook:

  1. Get a digital ID from a certifying authority. You will need to obtain a digital ID issued by an independent certification authority. There are two main authority for this GlobalSign or IdenTrust.
  2. Specify the digital ID to use by going into Outlook.
    1. “File” > “Options” > “Trust Center”.
    2. Under Microsoft Outlook Trust Center, click “Trust Center Settings”.
    3. Select E-mail Security > “Encrypted email” > “Settings”.
    4. Under Security Settings Preferences, click
    5. In the Security Settings Name box, enter a name.
    6. In the Cryptography Format list, click S/MIME. Depending on your certificate type, you can choose Exchange Security instead.
    7. Next to the Signing Certificate box, click to Choose and then select a certificate that is valid for digital signing.
    8. Select the Send these certificates with signed messages check box unless you’re be sending and receiving signed messages only within your organization.
  3. Add a recipient’s digital ID to your contacts:
    1. Open a message that is digitally signed as indicated in the message by the Signature icon.
    2. Right click the name in the From box, and then click Add to Outlook Contacts.
    3. If you already have an entry for this person, in the Duplicate Contact Detected dialog box, select Update information of selected Contact.
    4. On the Navigation bar, click People.
    5. On the Home tab, click List.
    6. Double-click the person’s name, and then on the Contact tab, click Certificates.

To encrypt a single message:

  1. In message that you are composing, click FileProperties.
  2. Click Security Settings, and then select the Encrypt message contents and attachmentscheck box.
  3. Compose your message, then click Send.

To encrypt all outgoing messages by default:

  1. On the File choose Options>Trust Center > Trust Center Settings.
  2. On the Email Securitytab, under Encrypted email, select the Encrypt contents and attachments for outgoing messages check box.
  3. To change additional settings, such as choosing a specific certificate to use, click Settings.

Within the Settings, you can also make it so the email can’t be forwarded. If you haven’t checked into the various options, you should see what you can lock down.

Techno Advantage hope that these tips and instructions help you with your security concerns, but if your small or medium sized business need a more advanced solution, reach out today to schedule a consultation with one of our trusted technicians.  Let us do a cyber security assessment of your current system and work with you to find the right solution to protect you and your clients.

The Top 10 Ways Hackers Get Around Your Firewall And Anti-Virus To Rob You Blind

Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” Don’t be their next victim! This report reveals the most common ways that hackers get in and how to protect yourself today.

Recent Blog Posts

What Is Data Recovery Objective?

What Is Data Recovery Objective?

What is Data Recovery? Simply put, it's important to know what data recovery is because it sets out the reasons and aims for recovering data that has been lost or damaged. In today's digital age, where information is incredibly valuable, losing important data can have...

read more

Get In Touch

Techno Advantage


Pin It on Pinterest

Share This