Solved

Securing Confidential Data Sent via E  Mail over the Internet

Posted on 2004-10-06
3
313 Views
Last Modified: 2013-12-04
Recently our company has advised us that we may no longer send E mails with attached files that contain confidential data over the Internet, because the data is not secure.

My job function involves sending confidential financial information to other companies, and I often E mail it.  I need to resolve this issue.

Before I talk with my IT department, I would like some suggestions for solutions that could be quickly and cost effectively implemented for our small group of 5 personnel.

0
Comment
Question by:jseverson
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 1

Expert Comment

by:ransoneb
ID: 12237212
There are a number of PGP addins that work very nicely, but you should also consider the S/MIME capabilities in Exchange and Outlook.

Go here and read up on PKI and CA. Your company might want to set this up for the entire company.

http://www.microsoft.com/technet/prodtechnol/exchange/2000/maintain/win2kms.mspx
0
 

Author Comment

by:jseverson
ID: 12238068
Lets assume that our IT department will not be able to implement anything for several months.  In the interim, I need to send E mails over the Internet  that are secure.  

1.  What off the shelf products can I purchase?

2.  Are there any settings in Outlook that I can change?
0
 
LVL 1

Accepted Solution

by:
ransoneb earned 500 total points
ID: 12240321
Outlook has some security features already.  

Open outlook and go to the tools menu.  
Select Options
Go to the Security Tab
choose to encrypt messages and/or add digital signitures, and/or request S/MIME reciepts.

At the least, encrypt
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question