Solved

The threats that uncontrolled email usage entails for a company

Posted on 2006-10-30
6
394 Views
Last Modified: 2010-04-11
Hi.

I have been tasked with writing a report on the potential threats that uncontrolled email usage entails for my company. I must admit this is not a strong point of mine, im more hardware orientated and I wondered if you could enlighten me on the issues that need to be examined. I am interested in all parties involved and not just technical issues but also legal, personal, ethical, and business competitive and profit related factors. A thorough google search has returned little useful information. Can you help please?

Thanks for your time
0
Comment
Question by:jimwaite
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
6 Comments
 
LVL 38

Accepted Solution

by:
younghv earned 125 total points
ID: 17833064
One of the things to consider is that any user on your network can create an 'In-box' rule to automatically forward a copy of every email message they receive to a third party outside your company.
Consider the impact of that - all the information that we tend to freely exchange with each other - now in the hands of a competitor.

If you have no limits on the 'size' of attachments, any user out there could be forwarding every document they have access to - again to an outside party.

Not only will this create security/proprietary problems, it may overwhelm your exchange server with just the quantity/size of traffic.
0
 
LVL 27

Assisted Solution

by:Tolomir
Tolomir earned 125 total points
ID: 18012709
If I want to export documents, I use the gmail webinterface.

It allows up to 10 MB of data in each draft. With 270 of these drafts created I would start another gmail account ;-) Quite usefull, so don't put the blame just on your mail server.

Educate your users and let them sign a contract.

It might be usefull to proxy all ingoing / outgoing data.

Best way would be to deny internet access on computers with important informations, but we are getting OT.
 
Tolomir
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 18108431
Jimwaite any update?
0
 
LVL 38

Expert Comment

by:younghv
ID: 18230499
Couldn't agree more.
:)
0

Featured Post

Are You Headed to Black Hat USA 2017?

Getting ready for Black Hat next week? Kick things off with the WatchGuard Badge Challenge and test your puzzle and cipher skills. Do you have what it takes to earn our limited edition Firebox Badge? Get started today - https://crimsonthorn.net

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
Make the most of your online learning experience.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses
Course of the Month5 days, 5 hours left to enroll

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question