• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 398
  • Last Modified:

The threats that uncontrolled email usage entails for a company

Hi.

I have been tasked with writing a report on the potential threats that uncontrolled email usage entails for my company. I must admit this is not a strong point of mine, im more hardware orientated and I wondered if you could enlighten me on the issues that need to be examined. I am interested in all parties involved and not just technical issues but also legal, personal, ethical, and business competitive and profit related factors. A thorough google search has returned little useful information. Can you help please?

Thanks for your time
0
jimwaite
Asked:
jimwaite
  • 2
  • 2
2 Solutions
 
younghvCommented:
One of the things to consider is that any user on your network can create an 'In-box' rule to automatically forward a copy of every email message they receive to a third party outside your company.
Consider the impact of that - all the information that we tend to freely exchange with each other - now in the hands of a competitor.

If you have no limits on the 'size' of attachments, any user out there could be forwarding every document they have access to - again to an outside party.

Not only will this create security/proprietary problems, it may overwhelm your exchange server with just the quantity/size of traffic.
0
 
TolomirAdministratorCommented:
If I want to export documents, I use the gmail webinterface.

It allows up to 10 MB of data in each draft. With 270 of these drafts created I would start another gmail account ;-) Quite usefull, so don't put the blame just on your mail server.

Educate your users and let them sign a contract.

It might be usefull to proxy all ingoing / outgoing data.

Best way would be to deny internet access on computers with important informations, but we are getting OT.
 
Tolomir
0
 
TolomirAdministratorCommented:
Jimwaite any update?
0
 
younghvCommented:
Couldn't agree more.
:)
0

Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

  • 2
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now