Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

The threats that uncontrolled email usage entails for a company

Posted on 2006-10-30
6
Medium Priority
?
397 Views
Last Modified: 2010-04-11
Hi.

I have been tasked with writing a report on the potential threats that uncontrolled email usage entails for my company. I must admit this is not a strong point of mine, im more hardware orientated and I wondered if you could enlighten me on the issues that need to be examined. I am interested in all parties involved and not just technical issues but also legal, personal, ethical, and business competitive and profit related factors. A thorough google search has returned little useful information. Can you help please?

Thanks for your time
0
Comment
Question by:jimwaite
  • 2
  • 2
6 Comments
 
LVL 38

Accepted Solution

by:
younghv earned 500 total points
ID: 17833064
One of the things to consider is that any user on your network can create an 'In-box' rule to automatically forward a copy of every email message they receive to a third party outside your company.
Consider the impact of that - all the information that we tend to freely exchange with each other - now in the hands of a competitor.

If you have no limits on the 'size' of attachments, any user out there could be forwarding every document they have access to - again to an outside party.

Not only will this create security/proprietary problems, it may overwhelm your exchange server with just the quantity/size of traffic.
0
 
LVL 27

Assisted Solution

by:Tolomir
Tolomir earned 500 total points
ID: 18012709
If I want to export documents, I use the gmail webinterface.

It allows up to 10 MB of data in each draft. With 270 of these drafts created I would start another gmail account ;-) Quite usefull, so don't put the blame just on your mail server.

Educate your users and let them sign a contract.

It might be usefull to proxy all ingoing / outgoing data.

Best way would be to deny internet access on computers with important informations, but we are getting OT.
 
Tolomir
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 18108431
Jimwaite any update?
0
 
LVL 38

Expert Comment

by:younghv
ID: 18230499
Couldn't agree more.
:)
0

Featured Post

[Webinar] Cloud Security

In this webinar you will learn:

-Why existing firewall and DMZ architectures are not suited for securing cloud applications
-How to make your enterprise “Cloud Ready”, and fix your aging DMZ architecture
-How to transform your enterprise and become a Cloud Enabler

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like me and like multiple layers of protection, read on!
Considering today’s continual security threats, which affect Information technology networks and systems worldwide, it is very important to practice basic security awareness. A normal system user can secure himself or herself by following these simp…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question