?
Solved

sending an email attachment securely..

Posted on 2013-06-27
3
Medium Priority
?
491 Views
Last Modified: 2014-04-03
i can put a password on a file and send it by email. is that the best way to send secure info for business transactions?

if yes, what is the industry standard on how to communicate what the password is? that cant be clear-text either...
0
Comment
Question by:25112
3 Comments
 
LVL 4

Assisted Solution

by:TechOps07
TechOps07 earned 1000 total points
ID: 39282795
I would recommend downloading and installing 7-Zip. You can encrypt the file and put a password on the attachment as well.

Use 256bit on the encryption, that is what we use for our confidential files.
0
 
LVL 58

Accepted Solution

by:
McKnife earned 1000 total points
ID: 39283590
Google about The combination of the  terms pulic key ans private key.
0
 

Expert Comment

by:5itface
ID: 39976886
TechOps07,

How would I encrypt the file? How is that done? Once encrypted, how do I send it using 7-zip?
0

Featured Post

Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

2017 was a scary year for cyber security.  Hear what our security experts say that hackers have in store for us in 2018.
The article explains the process to deploy a Self-Service password reset portal I developed a few years ago. Hopefully, it will prove useful to someone.  Any comments, bug reports etc. are welcome...
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

601 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question