Login
LinkedIn1.png
VeilMail-Cloured_line.jpg
  • VeilMail Secure email Messaging

     UNDER THE VEIL 

    Privacy Matters!

     

VeilMail_No_Leaks_No_Trail_No_Fail_Communications_1.png
VeilMail_No_Leaks_No_Trail_No_Fail_Communications.png
VeilMail_No_Leaks_No_Trail_No_Fail_Communications_2.png

Secure, Business to Business Email

Posted by Greg Roake

23/07/14 12:24

Destruct means destruct - right?

You take a picture on SnapChat and send to a friend or two.  After a preset period the recipient/friend cannot view any more. Gone, deleted or self destructed is the claim.

WELL – not able to be accessed by the recipient is closer to the truth.  How are all these kids going to cope in 20 years time when all the risqué pictures they sent to their mates get released in image libraries for the rest of the world to use.

What goes into cyberspace is encapsulated there, and could turn up anywhere at any time. Beware!

How does this relate to my secure business to business communications?

Secure B2B Communications

Well the simple truth of the matter is the you have perhaps slightly more privacy and control over your sensitive business correspondence (especially but not only email) but not a whole more. Julian Assange blew a hole in the myth that emails are a secure form of messaging.

HAYLEY KAPLAN from http://what-is-privacy.com/ identified many of the the issues surrounding insecure emails in her blog “PRIVACY ISSUES WITH EMAIL”.

As Haley noted email danger comes in many forms.  It is easy to instantly share emails with many people, regardless of content or intended recipient. Email recipients may easily compromise email privacy when forwarding and deleted emails are often still accessible

Deleted content such as emails may be permanently “backed up” with other important information from the computer system and at home or on any hard drive, deleted emails may be retrieved and restored in various ways.  For example, on AOL, deleted mail goes into a “recently deleted mail” folder where it can be easily located, restored and then viewed.  There are software programs that easily recover deleted emails as well as other deleted items on a hard drive.
 
Emails, like the rest of the items on the Internet, are subject to unauthorised access from hackers.  For example, intelligent software can easily access email content via an unprotected router. Information hosted by a cloud provider may allow them access to your data because they are storing your data (Check the fine print).

Also as Hayley notes in some countries “your private email may be intentionally intercepted by a government or law enforcement agencies without a search warrant or judicial approval.
Just check out some of this legislation to see how far privacy  can be eroded

Its not always critical to havesecure, business to business email, but from time to time you need to be sure that confidential information will go directly to the right recipient. wher it can't be leaked and in the end DELETE actually means DELETE.

Of course there are those who believe that "if you have nothing to hide you have nothing to fear" I'm not one of them - share your views.

On occaisions where it it is critical for you to be protecting and securing email privacy, I would recommend check out this short video and visit VeilMail

Test Drive VeilMail  for Free CLICK HERE

Topics: Privacy Opinions, Business WISE

About this blog

There are times where privacy matters. Under the Veil explores the concept of PRIVACY - when and why it matters, and how to ensure that when privacy matters it does and that delete actually means delete.

Enjoy and do join the debate.

Spread the word - Privacy Matters!

    

Subscribe to Email Updates

Recent Posts

Test Drive VeilMail  for Free CLICK HERE