{"id":13135,"date":"2017-04-29T09:36:45","date_gmt":"2017-04-29T09:36:45","guid":{"rendered":"https:\/\/digital-sentinel.com\/?p=13135"},"modified":"2017-10-01T10:33:06","modified_gmt":"2017-10-01T10:33:06","slug":"safe-send-sensitive-information-email","status":"publish","type":"post","link":"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/","title":{"rendered":"Is it safe to send sensitive information by email?"},"content":{"rendered":"

CIA director John Brennan said in October 2015 that he was \u201coutraged\u201d when a hacker broke into his personal email account but added the attack highlights how everyone\u2019s personal data is vulnerable on the internet.<\/p>\n

The information stolen included email contact addresses, his wife\u2019s pension identification number, and the Social Security numbers and personal information of US intelligence officials.<\/p>\n

Statistics provided by Hotspot Shield (an internet security company) reveal that around 150 billion emails are sent every day. Of these, each of us on average sends or receives 15 emails with attachments per day, i.e. 5,000 per year.<\/p>\n

Alarmingly, 62% of people lose files received as attachments and 53% of people surveyed recall receiving emails with sensitive data such as credit card information and social security numbers.<\/p>\n

What director John Brennan and a property management company in the Algarve, who contacted Safe Communities Algarve recently, have in common, however, is that they are concerned about the issue of email security.<\/p>\n

The property management company asked me a very important question: whether the use of email is a secure way for their clients to pass passport information to their company?<\/p>\n

This is a very good question because passing sensitive data affects virtually all of us. Secondly, it involves a much broader issue and that is, how do you send sensitive information from one side of the world to another with minimal risk that it will be intercepted and used for fraudulent purposes? Remember, most people who have had their email address book compromised is as a result of poor password settings or lack of email security.<\/p>\n

Before you send your credit card information or other sensitive information online, over the phone or by mail, it helps to think like a hacker.<\/p>\n

The risks : 60% of companies hacked<\/h3>\n

The reality is that 60% of companies have experienced a data breach of some kind in the last two years, many of which can be directly traced back to poor email security practices.<\/p>\n

So the next time you\u2019re about to share your credit card number, consider: where are the potential breach spots along the path your information will travel? What are the security loopholes, and how can you close them up so your information doesn\u2019t fall into the wrong hands?<\/p>\n

A number of internet security experts have thankfully considered these issues and the following highlights some of the common methods of sending credit card information, and their ratings concerning the security risk levels for the average consumer.<\/p>\n

Unsecured email \u2013 Risk level: High<\/h3>\n

Security experts unanimously agree a normal unencrypted email is a very unsecure<\/strong> way to send sensitive information. Emails can be hacked, spoofed and eavesdropped.<\/p>\n

Unsecured email offers criminals four points of exposure \u2013 your own computer, your email server, your recipient\u2019s email server, and your recipient\u2019s computer \u2013 making it one of the riskiest ways to send sensitive information.<\/p>\n

Even if you are submitting the message through a secure connection<\/strong>, if either computer is infected with a virus or other malware, it leaves the door open to hackers.<\/p>\n

\u201cThe designers of email didn\u2019t intend for it to provide confidentiality,\u201d said John Ackerly, CEO of Virtru, an email privacy company. \u201cIt\u2019s kind of like sending a postcard<\/strong>, as opposed to sending a sealed letter.<\/p>\n

Fax \u2013 Risk level: medium<\/h3>\n

The traditional method of sending information by fax is fairly secure. As long as both fax machines transmit and receive through the traditional method<\/strong> over telephone lines (as opposed to internet faxing), the process poses minimal privacy threat. \u201cIf someone was able to intercept the telephone line, all they would hear is the screechy noise<\/strong>\u201d \u2013 the one you hear when connecting to the internet by dial-up modem.<\/p>\n

A big risk enters when you can\u2019t be certain the intended recipient<\/strong> is the only one who will see the fax. If you\u2019re sending your credit card or other sensitive information, it is prudent to make sure that the recipient will be standing by the fax machine ready to receive it and immediately confirm its arrival. Also, make sure any confirmation printouts containing sensitive information \u2013 either on the sending or receiving end \u2013 are destroyed. This does not apply to personal fax users however.<\/p>\n

Postal mail \u2013 Risk level: medium<\/h3>\n

Although it is becoming less necessary to send information such as bank statements by post, on occasion an order form or a bill will require sensitive information to be sent. Unfortunately in these situations you seal up the envelope and hope for the best.<\/p>\n

There is a risk, however, that mail can simply become lost or stolen, so the risks are obviously there. Using couriers can reduce this risk, and this is now one of the preferred ways of sending credit cards worldwide.<\/p>\n

Secure websites \u2013 Risk level: medium<\/h3>\n

You\u2019ll know you\u2019re at a secure website because your web browser will display \u201chttps\u201d in the location or URL bar. Most web browsers feature a graphic lock you can click to examine the site\u2019s security certificate. Secure sites help ensure that the data you send will be encrypted.<\/p>\n

If sending sensitive information, consider using a document storage site such as Dropbox, or Oneshar.es, which allows you to send confidential information that self-destructs.<\/p>\n

The catch involved in using these sites again is \u201cweak endpoints\u201d, say some experts, which means you can be on the most secure site over a secure internet connection and still have someone literally watching your keystrokes via spyware. The answer? Keep your malware protection up to date and stay vigilant.<\/p>\n

Text message \u2013 Risk level \u2013 low (with additional protections)<\/h3>\n

It is hard for people to hack into text messages, but the risk to security involves their long life span; they exist on your phone until you delete them. If either the sender\u2019s or recipient\u2019s phone ends up in the wrong hands and the text message has not been deleted, it could pose a problem.<\/p>\n

New technologies can make text messages more secure. There are companies that have added encryption technology to text messages and also include a message self-destruct feature, so they don\u2019t stay permanently on the recipient\u2019s end.<\/p>\n

Encrypted email \u2013 Risk level: low<\/h3>\n

Although unsecured email is one of the worst ways to transmit sensitive information<\/strong>, you can eliminate a lot of risk by adding email encryption technology. Available options include Virtru and Infoencrypt. Any mail plug-in that utilises PGP (which stands for Pretty Good Privacy) will add a level of security by scrambling the information in transit until your intended recipient unlocks it with a security key. Some keys have an expiration time, providing additional protection.<\/p>\n

Since the revelations about data snooping by the National Security Agency, Google and Yahoo have begun encrypting emails by default, but if your recipient doesn\u2019t have encrypted email, your message is still vulnerable after it leaves the Gmail or Yahoo servers. In other words, security is only as good as the weakest link<\/strong>.<\/p>\n

Additional ways to beef up your security<\/h3>\n

Watch out for public Wi-Fi \u2013 connecting to the internet in a public hot spot, such as a coffee shop, leaves your computer and your information vulnerable to attack. Disable file sharing and use a virtual private network (VPN) if you can.<\/p>\n

You can send your credit card information in pieces. For example, send the number in one encrypted email; the expiration date in another; and your billing address in a third.<\/p>\n

If you\u2019re creating a paper trail by fax or mail, obscure some of the digits of your credit card number, and instruct the recipient to call for the remaining information.<\/p>\n

Be sure to keep your computer up to date on anti-virus software \u2013 and don\u2019t be shy about asking recipients what level of protection they have on their computers, too.<\/p>\n","protected":false},"excerpt":{"rendered":"

CIA director John Brennan said in October 2015 that he was \u201coutraged\u201d when […]<\/p>\n","protected":false},"author":3,"featured_media":13136,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[46],"tags":[47,50,51,49,48],"yoast_head":"\nIs it safe to send sensitive information by email? - Digital Sentinel<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is it safe to send sensitive information by email? - Digital Sentinel\" \/>\n<meta property=\"og:description\" content=\"CIA director John Brennan said in October 2015 that he was \u201coutraged\u201d when […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Sentinel\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-29T09:36:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-10-01T10:33:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/email_security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"728\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital-Sentinel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/digital-sentinel.com\/#organization\",\"name\":\"Digital Sentinel\",\"url\":\"https:\/\/digital-sentinel.com\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/digital-sentinel.com\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/Digital-Sentinel.gif\",\"contentUrl\":\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/Digital-Sentinel.gif\",\"width\":613,\"height\":224,\"caption\":\"Digital Sentinel\"},\"image\":{\"@id\":\"https:\/\/digital-sentinel.com\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/digital-sentinel.com\/#website\",\"url\":\"https:\/\/digital-sentinel.com\/\",\"name\":\"Digital Sentinel\",\"description\":\"Profit Protection Technology\",\"publisher\":{\"@id\":\"https:\/\/digital-sentinel.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/digital-sentinel.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/email_security.jpg\",\"contentUrl\":\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/email_security.jpg\",\"width\":728,\"height\":410},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#webpage\",\"url\":\"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/\",\"name\":\"Is it safe to send sensitive information by email? - Digital Sentinel\",\"isPartOf\":{\"@id\":\"https:\/\/digital-sentinel.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#primaryimage\"},\"datePublished\":\"2017-04-29T09:36:45+00:00\",\"dateModified\":\"2017-10-01T10:33:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/digital-sentinel.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is it safe to send sensitive information by email?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#webpage\"},\"author\":{\"@id\":\"https:\/\/digital-sentinel.com\/#\/schema\/person\/78a25f0a40a470633a45d6c98b60f0b2\"},\"headline\":\"Is it safe to send sensitive information by email?\",\"datePublished\":\"2017-04-29T09:36:45+00:00\",\"dateModified\":\"2017-10-01T10:33:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#webpage\"},\"wordCount\":1299,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/digital-sentinel.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/email_security.jpg\",\"keywords\":[\"email\",\"encryption\",\"fax\",\"pgp\",\"secure\"],\"articleSection\":[\"email\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/digital-sentinel.com\/#\/schema\/person\/78a25f0a40a470633a45d6c98b60f0b2\",\"name\":\"Digital-Sentinel\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/digital-sentinel.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/34ea0504bbaf2d4274b9488fb3281aa1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/34ea0504bbaf2d4274b9488fb3281aa1?s=96&d=mm&r=g\",\"caption\":\"Digital-Sentinel\"},\"url\":\"https:\/\/digital-sentinel.com\/author\/digital-sentinel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is it safe to send sensitive information by email? - Digital Sentinel","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/","og_locale":"en_US","og_type":"article","og_title":"Is it safe to send sensitive information by email? - Digital Sentinel","og_description":"CIA director John Brennan said in October 2015 that he was \u201coutraged\u201d when […]","og_url":"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/","og_site_name":"Digital Sentinel","article_published_time":"2017-04-29T09:36:45+00:00","article_modified_time":"2017-10-01T10:33:06+00:00","og_image":[{"width":728,"height":410,"url":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/email_security.jpg","type":"image\/jpeg"}],"twitter_card":"summary","twitter_misc":{"Written by":"Digital-Sentinel","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/digital-sentinel.com\/#organization","name":"Digital Sentinel","url":"https:\/\/digital-sentinel.com\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/digital-sentinel.com\/#logo","inLanguage":"en-US","url":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/Digital-Sentinel.gif","contentUrl":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/Digital-Sentinel.gif","width":613,"height":224,"caption":"Digital Sentinel"},"image":{"@id":"https:\/\/digital-sentinel.com\/#logo"}},{"@type":"WebSite","@id":"https:\/\/digital-sentinel.com\/#website","url":"https:\/\/digital-sentinel.com\/","name":"Digital Sentinel","description":"Profit Protection Technology","publisher":{"@id":"https:\/\/digital-sentinel.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digital-sentinel.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#primaryimage","inLanguage":"en-US","url":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/email_security.jpg","contentUrl":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/email_security.jpg","width":728,"height":410},{"@type":"WebPage","@id":"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#webpage","url":"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/","name":"Is it safe to send sensitive information by email? - Digital Sentinel","isPartOf":{"@id":"https:\/\/digital-sentinel.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#primaryimage"},"datePublished":"2017-04-29T09:36:45+00:00","dateModified":"2017-10-01T10:33:06+00:00","breadcrumb":{"@id":"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digital-sentinel.com\/"},{"@type":"ListItem","position":2,"name":"Is it safe to send sensitive information by email?"}]},{"@type":"Article","@id":"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#article","isPartOf":{"@id":"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#webpage"},"author":{"@id":"https:\/\/digital-sentinel.com\/#\/schema\/person\/78a25f0a40a470633a45d6c98b60f0b2"},"headline":"Is it safe to send sensitive information by email?","datePublished":"2017-04-29T09:36:45+00:00","dateModified":"2017-10-01T10:33:06+00:00","mainEntityOfPage":{"@id":"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#webpage"},"wordCount":1299,"commentCount":0,"publisher":{"@id":"https:\/\/digital-sentinel.com\/#organization"},"image":{"@id":"https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#primaryimage"},"thumbnailUrl":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/email_security.jpg","keywords":["email","encryption","fax","pgp","secure"],"articleSection":["email"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/digital-sentinel.com\/breach\/email\/safe-send-sensitive-information-email\/#respond"]}]},{"@type":"Person","@id":"https:\/\/digital-sentinel.com\/#\/schema\/person\/78a25f0a40a470633a45d6c98b60f0b2","name":"Digital-Sentinel","image":{"@type":"ImageObject","@id":"https:\/\/digital-sentinel.com\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/34ea0504bbaf2d4274b9488fb3281aa1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/34ea0504bbaf2d4274b9488fb3281aa1?s=96&d=mm&r=g","caption":"Digital-Sentinel"},"url":"https:\/\/digital-sentinel.com\/author\/digital-sentinel\/"}]}},"_links":{"self":[{"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/posts\/13135"}],"collection":[{"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/comments?post=13135"}],"version-history":[{"count":0,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/posts\/13135\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/media\/13136"}],"wp:attachment":[{"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/media?parent=13135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/categories?post=13135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/tags?post=13135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}