Email Encryption - Not an option, now a necessity - Clearswift

Email Encryption - Not an option, now a necessity - Clearswift Email Encryption - Not an option, now a necessity - Clearswift

clearswift.com
from clearswift.com More from this publisher
11.07.2015 Views

White paperEmail encryptionNot an option, now a necessity

White paper<strong>Email</strong> encryption<strong>Not</strong> <strong>an</strong> <strong>option</strong>, <strong>now</strong> a <strong>necessity</strong>


<strong>Email</strong> encryption<strong>Not</strong> <strong>an</strong> <strong>option</strong>, <strong>now</strong> a <strong>necessity</strong>Data breaches occur with frightening frequency to org<strong>an</strong>isations the world over. No one sets outto lose data, but as news of sensitive data leaks from public <strong>an</strong>d private sector org<strong>an</strong>isationsalike becomes <strong>an</strong> all-too-regular occurrence, it’s clear that something needs to ch<strong>an</strong>ge.2Another day, <strong>an</strong>other data breachEnsuring the safety <strong>an</strong>d security of <strong>an</strong> org<strong>an</strong>isation’s email<strong>an</strong>d web communications is <strong>now</strong> a crucial component of <strong>an</strong>yviable security strategy. Any such strategy should include:• Highly gr<strong>an</strong>ular, flexible web <strong>an</strong>d email policies• Automated encryption, eliminating the‘hum<strong>an</strong> error’ factor• Provision for the safe use of web 2.0technologiesA recent YouGov Trust Index poll conductedin the UK found that only 48% of respondentstrusted the public sector with their privatedata; 28% of those surveyed gave the publicsector a score of 3 or less (out of 7) when itcame to trust levels. Social networking <strong>an</strong>donline publishing sectors fare no better, as60% of respondents awarded these industriesa trust score of 3 or below. 1 At a time whenenterprises are under increasing pressure toadhere to the frequently competingdem<strong>an</strong>ds of compli<strong>an</strong>ce, tr<strong>an</strong>sparency,cost-effectiveness, privacy <strong>an</strong>dcollaboration, data loss incidents are ind<strong>an</strong>ger of undermining the reputations <strong>an</strong>dachievements of org<strong>an</strong>isations across all industries.No org<strong>an</strong>isation c<strong>an</strong> function without legitimately gathering<strong>an</strong>d using sensitive information about the individuals orcomp<strong>an</strong>ies they serve. Technology has made a signific<strong>an</strong>tcontribution to that process, but has also introduced newrisks. For example, the shared services model that has beenadopted by m<strong>an</strong>y public agencies around the world createschallenges, raising issues of appropriate access, secure dataexch<strong>an</strong>ge <strong>an</strong>d storage as agencies strive to offer secure,‘single view of the citizen’ service delivery. While thepublic sector bears the brunt of punitive data breach fines,the private sector is by no me<strong>an</strong>s immune to the problem ofdata leakage: in fact the private sector accounted for overa third of all reported data breaches in the UK betweenMarch 2011 <strong>an</strong>d February 2012.1 YouGov UK Trust Index 2011The evolving IT security st<strong>an</strong>dards l<strong>an</strong>dscapeAdherence to clearly defined IT security st<strong>an</strong>dards hasbecome the norm. While the specifics vary from region toregion, most share a common thread calling for proactivedata protection policies, positive enforcement, regular riskreviews, end-user education <strong>an</strong>d a capacity to demonstratethat such actions are being taken.The fact that email encryption should be <strong>an</strong>integral feature of <strong>an</strong>y DLP strategy is nolonger up for discussion. In m<strong>an</strong>y jurisdictions,personal data is required by law to beencrypted; for example:USA: Health Insur<strong>an</strong>ce Portability <strong>an</strong>dAccountability Act (HIPAA) – sets nationalst<strong>an</strong>dards for the security of electronicprotected health information. HIPAA m<strong>an</strong>datesthat all protected health information shouldbe encrypted on public networks <strong>an</strong>d digitallysigned. There are criminal penalties forviolations, with fines of up to $1.5m perincident. M<strong>an</strong>y US states, includingMassachusetts <strong>an</strong>d California, require thatpersonal data of all residents be encrypted,with the latter m<strong>an</strong>dating that all agenciesencrypt personal data on state-ownedportable devices.USA: Sarb<strong>an</strong>es Oxley Act (SOX) – the SOX is a US federal lawthat sets enh<strong>an</strong>ced st<strong>an</strong>dards for all US public comp<strong>an</strong>yboards, m<strong>an</strong>agement <strong>an</strong>d public accounting firms. The billwas established in 2002 in the wake of several high profilecorporate <strong>an</strong>d accounting sc<strong>an</strong>dals (think Enron <strong>an</strong>d TycoInternational) to restore public confidence in the nation’ssecurities markets.EU: Data Protection Directive – national governments in all25 member states have adapted the EU’s Data ProtectionDirective into their national laws. Spain <strong>an</strong>d Italy requirethe encryption of all sensitive data shared over publicnetworks; non-compli<strong>an</strong>ce is a criminal offence. Germ<strong>an</strong>ydoes not prescribe which security method to use, butbreach reporting is m<strong>an</strong>datory.


White paper <strong>Email</strong> encryption: <strong>Not</strong> <strong>an</strong> <strong>option</strong>, <strong>now</strong> a <strong>necessity</strong>“ A cursory gl<strong>an</strong>ce at some of themost recent inst<strong>an</strong>ces of data lossreveals a common thread: hum<strong>an</strong>error. If it’s a laptop stolen froma car, a CD accidentally thrownout with the rubbish or a mis-sentemail sending private informationto the wrong person”UK: Data Protection Act – the Information Commissioner(ICO) has the power to fine org<strong>an</strong>isations that breach theAct. The ICO has <strong>an</strong>nounced that data losses occurring‘where encryption software has not been used to protectthe data’ are likely to result in regulatory action against theorg<strong>an</strong>isation. The largest fine to date was issued to Brighton<strong>an</strong>d Sussex University Hospitals Trust in June 2012 followinga staff <strong>an</strong>d patient data breach: £325,000 for losing highlysensitive personal data.Global: Payment Card Industry Data Security St<strong>an</strong>dard (PCIDSS) – this comprehensive security st<strong>an</strong>dard was designed toenable org<strong>an</strong>isations to protect customer account data. Itapplies to <strong>an</strong>y org<strong>an</strong>isation, public or private, large or smallthat’s involved in the storing, processing or tr<strong>an</strong>smitting ofcardholder data.In addition to compli<strong>an</strong>ce initiatives, IT m<strong>an</strong>agers in thepublic sector are required to adhere to state-s<strong>an</strong>ctionedminimum security st<strong>an</strong>dards <strong>an</strong>d procedures, such as theUK’s Government Connect Secure Extr<strong>an</strong>et (GCSx) Code ofCompli<strong>an</strong>ce (CoCo) or Australia’s Government Information<strong>an</strong>d Communications Technology Security M<strong>an</strong>ual (ISM),which includes st<strong>an</strong>dards governing information securitym<strong>an</strong>agement, risk m<strong>an</strong>agement <strong>an</strong>d a code of practice.Australia’s move towards a nationwide e-Health initiativethat will see private health records made available onlineto authorised healthcare professionals is shining <strong>an</strong>increasingly strong spotlight on public data security <strong>an</strong>dpending legislation to introduce m<strong>an</strong>datory data breachnotification.The hum<strong>an</strong> factorSome problems c<strong>an</strong>’t be predicted. The reality, however, isthat most security breaches c<strong>an</strong>. A cursory gl<strong>an</strong>ce at someof the most recent inst<strong>an</strong>ces of data loss reveals a commonthread: hum<strong>an</strong> error. If it’s not USB sticks left in the pub,it’s a laptop stolen from a car, a CD accidentally thrown outwith the rubbish or a mis-sent email sending privateinformation to the wrong person (or people).Despite the presence of the kind of clear st<strong>an</strong>dards,procedures <strong>an</strong>d penalties outlined above, policies <strong>an</strong>dtechnologies c<strong>an</strong> only ever be as good as <strong>an</strong> org<strong>an</strong>isation’scapacity to follow through on them. Recent findings fromthe US Government Accountability Office (GAO) attributed a650% increase in security breach reports to the fact thatfederal agencies had not fully implemented theirinformation security programmes, me<strong>an</strong>ing they had‘limited assur<strong>an</strong>ce that controls are in place <strong>an</strong>d operatingas intended to protect their information resources.’According to the GAO, it has, over the past couple of years,made ‘hundreds of recommendations’ to agencies fornecessary action to resolve their information securitydeficiencies. In common with so m<strong>an</strong>y other org<strong>an</strong>isations,key weak spots were found to be inadequate training ofemployees with signific<strong>an</strong>t responsibilities, failure to ensurethat controls were monitored continuously <strong>an</strong>d failure toensure swift <strong>an</strong>d effective remediation of vulnerabilities.Automated encryption removes the ‘hum<strong>an</strong> error’ factor.<strong>Clearswift</strong>’s SECURE <strong>Email</strong> Gateway enables org<strong>an</strong>isations tocommunicate with confidence while protecting them fromthe risk of sensitive data loss. <strong>Encryption</strong> <strong>an</strong>d decryptionare performed automatically <strong>an</strong>d centrally, within flexiblepolicy parameters <strong>an</strong>d without the need for userinteraction, me<strong>an</strong>ing th<strong>an</strong> accidental encounters with the‘reply all’ button don’t have to end with a hefty fine.3


<strong>Email</strong> encryption: <strong>Not</strong> <strong>an</strong> <strong>option</strong>, <strong>now</strong> a <strong>necessity</strong>Security in the real worldLocking down or blocking data is no longer a real-worldsolution. Information needs to flow freely betweengovernment agencies, contracted service providers <strong>an</strong>dmembers of the public, <strong>an</strong>d between private enterprises<strong>an</strong>d their customers. Data loss prevention (DLP), web <strong>an</strong>demail gateways, flexible policies <strong>an</strong>d strong encryptionform a unified information security solution that, in t<strong>an</strong>demwith effective education <strong>an</strong>d m<strong>an</strong>agement policies, allowsusers to interact <strong>an</strong>d share information the way they needto without compromising on security. Ready-made orcustomisable policies that draw on <strong>an</strong> extensive collectionof m<strong>an</strong>aged lists, editable terms <strong>an</strong>d compli<strong>an</strong>cedictionaries, ensure that your data flows only in theintended direction.While m<strong>an</strong>y org<strong>an</strong>isations recognise the need to enablepervasive use of email <strong>an</strong>d other evolving communicationsch<strong>an</strong>nels, they’re also increasingly concerned about thesecurity risks arising from open communications.<strong>Clearswift</strong>’s SECURE <strong>Email</strong> Gateway provides <strong>an</strong> easy-to-useapproach to secure email communications. The highlygr<strong>an</strong>ular, flexible technology enables users to provide theprivacy, authenticity <strong>an</strong>d integrity of communications thatsecure messaging offers, but without the complexity <strong>an</strong>dhigh administration costs of other systems. The beauty ofencryption is that it allows the exch<strong>an</strong>ge of sensitive datawithout compromising on security. Even if data isintercepted, encryption makes it unreadable <strong>an</strong>d tamperproof.Running to st<strong>an</strong>d stillEvery org<strong>an</strong>isation has unique information securitychallenges. M<strong>an</strong>y perform under intense scrutiny from thepublic or other stakeholders while being expected to deliverhigh quality services in the face of often conflictingdem<strong>an</strong>ds. Information exch<strong>an</strong>ge plays a key role in the aimsof twenty-first century governments; without it,e-government strategies have little worth <strong>an</strong>d a ‘single viewof the citizen’ service is close to impossible. As governmentsthe world over ch<strong>an</strong>ge service delivery strategies in stepwith shifting economic <strong>an</strong>d political requirements, increaseduse of third-party providers brings additional risk. And theonus is increasingly on individual departments, localauthorities or agencies to ensure outsourced providers haveappropriate security measures in place.<strong>Encryption</strong> <strong>an</strong>d flexible web <strong>an</strong>d email policies c<strong>an</strong> enableorg<strong>an</strong>isations around the world to communicate securelywithout compromising communications or losing sight ofeconomic efficiencies. As org<strong>an</strong>isations face the increasedpressures of compli<strong>an</strong>ce <strong>an</strong>d best practice when it comes toprotecting sensitive private information, the time forchecking boxes <strong>an</strong>d hoping for the best has long passed. At atime when purse strings are tight, those charged withdelivering data security must increasingly look to solutionsthat unite technology with strong policies <strong>an</strong>d people,striking a bal<strong>an</strong>ce between compli<strong>an</strong>ce, risk <strong>an</strong>d real-worldworking requirements.If you’d like to k<strong>now</strong> more, contact your local <strong>Clearswift</strong> team:UKinfo@clearswift.com+44 (0)118 903 8903Jap<strong>an</strong>info.jp@clearswift.com+81 (3)5777 2248Australiainfo@clearswift.com.au+61 2 9424 1200Rest of Europeinfo.es@clearswift.com+34 91 790 1219Germ<strong>an</strong>yinfo@clearswift.de+49 (0)89 904 05 206United Statesinfo@us.clearswift.com+1 856 359 23604

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!