THE PROBLEM
Unencrypted email is the most common source of exposed personal information
They can publish it publicly hitting your image or sell to your competitors loosing your competitive advantage
UNPROTECTED SENSITIVE DOCUMENTS
Large proportion email content and corporations’ and banks’ application-generated files, such as diverse payment statements, medical records, and flight schedules, are sent over not protected email. These documnets can be intercepted on the way or by hacking middle or end servers
LOST DEVICES
Email interception can occur when personally-owned unencrypted smartphones, tablets, laptops, USB sticks, mobile hard drives, etc. are lost or stolen in cafes, taxis, restaurants, or public transport. TrendMicro alone points out that 41% of data breaches are caused by lost and stolen devices
USER MISTAKES
Unencrypted content can be obtained by simple user mistakes. The type-ahead feature available in most email clients means that, eventually, an employee will inadvertently send an email to the wrong party. Employees mistakenly send over 130 emails per week to unintended recipients
But, most encryption is a painful and complex
Key management is a confusing, and a time consuming process for both sender and receiver, making difficult email encryption usage. Establishing and maintaining email encryption is not short process for both parties and requires receiver involvment