Reducing Email Threats



Similar documents
The MyMail Secure Solution

How To Protect Your From Being Hacked On A Pc Or Mac Or Ipa From Being Stolen On A Network (For A Free Download) On A Computer Or Ipo (For Free) On Your Pc Or Ipom (For An Ipo

The Case For Secure

4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.

Self-Encrypting Hard Disk Drives in the Data Center

Cryptshare for Outlook User Guide

Encryption Recipient Guidelines

Secure User Guide

Why you need secure

stacktools.io Services Device Account and Profile Information

User Guide. Version 3.0 April 2006

Is your data safe out there? -A white Paper on Online Security

Receiving Secure from Citi For External Customers and Business Partners

Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services

Secur User Guide

Hosted Managed by Specialists

XGENPLUS SECURITY FEATURES...

Database Backup and Recovery Guide

Guideline for Services

Encryption. How do I send my encryption key?

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Encryption User Guide

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Simplicity Itself. User Guide

1. How to Register Forgot Password Login to MailTrack Webmail Accessing MailTrack message Centre... 6

Secure Client Guide

Spam Filter Message Center. User Guide

If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) , option 1. Access Methods:

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

COSC 472 Network Security

DIGIPASS CertiID. Getting Started 3.1.0

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Health Insurance Portability and Accountability Act (HIPAA) Overview

Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

Policy Of Government of India

Privacy Policy Version 1.0, 1 st of May 2016

Configuring Notification for Business Glossary

SVA Backup Plus Features

PrivaSphere Gateway Certificate Authority (GW CA)

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

USING YOUR LOGIX HOSTED

Secure Frequently Asked Questions

eztechdirect Backup Service Features

Verizon Firewall. 1 Introduction. 2 Firewall Home Page

MailEnable Connector for Microsoft Outlook

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

EJGH Encryption User Tip Sheet of 8

WatchDox for Windows User Guide. Version 3.9.0

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

Oakland Family Services - Was Your Hacked?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

White Paper. BD Assurity Linc Software Security. Overview

Setting up Microsoft Office 365

No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution

Security Defined. A Security Audit of MyMail. Department of Information Technology Department of Physics Angelo State University

Online Backup Solution Features

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

BCSD WebMail Documentation

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Tips for Banking Online Safely

Data Security Incident Response Plan. [Insert Organization Name]

eprism Security Appliance 6.0 Release Notes What's New in 6.0

HOSTED EXCHANGE SERVICES & HOSTED SHAREPOINT SERVICES TERMS AND CONDITIONS

Encryption. For the latest version of this document please go to: v 1.0 May 16,2011 Audience: Staff

WatchDox for Windows. User Guide. Version 3.9.5

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA

Security Policy JUNE 1, SalesNOW. Security Policy v v

SERVICE LEVEL AGREEMENT

Service Schedule for Business Lite powered by Microsoft Office 365

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services

Purchase College Barracuda Anti-Spam Firewall User s Guide

Configuring, Customizing, and Troubleshooting Outlook Express

Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

HIPAA SECURITY AWARENESS

WEBSITE HOSTING SERVICES AGREEMENT. Effective Date: 1/1/2015

INTRODUCTION TO CRYPTOGRAPHY

In-House Vs. Hosted Security. 10 Reasons Why Your is More Secure in a Hosted Environment

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

Zimbra Connector for Microsoft Outlook User Guide ZCO 8.0

STATE OF HAWAI I INFORMATION PRIVACY AND SECURITY COUNCIL

TELSTRA BUSINESS MAIL MIGRATION GUIDE

Configuring your client to connect to your Exchange mailbox

What browsers can I use to view my mail?

SERVICE LEVEL AGREEMENT

Barracuda Spam Firewall User s Guide

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

Active Directory Self-Service FAQ

HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity

DIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD. Unify Data Management Platform 2012/2013 Software Build 5.15

Business Internet service from Bell User Guide

e- storage Mail Archive

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Transcription:

Reducing Email Threats MyMail Solves Common Privacy and Security Email Threats MyMail Technology, LLC 2009 West Beauregard Avenue San Angelo, TX 76901 (866) 949-8572 www.mymail.com March 2008

REDUCING EMAIL THREATS MyMail Solves Common Privacy and Security Email Threats The Most Common Email Threats... 2 MyMail s Secure Email Solution Reduces Common Email Privacy Threats... 2 MyMail's Secure Email Solution Eliminates Eavesdropping... 2 MyMail's Secure Email Solution Reduces Identity Theft... 2 MyMail s Secure Email Solution Eliminates Unauthorized Message Manipulation... 3 MyMail s Secure Email Solution Reduces (FEAR) False Emails Appearing Real... 3 MyMail s Secure Email Solution Overcomes Lack of Evidentiary Standing... 3 MyMail s Secure Email Solution Reduces Common Email Security Threats... MyMail s Secure Email Solution Stores Email Messages Redundantly... 3 MyMail s Solution Eliminates Inside Email Snooping and Theft... 3 The MyMail Secure Email Solution Does Not Retain Traditional Log Files... 4 1

The Most Common Email Threats There are several common threats that affect the personal, private and confidential nature of Email communications. Email Privacy Threats o Eavesdropping o Identity Theft o Loss of Privacy o Message Manipulation o False Emails Appearing Real Security Threats o Inside Snooping and Theft o Lack of Evidentiary Standing o Unauthorized Email Backups o Non-Deleted Messages o Log Files MyMail s Secure Email Solution Reduces Common Email Privacy Threats MyMail's Secure Email Solution Eliminates Eavesdropping Standard Email solutions send personal, private and confidential information and Email identities (usernames and passwords) through the internet in plain English for just about anyone to read. MyMail protects your privacy by using patented and patent-pending technologies to safely secure and transport Email messages. MyMail s technology takes plain English messages and transforms them into gibberish as they travel through the internet to a server running MyMail s Secure Email solution. On the MyMail server, messages are further encrypted and securely stored using security keys known only by the proper recipient. When you use MyMail, all your communications are safe, secure, and private. MyMail's Secure Email Solution Reduces Identity Theft MyMail reduces identity theft by using Secure Socket Protocol communication links, which ensures private communications by transforming Email credentials (username and password) and messages into gibberish as they travel across the internet, then further encrypting and securely storing Email messages using security keys known only by the intended Email recipient. Standard Email solutions do not provide the security to protect credentials or store Email, which makes it simple for hackers and snoopers to obtain credentials and use them to fraudulently access your Email account. Once hackers and snoopers steal your credentials they can read, download, delete and even send fraudulent Email. Further, Email messages sent through standard Email solutions can be read by just about anyone with a little computer knowledge because they travel across the Internet in plain English. MyMail maintains privacy in three ways: 1. Only a minimal amount of information is in plain English; all other information is securely encrypted and stored using security keys. MyMail Email can only be read by someone who knows the correct username and password. 2. Hides internet protocol (IP) addresses in message headers, which protects personal private information such as the city and state where you live information predators use to discover key personal information about you. 3. Encrypts all Email messages for storage and encrypts all messages for transmission. 2

You can use MyMail s WebMail interface or any Email client (such as Microsoft Outlook) to send and receive Email messages in full confidence MyMail protects your privacy and is safe and secure. MyMail s Secure Email Solution Eliminates Unauthorized Message Manipulation MyMail can be configured to eliminate administrative access to user s passwords, which prevents unauthorized access to mail messages and mail boxes. Further, since all Email messages are encrypted and securely stored using dynamic security keys, no message manipulation is possible. Any attempted modification of an encrypted Email message renders it unreadable since modification would result in a decrypted message of gibberish. With MyMail, the Email message sent is the Email message received. MyMail s Secure Email Solution Reduces (FEAR) False Emails Appearing Real It is easy to construct Email messages that appear to be sent by someone else. MyMail employs several proprietary and published techniques including Reverse DNS lookup, finger, and special credential validation to identify and validate the sender s Email address is real and the message is sent from a legitimate Email server and host. Further, MyMail ensures all messages sent through its servers contain valid MyMail header information to assure recipients the message they receive is the messages that was sent. MyMail s Secure Email Solution Overcomes Lack of Evidentiary Standing Because MyMail encrypts and securely stores every Email message using unique security keys specific to each user, no one else can forge or manipulate the contents of Email messages. This ensures message accuracy, which is necessary for contracts, business communications, electronic commerce, and medical-related communications. MyMail s Secure Email Solution Reduces Common Email Security Threats MyMail s Secure Email Solution Stores Email Messages Redundantly MyMail employs RAID 5 or RAID 6 disk arrays for redundant/fault tolerant Email message storage, which eliminates the need for archiving the Secure Email message files. By default, MyMail maintains a redundant/fault tolerant copy of the Secure Email storage on each Secure Email server rather than archiving data via some asynchronous mechanism. MyMail does this for the following reasons: 1. Archived data is not synchronized with current data. As a result, Email messages you believe are deleted can reappear, causing unexpected consequences; 2. Because MyMail supports the use of POP3 Email programs such as Microsoft Outlook or Mozilla Thunderbird, individual users can download their own Email messages to their personal computer systems and manage their own Email message archives. MyMail s Solution Eliminates Inside Email Snooping and Theft The majority of today s Email solutions allow system administrators complete access to your Email account and credentials (username and password), which allows them to read, edit and delete your Email messages without your knowledge. This unfettered access also allows system administrators to send Email messages as though they came from you. MyMail is configured to prevent unfettered access by system administrators. For instance, a system administrator cannot access your Email account by simply resetting and restoring your password. 3

MyMail provides several different configuration options, including password management. For security reasons, however, password management options are only configurable at system installation time. The password management configuration options allow system installers and administrators to configure their mail servers for various password management scenarios, which include: 1. The ability to allow a system administrator to set or reset individual passwords as they please; 2. The ability to reset an account password based upon a universal reset password; 3. The ability to prevent a system administrator to set, reset or recover user account passwords. Options 1 and 2 provide detailed audit trails for password changes made by system administrators. Option 3 provides the ultimate security by allowing only you to change your password; thereby eliminating a system administrator s ability to gain unauthorized access to your email messages. If at installation time the universal reset password is set and enabled, the system administrators is allowed to reset a user s Email account to the preset universal password, but they are not be able to restore the user s password back to its original password. This prevents a system administrator from accessing your account without your knowledge. In addition, MyMail tracks password reset and reactivation (with a new password) in two ways. First, by entering the password reset or reactivation dates and times into a secure table that each user can inspect. Second, by sending email notifications to the Email account holder and their secret designees notifying them of dates and times the user s Email account was reset and reactivated. These password and account access control mechanisms thwart threats of inside snooping that have cost many businesses millions of dollars. The MyMail Secure Email Solution Does Not Retain Traditional Log Files Traditional log files are text files written in plain English which are used to assist in diagnosing problems and spotting potential security breaches. However, they often contain various forms of information such as IP address, email addresses, and other potentially private and confidential information. To prevent such log files from becoming security breaches themselves, MyMail does not retain any log files for more than 72 hours, and those log files it does keep for the 72-hour period are kept securely with only the minimum amount of information necessary to perform standard diagnostic functions. 4