How can email security aid compliance?

Author:Spykerman, Mike

Several industry regulations exist that impose data security requirements on companies, such as HIPAA, Sarbanes-Oxley, as well as EU data protection regulations. These regulations require organisations to restrict employee access to sensitive customer and patient information and keep records private and secure. The Payment Card Industry Data Security Standard (PCI DSS), for instance, requires companies that process credit cards to ensure that credit card data is protected from exposure. Regardless of industry regulations, every company has the duty to keep private employee and customer information secure.

Email security plays an important role in meeting compliancy standards and keeping private information safe. Here are six ways in which your company can improve email security to safeguard confidential data;

  1. Boost Malware and Spear Phishing Protection

    According to the SANS Institute, 95% of enterprise data breaches start with a spear phishing attack. By effectively blocking malware and spear phishing attempts, exposure to data breaches can be greatly decreased. Because these attacks frequently utilise unknown threats or zero-day vulnerabilities, not all antivirus engines are able to detect the malware. By using multiple anti-malware engines to scan email attachments, along with email attachment sanitisation that can remove embedded threats that may be missed by antivirus engines, more threats can be detected and possible breaches avoided.

  2. Filter Email Content

    Configure filters that content check emails to ensure that they do not include any sensitive information that could be exposed. For instance by detecting and blocking emails with credit card data and social security numbers you can prevent confidential information being accidentally emailed and exposed.

  3. Add Company Email Footer

    EU regulations require companies to add a company footer to every email, containing the company address, registration number and owner information. By configuring your email security solution to...

To continue reading