Book

Suggestions


Enter your email address:

Delivered by FeedBurner


Home Page

Bloglines

1906
CelebrateStadium
2006


OfficeZealot

Scobleizer

TechRepublic

AskWoody

SpyJournal












Subscribe here
Add to My Yahoo!
This page is powered by Blogger. Isn't yours?

Host your Web site with PureHost!


eXTReMe Tracker
  Web http://www.klippert.com



  Wednesday, December 16, 2009 – Permalink –

It's Policy

Set your own


It's best to make your email rules available and well known:


" Email is a quick, cheap and easy means of communication. This makes email a great business tool, but at the same time a potential threat for employers. Email threats such as confidentiality breaches, legal liability, lost productivity and damage to reputation cost companies millions of dollars each year.
How can a company protect itself from these threats? The first step in securing your company is to create an email usage policy. After you have created your email policy you must make sure it is actually implemented. This can be done by giving regular trainings and by monitoring employees' email using email security software. "

You may find it useful when trying to develop your own E-mail policy.

EmailRepies.com: Create an Email Policy

Business Link: Introduce an Email Policy




See all Topics

Labels: ,


<Doug Klippert@ 3:30 AM

Comments: Post a Comment


  Tuesday, June 09, 2009 – Permalink –

Netiquette - Etiquette

Why do you need email etiquette?


A company needs to implement etiquette rules for the following three reasons:
  • Professionalism: by using proper email language your company will convey a professional image.

  • Efficiency: emails that get to the point are much more effective than poorly worded emails.

  • Protection from liability: employee awareness of email risks will protect your company from costly law suits.
If you need to formulate a policy for your company, here are some suggestions:

32 of the most important email etiquette tips

Netiquette — Yale

Career Planning — About

E-mail Etiquette (Netiquette) — Chris Pirillo

Netiquette — Virginia Shea Spam Is Not the Worst of It

See all

Topics

Labels: , ,


<Doug Klippert@ 3:39 AM

Comments: Post a Comment


  Thursday, February 12, 2009 – Permalink –

Digitally Sign

Messages

If you have a need to protect the contents of your email messages, these links should point you in the right direction.


Outlook supports the following features for cryptographic messaging:
Digitally sign an e-mail message. Digital signing provides nonrepudiation and verification of contents (the message contains what the person sent, with no changes).

Encrypt an e-mail message. Encryption helps to ensure privacy by making the message unreadable to anyone other than the intended recipient.

There are additional features that can be configured for Outlook 2003 for security-enhanced messaging, if your organization chooses to provide support for them, including:

Sending an e-mail message with an S/MIME receipt request. This helps to verify that the recipient is validating your digital signature (the certificate you applied to a message).

Adding a security label to an e-mail message. Your organization can create a customized S/MIME V3 security policy which can add labels to messages. An S/MIME V3 security policy is code that you add to Outlook that runs automatically to add information to the message header about the sensitivity of the message content. For example, an Internal Use Only label might be applied to mail that should not be sent or forwarded outside of your company.



Overview of Cryptography in Outlook 2003


Free digital ids

Slipstick.com:
Encryption and Message Security Tools

TheTechGap.com:
Digital IDs in Outlook

Verisign:
Digital IDs




See all Topics

Labels: , ,


<Doug Klippert@ 3:06 AM

Comments: Post a Comment


  Sunday, June 10, 2007 – Permalink –

Spies in the Mailbox

Who'd read my mail?



"Espionage and email: as the Pentagon discovered, the two often go hand in hand. Following the arrests of two U.S. servicemen suspected of spying, the Pentagon is broadening its investigation of possible espionage activities at Guantanamo Bay, Cuba. According to CNN, at least one of the security cases has involved suspicious emails that were discovered as part of a routine monitoring process."



OutlookPower magazine has an article on the problem:

Espionage and email: tips for managing your own email archives
By Ann James

Also:
Who Owns Your Company's E-Mail?



See all Topics

Labels: ,


<Doug Klippert@ 6:44 AM

Comments: Post a Comment