SlideShare une entreprise Scribd logo
1  sur  28
Messaging: Protecting your
Data and your Reputation
Andrew Quinn & Nigel Robson
1/11/2013
Email and your Business
• Primary method of business
communications
• Stores critical business data
• One of the main sources of data leaks
• Your organisation’s identity
• Your electronic ambassador
Protecting your Identity
•
•
•
•

Your domain is your identity on the internet
People recognise this and trust it
Its important to protect this asset
It’s incredibly easy to fake!
Sender Spoofing Demo
Protecting your Identity:
Sender Policy Framework (SPF)
• Allows receiving mail servers to check
domain identity via public records (DNS)
• Addresses of authorised mail servers added
to public DNS records
• If an email comes from an unlisted address
it’s a fake
• SPF is free to set up
• Make sure you can list everything that sends
emails from your domain!
Protecting your Identity:
Sender Policy Framework (SPF)
Email is NOT Secure
• Email is NOT a secure communications
channel
• Emails can easily be intercepted, viewed,
altered and forwarded on
• Sensitive information should never be sent
via email unless security is enhanced
Email Capture Demo
Email is NOT Secure:
Transport Layer Security (TLS)

TLS Encryption
Email is NOT Secure:
Transport Layer Security (TLS)
• Secures messages in transit
• Newer email systems support basic
functionality out of the box
• Some organisations will not do business
with you without it
• Can be configured for “best efforts” or
guaranteed security
A Familiar Story?
Mobile Device Management (MDM)
• Majority of organisations allow employees to
access corporate email from mobile devices
• Emails contain sensitive data, which is stored
in memory, and usually not encrypted
• What happens if that device is lost or stolen?
• Approx. 300 mobiles stolen in London per
day
• Approx. 20,000 UK mobiles lost or stolen per
day
Mobile Device Management (MDM)
• MDM allows corporate devices to be
managed centrally
• Policies can be applied to all devices
independent of make and model
• Devices can be forced to be encrypted
• Devices can be remote wiped if required
• Microsoft Exchange provides basic MDM via
ActiveSync but more granular control can be
provided by other products
Journaling & Archiving
• Two phrases which are often mixed up
• Serve different purposes
• Archiving – moving data to alternate
storage for long term retention
• Journaling – keeping a separate,
immutable copy of messages sent &
received
Journaling & Archiving
Why Archive?
•
•
•
•

Reduce storage costs
Improve scalability
Provide longer-term storage to users
Eliminate a reliance on PST files
Why Journal?
•
•
•
•

Compliance with retention policies
Provide an electronic paper trail
Prove what was said / agreed
Information cannot be lost when people
leave
Journaling Considerations
• If the email is modified in order to copy it
(e.g. silently add BCC address), it may not
stand up in court
• If end-users can access the “journal”, it is
an “archive”
• Access to journaled messages should be
audited
Data Loss Prevention
• Email is one of the largest sources of data
leaks
• Data leaks are usually accidental
• Once an email is sent, you can’t get it
back!
Data Loss Prevention
• Technology to manage the exposure of information
is built into the Microsoft platform
– Windows
– MS Office (Word, Excel, PowerPoint, Outlook,…)
– Exchange Server

• Lots of acronyms…
–
–
–
–
–

Rights Management Services (RMS)
Information Rights Management (IRM)
Message Classification
File Classification Infrastructure (FCI)
Data Loss Prevention (DLP)
Data Loss Prevention
• Add Classification
– Provides information
– Can be used for file
system security

• Apply Rights
Management
– Restricts data usage
even when you have
access

• Process can be
automated
Data Loss Prevention
Rights Management...
Classification...
So what does this do for us?

This is confidential.
Don’t distribute it!

Recipient blocks
Exchangecan't sending
Outlook warns open
blocks
Data Loss Prevention Demo
Branding
•
•
•
•

Present a consistent corporate image
Provide contact details
Support marketing campaigns
Comply with legal requirements
Signature Management

Andrew Quinn - Executive Consultant: Infrastructure Technology
Office: 0845 094 094 5 | Mobile: 07710 374895 | Website: www.waterstons.com

Waterstons Limited. Registered in England and Wales No. 3818424
Our registered office is at Liddon House, Belmont Business Park, Durham, DH1 1TW
DISCLAIMER:
The information contained in this email is intended for the named recipient only. It may contain
confidential information. If you are not the intended recipient, you must not copy, distribute or
take any action in reliance on it. Please note that neither Waterstons Limited nor the sender
accepts any responsibility for viruses and it is your responsibility to scan attachments (if any).
Email Branding Demo
Q&A
Coming up…

Messaging: Harnessing the Cloud
15th November 2013

Contenu connexe

Tendances

Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and development
iarthur
 
Computer Ware-2016
Computer Ware-2016Computer Ware-2016
Computer Ware-2016
Anju Mangla
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
blogzilla
 

Tendances (19)

Computer network
Computer networkComputer network
Computer network
 
Unit 3
Unit 3Unit 3
Unit 3
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Information Resource Managment
Information Resource ManagmentInformation Resource Managment
Information Resource Managment
 
Data Security
Data SecurityData Security
Data Security
 
E business security
E business securityE business security
E business security
 
Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and development
 
Mail filtering agents
Mail filtering agentsMail filtering agents
Mail filtering agents
 
Intranet and extranet
Intranet and extranetIntranet and extranet
Intranet and extranet
 
Intranet 47
Intranet 47Intranet 47
Intranet 47
 
Hankins (merjo)
Hankins (merjo)Hankins (merjo)
Hankins (merjo)
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
Computer Ware-2016
Computer Ware-2016Computer Ware-2016
Computer Ware-2016
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
Intranet & Extranet
Intranet & ExtranetIntranet & Extranet
Intranet & Extranet
 
CHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNETCHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNET
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
 
SSL Europa Cloud Security 2013
SSL Europa Cloud Security 2013SSL Europa Cloud Security 2013
SSL Europa Cloud Security 2013
 

En vedette

Photography Final Presentation
Photography Final PresentationPhotography Final Presentation
Photography Final Presentation
Valaeve
 
Collaboration in the Post SharePoint Era
Collaboration in the Post SharePoint EraCollaboration in the Post SharePoint Era
Collaboration in the Post SharePoint Era
Waterstons Ltd
 
Idalis Flores Presentation
Idalis Flores PresentationIdalis Flores Presentation
Idalis Flores Presentation
Idalis Apple
 
Nom 115-semarnat-2003 Especificaciones de protección que deben observarse en ...
Nom 115-semarnat-2003 Especificaciones de protección que deben observarse en ...Nom 115-semarnat-2003 Especificaciones de protección que deben observarse en ...
Nom 115-semarnat-2003 Especificaciones de protección que deben observarse en ...
Tochy Díaz
 

En vedette (19)

Lucy presentation1 survey
Lucy presentation1 surveyLucy presentation1 survey
Lucy presentation1 survey
 
Photography Final Presentation
Photography Final PresentationPhotography Final Presentation
Photography Final Presentation
 
Liaar analysis
Liaar analysisLiaar analysis
Liaar analysis
 
How to Achieve Unified Communications Success
How to Achieve Unified Communications SuccessHow to Achieve Unified Communications Success
How to Achieve Unified Communications Success
 
Collaboration in the Post SharePoint Era
Collaboration in the Post SharePoint EraCollaboration in the Post SharePoint Era
Collaboration in the Post SharePoint Era
 
Messaging: Harnessing The Cloud
Messaging: Harnessing The CloudMessaging: Harnessing The Cloud
Messaging: Harnessing The Cloud
 
North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...North East Change Management Network- Changing from paper based health record...
North East Change Management Network- Changing from paper based health record...
 
The Magical Project Manager
The Magical Project ManagerThe Magical Project Manager
The Magical Project Manager
 
Capturing the Real Value of IT Service Management
Capturing the Real Value of IT Service ManagementCapturing the Real Value of IT Service Management
Capturing the Real Value of IT Service Management
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Pecha kucha
Pecha kuchaPecha kucha
Pecha kucha
 
Link
LinkLink
Link
 
Digipak mockups tbc
Digipak mockups tbcDigipak mockups tbc
Digipak mockups tbc
 
Past
PastPast
Past
 
Idalis Flores Presentation
Idalis Flores PresentationIdalis Flores Presentation
Idalis Flores Presentation
 
Final
FinalFinal
Final
 
Pollution
PollutionPollution
Pollution
 
Ppt stand periche tsnb2013
Ppt stand periche tsnb2013Ppt stand periche tsnb2013
Ppt stand periche tsnb2013
 
Nom 115-semarnat-2003 Especificaciones de protección que deben observarse en ...
Nom 115-semarnat-2003 Especificaciones de protección que deben observarse en ...Nom 115-semarnat-2003 Especificaciones de protección que deben observarse en ...
Nom 115-semarnat-2003 Especificaciones de protección que deben observarse en ...
 

Similaire à Messaging:Protecting your Data and your Reputation

Topsec Service Infographic
Topsec Service InfographicTopsec Service Infographic
Topsec Service Infographic
Gary Fleming
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
Nicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
Nicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
Nicholas Davis
 

Similaire à Messaging:Protecting your Data and your Reputation (20)

SkyConnect
SkyConnectSkyConnect
SkyConnect
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Topsec Service Infographic
Topsec Service InfographicTopsec Service Infographic
Topsec Service Infographic
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
How Microsoft 365 can help with GDPR compliance
How Microsoft 365 can help with GDPR complianceHow Microsoft 365 can help with GDPR compliance
How Microsoft 365 can help with GDPR compliance
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
 
Secure Your Cloud Migration - Secureworld 2019 Charlotte
Secure Your Cloud Migration - Secureworld 2019 CharlotteSecure Your Cloud Migration - Secureworld 2019 Charlotte
Secure Your Cloud Migration - Secureworld 2019 Charlotte
 
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
it ppt-2.pptx
it ppt-2.pptxit ppt-2.pptx
it ppt-2.pptx
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
EarthLink Business Hosted Exchange Solution
EarthLink Business Hosted Exchange SolutionEarthLink Business Hosted Exchange Solution
EarthLink Business Hosted Exchange Solution
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 

Plus de Waterstons Ltd

Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
Waterstons Ltd
 

Plus de Waterstons Ltd (11)

Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
Business & Technology Leaders' Network | Living on the edge (Sally Waterston)
 
The Future of Work - Mike Waterston
The Future of Work - Mike WaterstonThe Future of Work - Mike Waterston
The Future of Work - Mike Waterston
 
BI: Beyond Intelligence
BI: Beyond IntelligenceBI: Beyond Intelligence
BI: Beyond Intelligence
 
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
 
North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...North East Change Management Network- Organising building information so it i...
North East Change Management Network- Organising building information so it i...
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...‘Joining the dots’ of your applications and systems – the benefits of Integra...
‘Joining the dots’ of your applications and systems – the benefits of Integra...
 
Consumer Experiences for Enterprise
Consumer Experiences for EnterpriseConsumer Experiences for Enterprise
Consumer Experiences for Enterprise
 
Mobile for business
Mobile for businessMobile for business
Mobile for business
 
Messaging: Zero Downtime Communications
Messaging:  Zero Downtime CommunicationsMessaging:  Zero Downtime Communications
Messaging: Zero Downtime Communications
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 

Messaging:Protecting your Data and your Reputation

  • 1. Messaging: Protecting your Data and your Reputation Andrew Quinn & Nigel Robson 1/11/2013
  • 2. Email and your Business • Primary method of business communications • Stores critical business data • One of the main sources of data leaks • Your organisation’s identity • Your electronic ambassador
  • 3.
  • 4. Protecting your Identity • • • • Your domain is your identity on the internet People recognise this and trust it Its important to protect this asset It’s incredibly easy to fake!
  • 6. Protecting your Identity: Sender Policy Framework (SPF) • Allows receiving mail servers to check domain identity via public records (DNS) • Addresses of authorised mail servers added to public DNS records • If an email comes from an unlisted address it’s a fake • SPF is free to set up • Make sure you can list everything that sends emails from your domain!
  • 7. Protecting your Identity: Sender Policy Framework (SPF)
  • 8. Email is NOT Secure • Email is NOT a secure communications channel • Emails can easily be intercepted, viewed, altered and forwarded on • Sensitive information should never be sent via email unless security is enhanced
  • 10. Email is NOT Secure: Transport Layer Security (TLS) TLS Encryption
  • 11. Email is NOT Secure: Transport Layer Security (TLS) • Secures messages in transit • Newer email systems support basic functionality out of the box • Some organisations will not do business with you without it • Can be configured for “best efforts” or guaranteed security
  • 13. Mobile Device Management (MDM) • Majority of organisations allow employees to access corporate email from mobile devices • Emails contain sensitive data, which is stored in memory, and usually not encrypted • What happens if that device is lost or stolen? • Approx. 300 mobiles stolen in London per day • Approx. 20,000 UK mobiles lost or stolen per day
  • 14. Mobile Device Management (MDM) • MDM allows corporate devices to be managed centrally • Policies can be applied to all devices independent of make and model • Devices can be forced to be encrypted • Devices can be remote wiped if required • Microsoft Exchange provides basic MDM via ActiveSync but more granular control can be provided by other products
  • 15. Journaling & Archiving • Two phrases which are often mixed up • Serve different purposes • Archiving – moving data to alternate storage for long term retention • Journaling – keeping a separate, immutable copy of messages sent & received
  • 17. Why Archive? • • • • Reduce storage costs Improve scalability Provide longer-term storage to users Eliminate a reliance on PST files
  • 18. Why Journal? • • • • Compliance with retention policies Provide an electronic paper trail Prove what was said / agreed Information cannot be lost when people leave
  • 19. Journaling Considerations • If the email is modified in order to copy it (e.g. silently add BCC address), it may not stand up in court • If end-users can access the “journal”, it is an “archive” • Access to journaled messages should be audited
  • 20. Data Loss Prevention • Email is one of the largest sources of data leaks • Data leaks are usually accidental • Once an email is sent, you can’t get it back!
  • 21. Data Loss Prevention • Technology to manage the exposure of information is built into the Microsoft platform – Windows – MS Office (Word, Excel, PowerPoint, Outlook,…) – Exchange Server • Lots of acronyms… – – – – – Rights Management Services (RMS) Information Rights Management (IRM) Message Classification File Classification Infrastructure (FCI) Data Loss Prevention (DLP)
  • 22. Data Loss Prevention • Add Classification – Provides information – Can be used for file system security • Apply Rights Management – Restricts data usage even when you have access • Process can be automated
  • 23. Data Loss Prevention Rights Management... Classification... So what does this do for us? This is confidential. Don’t distribute it! Recipient blocks Exchangecan't sending Outlook warns open blocks
  • 25. Branding • • • • Present a consistent corporate image Provide contact details Support marketing campaigns Comply with legal requirements
  • 26. Signature Management Andrew Quinn - Executive Consultant: Infrastructure Technology Office: 0845 094 094 5 | Mobile: 07710 374895 | Website: www.waterstons.com Waterstons Limited. Registered in England and Wales No. 3818424 Our registered office is at Liddon House, Belmont Business Park, Durham, DH1 1TW DISCLAIMER: The information contained in this email is intended for the named recipient only. It may contain confidential information. If you are not the intended recipient, you must not copy, distribute or take any action in reliance on it. Please note that neither Waterstons Limited nor the sender accepts any responsibility for viruses and it is your responsibility to scan attachments (if any).
  • 28. Q&A Coming up… Messaging: Harnessing the Cloud 15th November 2013

Notes de l'éditeur

  1. 192.168.9.56 dc192.168.9.57 exch192.168.9.58 rms192.168.9.59 client
  2. Nigel
  3. Nigel
  4. telnet exch.demo.local 25ehlomail from:mike.waterston@waterstons.comrcpt to:administrator@demo.localdataFrom:Mike Waterston<mike.waterstons@waterstons.com>To:Administrator<administrator@demo.local>Subject:Go home!I'm declaring today a holiday. Everyone can go home..quit
  5. Credit card number - sends approval to adminProfanity "holiday" - overrideIP address - override and report to adminResearch - Applies RMS template
  6. Show Exclaimer Mail Disclaimers on dur-vmmail-01Show the following templates for a good idea of capabilities:WaterstonsStandard Email SignatureDisclaimersCompanies Act 1985Business Cards\SignaturesOrbit Illustration Business CardExclaimer ExternalLetterhead styleOutgoing Style 2Letterhead 1 – eSpiralxChange Letterhead