Information Security · · 2 min read

Sharing Confidential Information Via Email

Discover practical tips for safeguarding confidential information when using email and learn essential steps your organization can take to minimize risk and protect sensitive data.

Sharing Confidential Information Via Email
Photo by Stephen Phillips - Hostreviews.co.uk / Unsplash

Sharing Confidential Information via Email

Most organizations — including small law offices and accounting firms — routinely need to share confidential information with clients or receive such details from clients. In today’s world, the easiest way to do that is via email. But yet, sharing confidential information via email presents a tremendous risk.

Why Email Poses a Risk

Email is an old technology — developed in the 1970s — and was never designed to be secure. Anyone who can see the network traffic for the network you’re using (such as in a public hotspot, at a hotel, or on an airplane) can easily intercept messages.

Email tends to be a back-and-forth medium, so if an attachment (a PDF, a Word doc, a spreadsheet) happens to contain confidential data, those attachments are vulnerable every time someone sends or receives a message in that thread. Furthermore, if someone gets added to the message thread as a CC or BCC, each new recipient has access to the message’s history and also generates new opportunities for a third party to intercept the messages — and their history.

Email encryption is not standardized and it is difficult to use. Major cloud-based players such as Microsoft 365 and Gmail use encryption for transmitting messages. But even Microsoft 365 gives system administrators the ability to “fine tune” settings. So while you may feel comfortable with the encryption on your end, it’s a leap of faith that both sets of servers are properly using encryption and that they can properly communicate with each other. Plus, you never know what’s going to happen after a message is sent and where it goes — in other words, did the recipient download it and store it on their personal computer?

Your options? Either move to a different mechanism or follow these suggestions.

Good Practices for Sharing Confidential Information

Read next

CTA