Cyber Security

Email Security

Monitoring and Identifying Cyber Threats for Businesses.

Protect your mailboxes

Business Email Encryption is a process of converting information or data in an email (including attachments) into a code known as cyphertext, and is especially used to prevent unauthorised access to the data. 

The Email Encryption requires no changes to user behaviour or workflows and integrates with Office 365 and Gmail as well as Server Exchange solutions. In order to encrypt an email user simply need to append [encrypt] to the email subject or mark the email as confidential, the system will then do the rest. Customised rules can also be created to encrypt emails automatically using a set criteria. This could be emails that contain information such as card details or personal data. 

 

Built with compliance in mind

Email Encryption is a cloud-hosted platform and requires no additional hardware. Emails are transmitted to the cloud using a secure AES256-bit encryption key.

When an encrypted email is sent, the recipient will receive an email notification with a link to the encryption portal. If it’s the first secure email the user has been sent they will be prompted to sign up; otherwise, they will be prompted to sign in. The user will then be able to access the email and any sent attachments. Using the portal, the user can also reply to the sender and even include attachments of their own. 

Why CIS?

We have over 30 years of supplying IT and electronic systems, right from the nuts and bolts to sophisticated servers, networks, software and IT infrastructure.

CIS understands how to dig into what is possible and ensure that the best possible cover is made with what is already available, and recommend upgrades if there are areas of weakness. We also understand business, management and the need for modern approaches to reduce risk, potential fines, costs and reputational damage from not securing the electronic business assets of a company.

Cookies

Cookies

This site uses cookies to help improve user experience. For these reasons, we may share data with our analytics partners. By using CIS, you accept our use of cookies. Find out more