V 1.0 May 16,2011 Audience: Staff Encryption For the latest version of this document please go to:

Slides:



Advertisements
Similar presentations
NIMAC 2.0 Basics for AUs: Searching, Downloading, and Assigning Files 1www.nimac.us.
Advertisements

Installation & User Guide
Using the Self Service BMC Helpdesk
Services Course Windows Live SkyDrive Participant Guide.
Web Filtering. ExchangeDefender Web Filtering provides policy-controlled protection from dangerous content on the web. Web Filtering is agent based, allowing.
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
V 1.0 May 16,2011 Audience: Staff Domain Guide For the latest version of this document please go to:
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Security+ Guide to Network Security Fundamentals
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
We are partners in learning.. Note: Office 365 works best in Internet Explorer V 9 or above. Some features do not work in PWCS’s Chrome Browser or in.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Maintaining and Updating Windows Server 2008
June is an easy way to communicate. It costs nothing to send an , but it does require a connection to the Internet. You can.
August 15 click! 1 Basics Kitsap Regional Library.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
This is the first page of the log in, this is were you enter your unique details.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
V 1.0 May 16,2011 Audience: Staff Service Provider Guide For the latest version of this document please go to:
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Tutorial Introduction Fidelity NTSConnect is an innovative Web-based software solution designed for use by customers of Fidelity National Title Insurance.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
CPS Acceptable Use Policy Day 2 – Technology Session.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Module 8: Managing Client Configuration and Connectivity.
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
Masud Hasan Secue VS Hushmail Project 2.
By: Amber Shepard   Microsoft Outlook is an client and personal information manager (PIM) that's available as part of Microsoft's Office suite.
IT security By Tilly Gerlack.
HOW-TO guide This tutorial has sound.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
V 1.0 May 16,2011 Audience: Staff Outlook Agent For the latest version of this document please go to:
Computer Emergency Notification System (CENS)
SPAM Settings. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the.
Microsoft Office Outlook 2013 Microsoft Office Outlook 2013 Courseware # 3252 Lesson 6: Organizing Information.
Outlook 2007 basics. Create an account An account must be created before sending/receiving . Follow these steps to create an account:
Whitelist Management. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from.
WRITE MARKETING COPY and EXECUTE TARGETED S 3.07.
Getting Started with REACH Delivery. Free to Receive messages and files Easy and completely free to install Comprehensive online help Free Support Forum.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
SEM A - Promotion PE – Develop content for use in marketing communications to create interest in product/business/idea PI – Write marketing.
V 1.0 May 16,2011 Audience: Staff LiveArchive For the latest version of this document please go to:
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
NIMAC for Accessible Media Producers: February 2013 NIMAC 2.0 for AMPs.
Microsoft Virtual Academy Talbott Crowell | Chief Architect, ThirdM.com Rob Latino | Program Manager in Office 365 Support, Microsoft.
Sending effective and professional s . Session aims and objectives Lesson Aims and Objectives send s that are fit for purpose and audience.
Windows Vista Configuration MCTS : Productivity Applications.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Encrypted from CDS Office Technologies
Information Security.
Maximize iServices Sub & eBilling 2015
MICROSOFT OUTLOOK and Outlook service Provider
Call AVG Antivirus Support | Fix Your PC
August 17, 2015 J. Boles, J.Burnias and M.Garcia Office 2013
COM Orientation The template can be used to create presentations for community, civic, advocacy and government relations groups. It is also appropriate.
WRITE MARKETING COPY and EXECUTE TARGETED S
9 ways to avoid viruses and spyware
COMPLETE BUSINESS TEXTING SOLUTION
Corporate Encryption:
Presentation transcript:

v 1.0 May 16,2011 Audience: Staff Encryption For the latest version of this document please go to:

Table of Contents ExchangeDefender Overview……………………………………………………………… ExchangeDefender Encryption………………………………………………………………… Sending an Encrypted ……………………………………………………………… Encryption Policies & Management………………………………………………………… Business Considerations…….…………………………………………………………….. Retrieving Encrypted Messages…………………………………………………………………. Technical Help & Account Management……………………………………………………… General Security Tips……………………………………………………

ExchangeDefender Overview ExchangeDefender features a built-in encryption solution that can satisfy many government and regulatory compliance requirements for data security. Compliant with such standards as FINRA, SOX, SEC and HIPAA, ExchangeDefender Encryption meets or exceeds business encryption needs with the unparalleled ease of use. ExchangeDefender is a cloud-based productivity suite that delivers security, business continuity, regulatory compliance and business information management tools. ExchangeDefender technology provides the following benefits: SPAM filtering, virus filtering, malware protection, DDoS protection, business continuity, Outlook integration, SPAM quarantine reports, transparent and regulatory encryption, web filtering, desktop alerts, SMTP service monitoring and managed services, Exchange 2010 archive access, long term compliance archiving, HTML5 mobile application and much more. The wide range of solutions in our portfolio is tightly integrated to give users seamless experience across different tasks and be flexible enough for the unique way in which each company implements ExchangeDefender. ExchangeDefender guides are intended to introduce basic service concepts and offer productivity tips that our customers have shared with us. If you have any suggestions or questions please don’t hesitate to contact us. 3

ExchangeDefender Encryption Encryption, in it’s simplest form takes data in it’s original plain text format and uses mathematical algorithms and encryption keys to transform it into unreadable text that cannot be easily interpreted or processed by hackers and packet sniffers. ExchangeDefender Encryption takes messages sent from you and encrypts their contents so that the messages cannot be read by anyone other than the intended recipient. Instead of getting plain text messages that could be intercepted by management, packet sniffers or IT administrators, recipients get a link to retrieve their message in a safe and secure ExchangeDefender Encryption environment. ExchangeDefender Encryption provides a secure and audited trail for messages and assures corporate policies are established and honored, on-demand encryption is enforced when necessary and that the contents of the message are protected from third parties according to the level that meets the business requirements. 4 Sending an Encrypted Sending encrypted messages with ExchangeDefender is simple and convenient. There is no software to install or configure, just put [ENCRYPT] or [CLEARENCRYPT] in the subject of the message and it will be encrypted all the way to the recipient of the message. Be cautious how you use the encryption: [ENCRYPT] – Strong encryption that requires the recipient to enroll in the free ExchangeDefender Encryption Site to password protect any future messages. [CLEARENCRYPT] – Strong encryption without password protection. It’s as simple as that.

5 Encryption Policies & Management ExchangeDefender Encryption service can be used on-demand (by typing [ENCRYPT] or [CLEARENCRYPT] in the subject) or can be established through company policies. Your IT Solution Provider or IT administrator can create policies that always encrypt messages going from a specific sender to a specific recipient. For example, a policy can be put in place so that messages going from the in-house book keeper to the payroll company are always encrypted because they contain account number data. To manage policies please contact your IT Solution Provider and ask them to setup a policy in the ExchangeDefender Administrative Portal under the Configuration tab  Encryption. Note: If this service is not enabled in your ExchangeDefender Administrative Portal, please contact your IT Service Provider.

6 Business Considerations While the act of sending an encrypted message through ExchangeDefender is simple, the business considerations behind encryption can be quite complex. Let’s first discuss the difference between [ENCRYPT] and [CLEARENCRYPT] behavior: [ENCRYPT] – Message will be encrypted and the recipient will receive an notification of where they can access the message. If this is their first time receiving an encrypted message they will be prompted to enroll in the ExchangeDefender Encryption service which is completely free and only requires the recipient to provide their address, physical address, choose a password and a PIN. By using this strong encryption, the user will have to authenticate to the ExchangeDefender Encryption site to retrieve the message. This level of security assures you that only the recipient of the message will be able to access the message and it won’t be intercepted by packet sniffers, hackers, IT staff or company management. [CLEARENCRYPT] – Message will be encrypted and the recipient will receive an notification with the link to their encrypted message. No information is requested from the recipient, they just see the encrypted message.

7 Using [ENCRYPT] gives you the most assurance that the message will be received by your client and only your client. Sniffing, packet logging even mail logging are not effective ways to compromise this level of encryption because it requires the user to actually establish an account and provide data. While that gives you the most security and assurance, your recipient may not want or be allowed to follow these steps. Major companies and many Fortune 500 organizations prohibit their employees from issuing personally identifiable information such as their address, company name or phone number to third parties. As such, your encrypted message may be ignored. Likewise, by sending a [CLEARENCRYPT] message you run a small risk that their network is being monitored, that their is being read by their management or that they have a compromised system that is controlled by hackers. In those cases, they may be screenscrapping or automatically downloading all the content sent to the recipient. Security is a compromise and arrangement between the two organizations that are exchanging information. While the ExchangeDefender technology makes this easy, take the extra step to assure people you work with that you are sending them confidential information and what steps they need to take.

8 Retrieving Encrypted Messages ExchangeDefender makes it simple to retrieve encrypted messages but the solution is also flexible enough to meet a more complex encryption requirement. Regardless of whether you use [ENCRYPT] or [CLEARENCRYPT] the recipient will receive the following message indicating that you’ve sent them an encrypted message and they will be prompted to click on it to retrieve it. If you used [CLEARENCRYPT], the message will be displayed right away. If you used [ENCRYPT] the user must verify their identity. If this is the first time they are accessing our system, we will prompt them to choose a password and a PIN so we can be sure that only they have access to their messages.

9 After enrollment, they will be able to see their ExchangeDefender Encryption Inbox and be able to read, delete or even respond to the encrypted message. As a best practice, you should always notify someone when you send them an encrypted message for the first time. Because of the general lack of trust and authenticity on the Internet, it helps when you can assure someone that the message is indeed coming from you.

Please contact (your local IT Solution Provider) for technical help and account management. Own Web Now Corp is a software developer that builds and manages the ExchangeDefender network and does not have access to your account, your data or your company information. When contacting (you IT Solution Provider) for assistance please keep in mind that the more information you can provide about the issue the faster and more accurately the answer will be provided. Make sure to provide the following to expedite your request: Technical Help & Account Management ExchangeDefender will never ask you to provide or verify any billing or financial information. ExchangeDefender web sites are always encrypted and always contain ExchangeDefender.com Never share your ExchangeDefender password with anyone or use the same password across different services or service providers. Never save or store your password on portable or shared devices such as mobile phones, kiosks, or computer labs. Always follow your IT department or solution provider’s security guidelines and report security concerns or breaches. Get the latest service alerts: ExchangeDefender 8131 Vineland Avenue #102 Orlando, FL USA Phone: (877) International: (407) ExchangeDefender ExchangDefender Copyright © 2011, Own Web Now Corp Full description of the problem: Provide a detailed explanation of the issue that you have experienced, if this is the first time you have experienced a problem or if it’s repetitive, and if the issue is only affecting you or multiple users. Relevant tracking data: Provide any relevant information about where you are experiencing an issue: your computer, website, mobile phone, as well as the basic information that can narrow down the research (when the issue happened), what you were attempting to do, who the message was being sent to or received from). Recent account or configuration changes: Advise us if you have recently made any configuration changes to either your account or your computer/network so that we can double check if all systems are configured properly. Screenshots: If the issue is easy to see, such as an error message or prompt, take a screenshot. On Windows computers press ALT + PrintScreen at the same time, on Macintosh press Command+Shift+3 at the same time. 10 General Security Tips: