Currently set to No Index

Email Encryption: Protecting Yourself and Your Information


You decided to write a steamy email to your lover late at night from your home computer.  Pet names were used as well as some other language that, if anyone else but your lover saw, you would just die of embarrassment. The problem is you did not use any form of encryption on your email at all because you thought that encryption was only for governments and big corporations. Now, your favorite pet names and steamy details have been read by:

  • Anyone at your email or Internet provider who wants to
  • Anyone at your lover’s email or Internet provider who wants to
  • Anyone who works at any of the places in between that house the routers that handled the data from your email who wants to.

Your secrets are not safe when you do not use encryption on your email.  While this situation is personally embarrassing, imagine how devastating this would have been if it were a corporate email sent speaking about the release details of their newest offering in the technology world.  The competition now has them and you might as well begin again at the drawing board, assuming that you still have a job.  With this article we hope to help you set up email encryption for your computers so that these situations never have to become a personal reality.

Software Solutions

Perhaps the simplest and least aggravating approach to applying encryption to your email messages is to make use of one of the many software solutions out there.  The very oldest and most well-known software for this would be PGP (Pretty Good Protection).

Using 128-bit encryption, this software (which is now owned by Symantec, creators of Norton) takes a lot of the guesswork out of the encryption experience by automatically discovering certificates and keys as needed and automatically encrypting all sent and received email without the user needing to do much of anything.  This particular software supports both common forms of encryption, S/MIME and OpenPGP, and uses a proxy as a method of keeping your information secure.

RELATED:   Canada is the Newest Nation to Join the Fight Against Web Copyright Infringement

If you are brand new to encryption, then you would do well to look past the price tag, and realize that you are buying a lot of peace of mind.  This software is highly recommended as it does not disrupt the recipient or the senders email experience at all.

Client-based solutions

Many email clients now offer the ability to send and receive encrypted email through the use of settings within the program itself or add-on programs for the client.  At this time, the two most well-known clients for offering these options are:

Microsoft Outlook uses what they call a digital ID, which is essentially a personal security certificate for your email that gets sent to the email recipient for encryption along with your message.  If the recipient does not have your digital ID, they cannot read your encrypted emails (although you will be given an option to send it in unencrypted formatting in this case).

Mozilla Thunderbird makes use of an add-on called Enigmail in order to facilitate encrypted email sending and receiving.  Once Enigmail is installed on your Thunderbird client, then it can and will automatically encrypt, decrypt and manage all encryptions keys for you, making it a very simple option for those who just want the basics. It can be expanded upon by also downloading GNUpg which allows for further cryptographic functions.

RELATED:   CIO Perspective: Assess Your E-mail System

There are other email clients also offering similar features.  However these two are the easiest and most straightforward to configure on your own without having to call your local techy friend for help.  If you wish to go ahead and plunge in deeper, by all means do so, but make certain that you read the manual: incomplete or incorrect security is about the same as no security.

Don’t want to bother with encryption? There are other ways.

Without encryption you will always lose some information to easily readable sources.  However, if for some reason you do not want to engage in encryption use, here are some suggestions on how to keep yourself as safe as possible.

  • Make absolutely certain that you have two different email addresses. Use one for a small list of well-known friends and associates and the second email address for mailing lists and other more open forum email and subscription mail.
  • When creating your personal email, keep it simple and professional such as using your first initial and your last name.
  • When creating your public email do not use any kind of personally identifiable information.
  • When emailing back and forth, do not send any information that you do not wish to be read by everyone on the World Wide Web at any time. This includes; names, addresses, phone numbers or passwords.
  • Do not open email from sources that you have any reason to be wary of.
  • Again, use an antivirus program that offers email scanning.
  • For goodness sake, do not send personal email from a work email address.  More often than not, these email addresses are monitored by your company and their contents can get you in trouble!  This is more a precaution on their part than a danger on yours, as they usually have plenty of security procedures in place on their end as well.  Still, this danger potentially takes the form of unemployment.  If anything, learn from your employer’s security procedures, and consider implementing the same thing on a personal level.
RELATED:   How to Find Secure Shared Hosting

If you follow these steps, you should be able to keep yourself relatively safe while emailing.

It’s privacy, and it’s personal

In the end, only you can decide how much encryption is comfortable for you to use.  Privacy is a personal matter and must be seen to in accordance with personal comfort levels.  More privacy is more secure, but it is also more work.  How much work you want to do is up to you.

There are people out there whose entire computer systems and networks are encrypted. They often do not do so for any reason other than they can, and that they enjoy that level of privacy not because they have something to hide. There are those who will only encrypt their emails and be happy with that.  Then there are those who trust their firewalls and antivirus programs to do their jobs and keep them safe. Whatever you choose, just be aware of the basics of how email security works, and you should be able to find the comfort level that’s right for you.


How to Find a Successful Name For Your New Blog?
How to Find a Successful Name For Your New Blog?

One of the most important decisions you can make to ensure your blog is among the best is to select a name. While there are more than 500 million blogs available...

How-to Start a Blog – Review of the Best 10 Blogging Platforms
How-to Start a Blog – Review of the Best 10 Blogging Platforms

If you want to start a blog as fast as possible, then you need to consider choosing a blogging platform. Thankfully, there are some excellent free and paid blogging platforms...

How Referral Marketing Can Benefit Web Hosts
How Referral Marketing Can Benefit Web Hosts

Even if the niche of web hosts are fully loaded with a lot of companies they are still one of the easiest to promote because you could write your own...

Broken Links: How to Find, Fix, and Benefit from Broken Links
Broken Links: How to Find, Fix, and Benefit from Broken Links

Links are what holds the web together. Essentially, the web is named as such because of the ability for pages and sites to link to other sources and relevant information....

Brand Value & the Most Powerful Brands (with Infographic)
Brand Value & the Most Powerful Brands (with Infographic)

Brand value – everyone wants it, however, only few are able to achieve it. The subject of “brand value” holds a significant position amongst marketers, executives, and entrepreneurs. Let’s discuss...

Reasons why your business should shift to Cloud hosting
Reasons why your business should shift to Cloud hosting

Cloud hosting has been on the rise since its inception. The improvement to your website performance and business efficiency that comes with Cloud hosting is almost tangible.

Why We Love the IT Support Career?
Why We Love the IT Support Career?

In almost all of my posts I was talking about the stressful side of the IT – the long hours, end user issues, migrations, midnight calls and the like. But...

IT Manager: Ways To Show Your Appreciation To Your Team
IT Manager: Ways To Show Your Appreciation To Your Team

Surely your team struggled hard and made things happen. You cannot say “this is what you get paid for” and just leave – you cannot keep your IT staff that...

Leave a Reply

Your email address will not be published. Required fields are marked *