We use Sophos to encrypt documents and contents of an email. The end user has to setup an account with a password, before getting access to the email.
Robert Drake Technology Specialist PH: (417) 862-0471, ext. 106 From: [email protected] [mailto:[email protected]] On Behalf Of Richard Stovall Sent: Wednesday, December 09, 2015 12:43 PM To: [email protected] Subject: Re: [NTSysADM] Encry pting File Attachments I would love to quarantine only the ones with Macros. That would be hhhhuuuuggggeee. Our current on-prem Barracuda can't do that (or if it can, I sure don't know about it.) How do you do it? On Wed, Dec 9, 2015 at 1:31 PM, Mark Gottschalk <[email protected]<mailto:[email protected]>> wrote: I quarantine only Office attachments that contain macros. I have the option of stripping all macros from office docs, but 99%+ of all Word/Excel files we receive with macros are trojans anyway. I've had to release from quarantine maybe half a dozen legitimate office docs with macros this year. From: Richard Stovall <[email protected]<mailto:[email protected]>> To: [email protected]<mailto:[email protected]> Date: 12/09/2015 10:23 AM Subject: Re: [NTSysADM] Encry pting File Attachments Sent by: [email protected]<mailto:[email protected]> ________________________________ Not surprising at all. I do the same thing. I am also manually triaging all Office attachments (though that is a major pain and will go away pretty soon when we add another layer of automated defense). On Wed, Dec 9, 2015 at 1:08 PM, Mark Gottschalk <[email protected]<mailto:[email protected]>> wrote: We quarantine all emails with html attachments (such as the secure Cisco email), since the majority (90%+) we see are trojans or phishing. Same for zip files in email, believe it or not. Those are easily topping 99.9% trojans (thousands received in the past week). Same for dozens of more obscure attachment types. Recipients get a quarantine notification if the originating mail server is not also a known spam source. If the email is legit and needed, they request it being released. I see zero to two zip file recovery requests a week, tops. I don't trust an antivirus system enough to allow users to decide whether or not to open attachment types that are overwhelmingly used maliciously in email. But, I get the need for occasional, easy-to-use secure messaging and the tradeoff between irritation and security. -- Mark From: David McSpadden <[email protected]<mailto:[email protected]>> To: "[email protected]<mailto:[email protected]>" <[email protected]<mailto:[email protected]>> Date: 12/09/2015 09:04 AM Subject: RE: [NTSysADM] Encry pting File Attachments Sent by: [email protected]<mailto:[email protected]> ________________________________ Well, It is better than seeing my members data on FoxNews I suppose. But yeah, hate it from time to time. From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Gavin Wilby Sent: Wednesday, December 9, 2015 12:01 PM To: '[email protected]<mailto:[email protected]>' <[email protected]<mailto:[email protected]>> Subject: RE: [NTSysADM] Encry pting File Attachments ☺ That’s a very annoying feature you have. Gavin Wilby IT Support Engineer This e-mail and any files transmitted with it are property of Indiana Members Credit Union, are confidential, and are intended solely for the use of the individual or entity to whom this e-mail is addressed. If you are not one of the named recipient(s) or otherwise have reason to believe that you have received this message in error, please notify the sender and delete this message immediately from your computer. Any other use, retention, dissemination, forwarding, printing, or copying of this email is strictly prohibited. Please consider the environment before printing this email.
