I
agree with Kelley, and have found that the most prevalent solution to the
Internet email quandry has been to use a secure server. I
recently worked with a benefits management company which had a portal site
utilizing the model in which a secure server resides on the network and the
recipient accesses from inside the firewall after passing authentication.
Re:
the gossip hotline. Going a step beyond security awareness and personal
accountibility for internal email communication, if content filtering/monitoring
is not used then company policy must be documented, in place, and enforced in
the event that privacy breaches occur and are discovered. It is
simply not enough these days to warn employees not to do it; the
consequences of such infringements must be spelled out
also.
Lisa
Holman
Haverstick Consulting
952-656-3733 ofc
952-239-1093 mobile
********************************************************************** To be removed from this list, go to: http://snip.wedi.org/unsubscribe.cfm?list=privacy and enter your email address. |
- Securing E-mail Bill Bernath
- Re: Securing E-mail Chris Riley
- RE: Securing E-mail Buthod, Tomese
- RE: Securing E-mail Kelly, Lee
- RE: Securing E-mail Holman, Lisa A.
- RE: Securing E-mail Clay III, Roy G. (MCLNO)
- RE: Securing E-mail Leslie C. Bender
- Re: Securing E-mail Total Enterprise Security Solutions
