Critical data is only so secure if all your e-mail is sent "in the clear." Roger looks at the benefits and limitations of several options for encrypting e-mail and keeping information safe from prying eyes. Encrypting e-mail and other digital communication methods (e.g. IM, P2P, BlackBerrys, etc.) is taking on new importance these days as businesses open new channels for employees, customers, and partners to pass messages to one another. Today’s column will discuss the most common methods for encrypting e-mails and point out some of the advantages and disadvantages of each solution.Proprietary built-in mechanismSome e-mail systems, especially older e-mail products, allow e-mail to be encrypted with a single click of the mouse. Normally, you simply enable the encrypt button, input a protective password, and then send the e-mail. The e-mail is encrypted by the inputted password (i.e. the inputted password is used as the random input value to start the encryption cipher process) or protects the stronger secret encryption key that is used to do the real encryption. These products normally only work with other users on the same e-mail system and/or require that the encryption password be shared with the intended recipient using an out-of-band method (e.g. calling them with the password or sending it in a separate email). Also, because these e-mail systems are older and proprietary, they often use flawed cryptography (if it can even be considered cryptography) or weak, no longer accepted ciphers (e.g. DES, 56-bit SSL, etc.). Proprietary e-mail encryption schemes are becoming a thing of the past. WinZip and PKZipMany users are familiar with the abilities of WinZip or PKZip to encrypt e-mail or file attachments. Years ago, these products were flagged as having poorly implemented encryption. This is no longer the case as long as you are using a version from the last few years. Depending on the product, these may encrypt the entire e-mail, not just the file attachment, and work across a wide range of platforms. Usually the encryption is protected by a user-supplied password, which means the protection is only as strong as the password (as is the case with many other products). Today’s versions use reliable ciphers and strong cipher keys. The biggest drawback is that the regular versions that most users own require manual encryption (sometimes external to the regular e-mail process), and the related problem of how to securely transmit the secret password to the intended receiver and only the intended recipient. Still, if you only remember the bad encryption traits of WinZip or PKZip, you haven’t tried them lately.Encrypted HTML e-mailMany companies offer HTML e-mail services with encryption abilities. Like some of the proprietary e-mail encryption products, private encrypted HTML products are often misrepresented. This is not to say that good encrypted HTML e-mail does not exist (it does, even as part of larger, more popular offerings), it’s just a case of “user beware.” With a third-party system hosting the encrypted e-mail, you are never really sure about who can or can’t read the e-mail. Several companies promising secure e-mail have later been found out to have company-intended backdoors, even though the word “crypto” was in the company’s name.PGP/GPG/OpenPGPE-mail encryption based on one of the PGP (Pretty Good Privacy) tools can be a secure option. PGP uses reliable encryption and has nearly two decades of experience in securing data. PGP can be intimidating for first-time users (who often get confused about which keys to send to each other) and requires that both sender and receiver have PGP, with compatible ciphers, installed. Once you’re set up, though, sending encrypted e-mail can be as simple as click and send. S/MIMES/MIME is often the enterprise choice for encrypting and authenticating e-mail. S/MIME is supported by most enterprise e-mail systems but has a heavy setup cost. Oftentimes a PKI servicer is needed, keys have to be distributed, and clients have to be configured.However, all of this can be seamlessly automated, from the end-user’s perspective, in a Windows Active Directory environment and probably so in a Linux/Unix environment using scripts. The harder part can be setting up external users outside of the enterprise’s direct control (as senders need receiver’s keys to send encrypted e-mail). Also, S/MIME doesn’t encrypt e-mail header/subject information by default, which can be a benefit to some, and a negative to others (see below).Rights Management Service RMS is a Microsoft-only solution. It allows Microsoft Office, Microsoft Outlook, HTML, and other data content types to be wrapped with asymmetric ciphers. When the receiver attempts to open RMS-protected content (e-mail in this example), the user’s RMS client (installed by default in Windows Vista) will “dial home” and approve the content opening, as well as restrict the user to a predefined set of actions. RMS can be used to prevent the user from forwarding, printing, and copying e-mail unless previously unauthorized. It’s not perfect security, but it works.Mail encryption appliances and productsSeveral vendors are offering security appliances and products that focus on encrypting e-mail. One interesting solution, Secure Computing‘s SecureMail appliance, supports seven different types of encryption protocols: S/MIME, PGP, TLS, etc. One of the features I like best with this product is the ability to encrypt e-mails on the fly based upon predefined content and replace outgoing content with a link that is sent to the receiver, giving TLS access to the e-mail after a password is inputted.I’m sure I missed a dozen other e-mail cipher solutions just as good, but column space is limited, and these options should give you a start.General concernsWhen choosing an e-mail encryption solution, be sure to ask about, and test, your ability to manage encrypted e-mail in the same way as you manage your unencrypted e-mail. For example, can you scan e-mail for malware or unauthorized content if it is encrypted? Can you index and retrieve e-mails based on content if that content is encrypted (for example, S/MIME allows indexing and retrieval based on e-mail headers and subject fields, but not on the message body content)? What about key management and recovery? Any solution without a recovery solution is bound to lose important, mission-critical information that can’t be recovered.Before implementing any solution, test it on a few of your patient users and learn the benefits and pitfalls of the solution before plunging head long into a large enterprise-wide deployment. It will keep your data secure and your users (and managers) much happier. Related content analysis The 5 types of cyber attack you're most likely to face Don't be distracted by the exploit of the week. Invest your time and money defending against the threats you're apt to confront By Roger Grimes Aug 21, 2017 7 mins Phishing Malware Social Engineering analysis 'Jump boxes' and SAWs improve security, if you set them up right Organizations consistently and reliably using one or both of these approaches have far less risk than those that do not. By Roger Grimes Jul 26, 2017 13 mins Authentication Access Control Data and Information Security analysis Attention, 'red team' hackers: Stay on target You hire elite hackers to break your defenses and expose vulnerabilities -- not to be distracted by the pursuit of obscure flaws By Roger Grimes Dec 08, 2015 4 mins Hacking Data and Information Security Network Security analysis 4 do's and don'ts for safer holiday computing It's the season for scams, hacks, and malware attacks. But contrary to what you've heard, you can avoid being a victim pretty easily By Roger Grimes Dec 01, 2015 4 mins Phishing Malware Patch Management Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe