Clicky

Skip to main content
Need help with a cyber incident now?
Call 24/7: +31 88-2747800

E-mail security is about sharing information with everybody safely

Unsafe emailing is still the greatest cause of data leaks. Research has shown that
in 40% of the cases, emails are sent to the wrong email address.

This is easy to avoid. If you would like to find out more, we are here to help you.

How do you make sure that you communicate safely via email

and that your employees also actually want to use it?

How do you currently send large files? Do you also use this application for privacy-sensitive or company-sensitive information? We have often written internal policy for this, and a number of providers may have been technically blocked. Imagine that you have made things so secure that employees start using free cloud chat tools. It happens. In such a situation, you have no idea what is happening to your files and where they are being stored. Alternatively, imagine that the recipient forwards your email message. In that case you will have unwittingly created a data leak.

Privacy legislation and various sets of standards, for example, include rules about email communication. One of these is that privacy-sensitive information always has to be encrypted before it is sent. In the healthcare and government sectors, this has been laid down in detail in the NTA 7516 and Act on compulsory mental healthcare [Wet verplichte geestelijke gezondheidszorg] (Wvggz) standards. However, it may also be the case that you have recorded similar regulations within your ISO or NEN standards or in your organization’s information security policy.

The problem is that your users choose the easy way and that is why Tesorion is keen to help you organize this process, not only at a technical level, but also by involving your users in the change. In this way, we can kill two birds with one stone. The solution is easy to use and integrates seamlessly with, for example, Microsoft Outlook. What is more, your employees will then be fully up to date and receive continuous online training.

How can Email Security help your users?

email protection icoon

Email encryption

It is easy to think up situations in which it is important and logical to encrypt our email. That way, we know for sure that only the sender and the recipient can access the message and you can prevent messages from being forwarded.

eenvoudig icoon

Easy to use

It is best to keep things simple. We would rather not follow complicated procedures or have to carry out complex actions in order to send an email message or file safely. That is why it is ideal if you can keep using tried and tested applications just as you are used to.

attachement icoon

Sharing files safely

You may want to share a large number of files with the supplier, client or chain partner. You discover that the email limit is insufficient, but what can you do? Often you will resort to file transfer tools which you can find online. The question is, however, whether you are not then unconsciously creating a data leak.

Advice

When is data sensitive and when do you want employees to be extra alert? It all starts with the way your information security policy is structured. Our experts are keen to help you with this, for example with certain practical examples or knowledge from the field.

gedrag en bewustzijn

Getting users on board

My employees will not do what I say. That could easily be the title of a book. Often this has nothing to do with a lack of will, but with solutions which are too complicated or difficult to use. We believe not in prohibiting something, but in raising awareness.

ethisch hacken

Compliancy

Preventing data leaks is something you have to do anyway based on current privacy legislation. However, there are also standards and sector-related regulations which prescribe that certain email messages must be encrypted. It may also be the case that there are internal rules which prohibit things such as sharing information via free cloud providers.

Why choose Tesorion?

Tesorion Immunity - schild

Protect your email

Help your users find a user-friendly alternative for free cloud solutions and make it easier to send documents safely. That automatically avoids any shadow IT.

Seamless implementation

Our experts will ensure perfect implementation and a set-up that suits your organization. Tesorion can therefore be regarded as a one-stop shop for your organization.

vertrouwen en transparantie

Transparent

It is essential to build up a relationship of trust and that is why we say what we do and do what we say, in order to create a secure environment.

heldere rapportage

Clear reporting

To measure is to know and insights enable you to stay on course. Our pragmatic approach and clear reporting offer you an insight into what is going on, which attempted attacks have been eliminated and how we can improve.

Easy and safe sharing of email and files

If you want to be sure that the information in an email is safe as it travels from the sender to the recipient’s mailbox, the email has to be encrypted. This will ensure that the content of the email cannot be read by third parties while it is on its way.

In short, you need a solution. In many cases, email encryption methods are technically complicated and take a long time to implement. Tesorion’s pragmatic approach will help your organization in terms of, for example, related processes and advice on the technical and human aspects, and we will also ensure seamless implementation and provide user training.

How does it work?

1. You send a confidential message.
2. The encryption key is stored in a safe place.
3. The recipients can open the message using the key.

werking crypsthare uitgelegd

We offer protection to

Publications

Check out the latest relevant news, podcasts and blogs from our experts on this topic here.

Vulnerability
24 April 2024

WakeUp Wednesday

Welcome to #WakeUpWednesday. We want to make the Netherlands digitally safe and resilient. That is why Tesorion will now give you a short overview every Wednesday in a post about…
CERTSOCVulnerability
12 April 2024

PAN-OS GlobalProtect Gateway vulnerability

This live blog contains information regarding a PAN-OS GlobalProtect Gateway vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and…
Network securityTesorion Immunity
4 April 2024

Release Notes Tesorion Immunity

Here you will find the most current release notes of Tesorion Immunity. Do you want to know which devices we support? These can be found on the Supported Device List.Immunity…
View all publications

Unfortunately, cyber-threats are no longer something new. However, a truly coherent cyber-approach is.

Tesorion uses your personal data to send out requested information and possibly for contact by telephone and for marketing and sales purposes. You can change your preferences whenever you want. Read our privacy policy for more information.