Encryption reduces the risk associated with sensitive communications. And yet, like so many of the most effective plans, the encryption process is simple.

Filtering By Machine and By Hand

There are two ways to designate an email to the encryption process. The first is called manual encryption.

Let’s say you have written a sensitive piece of information, such as your social security number, an account number or a password, and you do not want it to be intercepted. All you need to do is type in: “[ENCRYPT],” in either the title or the body of the email. Centerpoint’s email encryption service will do the rest.

What’s Behind the Cloud?

Our filters scan your emails for the text string, “[ENCRYPT].” After the string is found, the system routes your message through our encryption service. The message is immediately stored in a secure data center. The intended recipient is the only person or company who can access the file.

To Use or Not to Use Outlook

Recipients can either set up their hosted exchange server to receive encrypted messages, or they can set up an account to access the e-mail directly from the cloud. Using a hosted exchange server, such as Outlook, is a simple process. The recipient places a token in their Outlook client, and all encrypted messages can immediately be seen through Outlook.

The main disadvantage of using a hosted exchange server is its restriction to a single device. Recipients will find it completely effortless to reach encrypted messages on their primary workstation; however, mobile devices or any additional computers will not have access.

In order to gain access from additional devices, recipients may choose to set up an account with Centerpoint’s cloud portal. This method allows the account owner to read encrypted emails from anywhere and at any time. Each method is 100% secure, so the choice is entirely based upon your preference.

Category: Atlanta IT Service Articles, Date: 6th February 2013, Author: Chris Chao

Real Time Web Analytics