“When you move your business to the cloud, it is important to ensure your information security. Information security management is based on trust, and it is a good idea to remember the old saying ‘Don’t put all your eggs in one basket’,” says Miikka Sainio, Chief Technology Officer (CTO) at SSH.
Businesses and organizations are increasingly using cloud services – as they should. The cloud enables us to work independently of time and location. However, in terms of information security, it is problematic when all information is processed in the cloud.
Miikka has five tips for combining cloud services and encryption solutions.
The old and familiar principle of distributing information security controls in multiple locations is still a good and functional solution. In this way, the use of cloud services also becomes more secure. It is worth remembering this especially now that the use of cloud services is increasing all the time.
“We support companies in their transition to the cloud, but at the same time, we want their important data to be protected in an easy way. We recommend, for example, using a separate Secure Mail email encryption solution for secure email communication. The most valuable messages, at least, should be placed in their own location – just for the sake of security,” says Miikka.
Email encryption services must be easy to use, and they must work in the most common email environments.
This is exactly what SSH concentrated on when developing their email encryption solution, according to Miikka: “This is what we have focused on in particular in our own Secure Mail service. When the service is acquired and taken into use, an encrypted email can be sent by simply adding ‘.s’ to the end of the recipient’s email address.”
The Secure Mail solution works in the most common email applications, and no separate software installation is needed for the users. It is quick and easy to take the Secure Mail encryption solution into use. It is used extensively in the popular Microsoft Office 365 cloud environment, for example.
We need email encryption because using an ordinary email is as secure as sending the information on a postcard. It may go through the mailing process without any information leaks, but just like the postcard, an email offers no guarantee of information security. Therefore, it is not advisable to send critical information using either of these methods.
A good email encryption service should offer various levels of security that align with data categorization. For example, in Secure Mail, you can select the degree of encryption based on four security levels:
Learn more about the importance of aligning security practices with data categorization in our Essential Guide to Securing Critical Business Communications and Data Sharing.
In digital communication, it is important to ensure secure sharing of information comprehensively. In addition to email, for example, the information security of digital forms and documents must be considered.
“We also provide straightforward solutions for secure sharing of electronic forms and confidential file sharing. Additionally, our services support one another and make up an easy-to-use and secure package,” adds Miikka.
It is not a good idea for an organization to encrypt and process all information in the same way. For example, most emails do not need to be encrypted. However, it is important to understand that information, which needs to be encrypted, should be handled consistently throughout the whole organization, from customer service to management.
When developing information security protocols, it is important to understand which of the information within the company must be processed with special care.
As Miikka adds to the fifth tip: “There is no need to do this kind of information management planning on your own. It is much better to get an expert in the field to do it for you instead. We help you find a suitable expert to support you in planning your information management. We also have more than 50 partners who deliver our licenses to various organizations of different sizes.”
If you’re looking for an email encryption solution, check out our Secure Mail solution. You can also contact us here.
Benefits of Secure Mail: