Blog

How You Can Keep Prying Eyes Off the Emails You Send

How You Can Keep Prying Eyes Off the Emails You Send

Email remains a cornerstone in business communications, often containing sensitive information and other data that really needs to be protected. Fortunately, modern email platforms often enable you to add a little bit of protection, so long as you know what the process looks like. 

Let’s go over how you can make your emails just that much more secure.

To do so, we’ll review what Gmail and Microsoft Outlook allow you to do—and don’t forget, we’re here to help you do these things should you need assistance with this or any aspect of your IT.

Securing Emails Sent Via Gmail

Gmail offers a few options to help you protect your messages. Firstly, you can seal an email message behind a password that will be delivered to a mobile number of your choosing. This is called Confidential Mode, and prevents the recipient from doing much more than reading and replying to your email. They can’t copy, forward, download, or even print the message with it activated.

Using it is simple:

  • Open Gmail and start a new message by clicking Compose
  • You’ll find a small lock icon at the bottom of the message window. Clicking it will activate Confidential Mode.
  • You can then set an expiration date for your message, with the options One day, One week, One month, Three months, or Five years.
  • You can then protect your encrypted message via a SMS Passcode, where you set the access code and can have it sent directly to the recipient’s mobile device. If you skip the password option by selecting No Passcode, recipients will only be able to view the message, not download or copy from it.

This entire process also applies to the attachments that are paired with the email you’ve protected.

Businesses utilizing a paid Google Workspace account also have a form of encryption (S/MIME, or Secure/Multipurpose Internet Mail Extensions) applied to emails as they are hosted on a dedicated email server.

Securing Emails Sent Via Outlook

Outlook comes with a feature that you can enable, called Open Message Encryption, that can be accessed through any email provider, both protecting it from interception and preventing it from being forwarded or printed by the recipient. Applying it to a message is also rather simple, in either the web or desktop application:

In the Outlook Web App:

  • Start a new message by clicking the New message button.
  • Click the Encrypt button you’ll find in the message window.
  • Above the To button, you’ll see the option to Change permissions. Select it.
  • You’ll be able to select the appropriate level of permissions for that message.
  • Complete your message, and click Send.

In the Outlook Desktop App:

  • Navigate to the Home tab and select New Email.
  • A message window will appear. Click into the Options tab.
  • Click into Permissions, and select the appropriate permissions to apply to the message.
  • Complete your message, and click Send.

It’s Important to Embrace Every Security Option Available

We can help you to do so, too. Give White Mountain IT Services a call at 603-889-0800 to learn more about how we’ll assist you in securing all aspects of your business.

Related Posts

With technological advancements, challenges arise, and technical issues inevitably occur. This is where an IT help desk comes into play. Let’s explore how an IT help desk operates and why it is a valuable asset for any business.

The United States Federal Trade Commission’s mandate is to prevent fraud and promote consumer protection in today's interconnected world, where the digital landscape continues to evolve at a rapid pace. The FTC recognizes the importance of safeguardi...
How does your business handle communication? Does it struggle to properly use its technology and collaboration tools? If so, we have some tips that can help you avoid the most common collaboration mistakes, particularly those related to data security...
We discuss phishing often on this blog, and one method that often flies under the radar is smishing, or phishing that is conducted through SMS messages. Although email phishing is perhaps the most common method of conducting these scams, you should a...
It’s important that you are able to communicate with the people you work for, with, and over; and a big part of this is ensuring that your points are heard. Let’s go over a few strategies and techniques that can help you ensure that those around you ...
Amazon Prime subscribers recently received an email from the online marketplace, warning them of the prevalence of scams that took advantage of their offerings and brand recognition. Let’s go through the advice that this email shared, and compare it ...
With collaboration remaining an important component of any successful business, it’s important to foster productivity and innovation through strategic implementation of technology solutions designed for this express purpose. Today, we want to discuss...
Nowadays, you can’t afford not to have some portion of your business’ budget set aside for cybersecurity. The question is, how much do you need, and what should you be spending it on first? Let’s take a few moments to dig a little deeper into this qu...
Your business has to promote security whenever it can. In terms of keeping your wireless connections secure, the thought behind it is that if unauthorized people and machines can access your network without protections, they can do what they please w...
We talk a lot about phishing. What it is, what it does, and perhaps most critically, what it looks like. However, have you ever expected a phishing email to look like… nothing? As in, a completely blank message? If you answered, “no,” that’s exactly ...
A business’ operations are heavily influenced by the quality of its communications. However, the overwhelming number of options that are available today can make it challenging to decide how to invest in your technologies. Let’s talk about how you ca...
While it is important that your business implement comprehensive network protections, there are plenty of simple ways that your business’ cybersecurity could potentially fail. This could easily cost you heavily in your available capital, financial an...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our offices in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.

 

Onsite Computer Support Services are available to businesses within 60 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem NH and Portsmouth NH area.

White Mountain IT Services

 


33 Main St, Suite 302
Nashua, NH 03064

 


121 Riverfront Drive
Manchester, NH 03102

 

Client Help Desk      603-889-2210

New Client Inquiries   603-889-0800

Open Positions