email
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
email [2019/08/08 14:21] – neil | email [2021/07/06 09:26] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
=====Securing your email ===== | =====Securing your email ===== | ||
- | It is vital to secure | + | If you use email — and, let's face it, how many lawyers do not? — it is vital that you secure |
- | You are probably communicating a lot of sensitive information by email, and email is likely to be the system used to reset passwords on other accounts. | + | You are probably communicating a lot of sensitive information by email, and email is likely to be the system used to reset passwords on other accounts. At the very least, secure your email. However, you should also consider if email is the right tool at all – there are [[email_alternatives|alternatives]] which may offer security more appropriate to the risk. |
If your email account gets compromised, | If your email account gets compromised, | ||
Line 10: | Line 10: | ||
====Key points: ==== | ====Key points: ==== | ||
- | * [[#Use a unique password|Use a unique password]]Â | + | * [[email#Use a unique password|Use a unique password]]Â |
- | * [[#Secure your DNS: it's critical|Secure your DNS: it's critical]]Â | + | * [[email#Secure your DNS: it's critical|Secure your DNS: it's critical]]Â |
- | * [[# | + | * [[email#Host your server |
- | * [[#Secure the connection between your mail client and your email server|Secure the connection between your mail client and your email server]]Â | + | * [[email#Secure the connection between your mail client and your email server|Secure the connection between your mail client and your email server]]Â |
- | * [[#Secure the connection between your mail server and the mail server of your recipient|Secure the connection between your mail server and the mail server of your recipient]]Â | + | * [[email#Secure the connection between your mail server and the mail server of your recipient|Secure the connection between your mail server and the mail server of your recipient]]Â |
- | * [[#Consider PGP/GPG for email encryption|Consider PGP/GPG for email encryption]]Â | + | * [[email# |
- | * [[#If you cannot encrypt your email, consider encrypted attachments|If you cannot encrypt your email, consider encrypted attachments]]Â | + | * [[email# |
- | * [[#Do not trust that the sender is who they say they are|Do not trust that the sender is who they say they are]]Â | + | * [[email#Consider PGP/GPG for email encryption|Consider PGP/GPG for email encryption]]Â |
- | * [[#Do not trust unexpected attachments|Do not trust unexpected attachments]]Â | + | * [[email#If you cannot encrypt your email, consider encrypted attachments|If you cannot encrypt your email, consider encrypted attachments]]Â |
- | * [[#Disable automatic loading of remote content|Disable automatic loading of remote content]]Â | + | * [[email#Do not trust that the sender is who they say they are|Do not trust that the sender is who they say they are]]Â |
- | * [[# | + | * [[email#Do not trust unexpected attachments|Do not trust unexpected attachments]]Â |
- | * [[#Be aware of phishing email |Be aware of phishing email ]] | + | * [[email#Disable automatic loading of remote content|Disable automatic loading of remote content]]Â |
+ | * [[email#Don't use tracking pixels or remotely-hosted content|Don' | ||
+ | * [[email#Be aware of phishing email |Be aware of phishing email ]] | ||
====Use a unique password ==== | ====Use a unique password ==== | ||
Line 33: | Line 35: | ||
- | ====Host | + | ====Host |
- | [[firm_website# | + | [[firm_website# |
+ | Â | ||
+ | ====Keep your software up to date====Â | ||
+ | Â | ||
+ | [[firm_website# | ||
====Secure the connection between your mail client and your email server==== | ====Secure the connection between your mail client and your email server==== | ||
Line 51: | Line 57: | ||
====Secure the connection between your mail server and the mail server of your recipient==== | ====Secure the connection between your mail server and the mail server of your recipient==== | ||
- | Ask whoever administers your mail server to configure what is known as " | + | Ask whoever administers your mail server to configure what is known as " |
- | If it can't, it will still transmit your email anyway, and, in doing so, it will pass unencrypted over the Internet. Because of this, if you are sending anything sensitive, encrypt it before | + | When it is correctly configured, when you attempt to send an email to a third party, or someone tries to email you, your server and theirs will have an initial chat, to see if they can make an encrypted |
- | ====Use two-factor authentication | + | You can test if you already have it working for your mail server [[https:// |
- | If you use webmail — where you can access your email through a web browser — use [[two-factor_authentication|two-factor authentication]] on your login. | + | If it can't, it will still transmit your email anyway, and, in doing so, it will pass unencrypted over the Internet.  |
+ | Â | ||
+ | Because of this, if you are sending anything sensitive, encrypt it before you send it by email (e.g. by using [[#Consider PGP/GPG for email encryption|PGP/ | ||
+ | Â | ||
+ | ====Minimise a fraudster' | ||
+ | Â | ||
+ | A common fraud ([[https:// | ||
+ | Â | ||
+ | Spoofing an email — making it look like it has come from your email address — is trivial. You cannot stop someone attempting to spoof an email from your address, but there are some things you can do to lessen the likelihood of it succeeding. | ||
+ | Â | ||
+ | ===SPF ===Â | ||
+ | Â | ||
+ | SPF — sender policy framework — involves setting a text record in your domain' | ||
+ | Â | ||
+ | When someone receives an email, their server will hopefully check your domain' | ||
+ | Â | ||
+ | An example of an SPF record, for domain example.com, | ||
+ | Â | ||
+ | example.com. | ||
+ | Â | ||
+ | There are a number of tools to help you generate your domain' | ||
+ | Â | ||
+ | ===DKIM ===Â | ||
+ | Â | ||
+ | DKIM — DomainKeys Identified Mail — is a mechanism for signing and verifying messages. | ||
+ | Â | ||
+ | As with [[# | ||
+ | Â | ||
+ | What you will need to do will depend on your email server or service provider, so either check the manual or help pages, or get someone who knows what they are doing to help. | ||
+ | Â | ||
+ | ===DMARC ===Â | ||
+ | Â | ||
+ | DMARC — Domain-based Message Authentication, | ||
+ | Â | ||
+ | Because it builds on SPF and DKIM, get those in place first, before you look at implementing DMARC. | ||
+ | Â | ||
+ | As with [[# | ||
+ | Â | ||
+ | From a security point of view, setting your DMARC reject to suggest to recipients that they should reject messages from your domain which fail SPF and/or DKIM checks offers the best security. It requires you to make sure that your SPF and DKIM records are correct and up to date as, otherwise, " | ||
+ | Â | ||
+ | Â | ||
+ | ====Enable two-factor authentication if you use webmail ====Â | ||
+ | Â | ||
+ | If you use webmail — where you can access your email through a web browser — enable | ||
+ | Â | ||
+ | If you can only access the webmail interface via a VPN (i.e. it is not exposed to the public), the risk of not having two-factor authentication is reduced. | ||
====Consider PGP/GPG for email encryption==== | ====Consider PGP/GPG for email encryption==== | ||
Line 88: | Line 139: | ||
[[#Consider PGP/GPG for email encryption|PGP/ | [[#Consider PGP/GPG for email encryption|PGP/ | ||
- | If you need to transfer something sensitive as a once-off by email, put your message, or the files you want to send, into a directory, and then encrypt the directory. Send that encrypted directory to your recipient, via email, and give them the password by a separate, secure channel. Do not email the password, as otherwise you have sent both the thing you are protecting, and the password to access it, by the same means: someone monitoring their email would get both elements. | + | If you need to transfer something sensitive as a once-off by email, put your message, or the files you want to send, into a directory, and then encrypt the directory. Send that encrypted directory to your recipient, via email, and give them the password by a separate, secure channel. |
+ | Â | ||
+ | Do not email the password, as otherwise you have sent both the thing you are protecting, and the password to access it, by the same means: someone monitoring their email would get both elements. Send it some other way, such as by text message, or give it out over the phone. | ||
As with PGP/GPG, this would still leave the subject line and content of the email, along with sender and recipient information, | As with PGP/GPG, this would still leave the subject line and content of the email, along with sender and recipient information, |
email.1565274072.txt.gz · Last modified: 2021/07/06 09:26 (external edit)