User Tools

Site Tools


email

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
email [2019/08/08 14:21] – neilemail [2021/07/06 09:26] (current) – external edit 127.0.0.1
Line 1: Line 1:
 =====Securing your email ===== =====Securing your email =====
  
-It is vital to secure your email+If you use email — and, let's face it, how many lawyers do not? — it is vital that you secure it
  
-You are probably communicating a lot of sensitive information by email, and email is likely to be the system used to reset passwords on other accounts. +You are probably communicating a lot of sensitive information by email, and email is likely to be the system used to reset passwords on other accounts. At the very least, secure your email. However, you should also consider if email is the right tool at all – there are [[email_alternatives|alternatives]] which may offer security more appropriate to the risk.
  
 If your email account gets compromised, it could be very difficult to unpick it. If your email account gets compromised, it could be very difficult to unpick it.
Line 10: Line 10:
  
 ====Key points: ==== ====Key points: ====
-  * [[#Use a unique password|Use a unique password]] +  * [[email#Use a unique password|Use a unique password]] 
-  * [[#Secure your DNS: it's critical|Secure your DNS: it's critical]] +  * [[email#Secure your DNS: it's critical|Secure your DNS: it's critical]] 
-  * [[#Host it (physically) in a suitable country|Host it (physically) in a suitable country]] +  * [[email#Host your server (physically) in a suitable country|Host your server (physically) in a suitable country]] 
-  * [[#Secure the connection between your mail client and your email server|Secure the connection between your mail client and your email server]] +  * [[email#Secure the connection between your mail client and your email server|Secure the connection between your mail client and your email server]] 
-  * [[#Secure the connection between your mail server and the mail server of your recipient|Secure the connection between your mail server and the mail server of your recipient]] +  * [[email#Secure the connection between your mail server and the mail server of your recipient|Secure the connection between your mail server and the mail server of your recipient]] 
-  * [[#Consider PGP/GPG for email encryption|Consider PGP/GPG for email encryption]] +  * [[email#Minimise a fraudster's ability to spoof email from you|Minimise a fraudster's ability to spoof email from you]] 
-  * [[#If you cannot encrypt your email, consider encrypted attachments|If you cannot encrypt your email, consider encrypted attachments]] +  * [[email#Enable two-factor authentication if you use webmail|Enable two-factor authentication if you use webmail]] 
-  * [[#Do not trust that the sender is who they say they are|Do not trust that the sender is who they say they are]] +  * [[email#Consider PGP/GPG for email encryption|Consider PGP/GPG for email encryption]] 
-  * [[#Do not trust unexpected attachments|Do not trust unexpected attachments]] +  * [[email#If you cannot encrypt your email, consider encrypted attachments|If you cannot encrypt your email, consider encrypted attachments]] 
-  * [[#Disable automatic loading of remote content|Disable automatic loading of remote content]] +  * [[email#Do not trust that the sender is who they say they are|Do not trust that the sender is who they say they are]] 
-  * [[#Don't use tracking pixels or remotely-hosted content|Don't use tracking pixels or remotely-hosted content]] +  * [[email#Do not trust unexpected attachments|Do not trust unexpected attachments]] 
-  * [[#Be aware of phishing email |Be aware of phishing email ]]+  * [[email#Disable automatic loading of remote content|Disable automatic loading of remote content]] 
 +  * [[email#Don't use tracking pixels or remotely-hosted content|Don't use tracking pixels or remotely-hosted content]] 
 +  * [[email#Be aware of phishing email |Be aware of phishing email ]]
  
 ====Use a unique password ==== ====Use a unique password ====
Line 33: Line 35:
  
  
-====Host it (physically) in a suitable country====+====Host your server (physically) in a suitable country====
  
-[[firm_website#Host it (physically) in a suitable country|Here]]+[[firm_website#Host your server (physically) in a suitable country|Here]]. 
 + 
 +====Keep your software up to date==== 
 + 
 +[[firm_website#Keep your software up to date|Here]].
  
 ====Secure the connection between your mail client and your email server==== ====Secure the connection between your mail client and your email server====
Line 51: Line 57:
 ====Secure the connection between your mail server and the mail server of your recipient==== ====Secure the connection between your mail server and the mail server of your recipient====
  
-Ask whoever administers your mail server to configure what is known as "opportunistic TLS". When you attempt to send an email to a third party, your server will try to see if can make an encrypted connection to their mail server+Ask whoever administers your mail server to configure what is known as "opportunistic TLS"
  
-If it can'tit will still transmit your email anyway, and, in doing so, it will pass unencrypted over the Internet. Because of this, if you are sending anything sensitive, encrypt it before you send it by email (e.g. by using [[#Consider PGP/GPG for email encryption|PGP/GPG]], or an [[#If you cannot encrypt your emailconsider encrypted attachments|encrypted .zip folder]], or use [[email_alternatives|something other than email]].+When it is correctly configuredwhen you attempt to send an email to a third party, or someone tries to email youyour server and theirs will have an initial chatto see if they can make an encrypted connection before transferring the actual email. 
  
-====Use two-factor authentication if you use webmail ====+You can test if you already have it working for your mail server [[https://www.checktls.com/TestReceiver|here]].
  
-If you use webmail — where you can access your email through a web browser — use [[two-factor_authentication|two-factor authentication]] on your login.+If it can't, it will still transmit your email anyway, and, in doing so, it will pass unencrypted over the Internet.  
 + 
 +Because of this, if you are sending anything sensitive, encrypt it before you send it by email (e.g. by using [[#Consider PGP/GPG for email encryption|PGP/GPG]], or an [[#If you cannot encrypt your email, consider encrypted attachments|encrypted .zip folder]], or use [[email_alternatives|something other than email]]. 
 + 
 +====Minimise a fraudster's ability to spoof email from you==== 
 + 
 +A common fraud ([[https://www.theguardian.com/money/2019/aug/24/the-45000-deposit-for-our-first-home-was-stolen-and-the-banks-did-nothing|example]] is where a fraudster sends an email pretending to be from a lawyer, asking the recipient to do something expected and reasonable, but in favour of the fraudster rather than the solicitor — for example, getting a house buyer to transfer their deposit to a fraudster's email account, rather than the lawyer's client / trust account. 
 + 
 +Spoofing an email — making it look like it has come from your email address — is trivial. You cannot stop someone attempting to spoof an email from your address, but there are some things you can do to lessen the likelihood of it succeeding. 
 + 
 +===SPF === 
 + 
 +SPF — sender policy framework — involves setting a text record in your domain's DNS, which says which IP addresses are permitted to send mail for your domain. This is another reason why [[email#Secure your DNS: it's critical|securing your DNS is critical]]. 
 + 
 +When someone receives an email, their server will hopefully check your domain's SPF record, and determine if the email has come from one of the authorised IP addresses. If not, it might be marked as spam / junk, or else rejected. 
 + 
 +An example of an SPF record, for domain example.com, is: 
 + 
 +  example.com.  IN TXT "v=spf1 mx ip4:203.0.113.7/32 ip6:2001:db8::/32" 
 +   
 +There are a number of tools to help you generate your domain's SPF record. For example, [[https://mxtoolbox.com/SPFRecordGenerator.aspx?|here]]. 
 + 
 +===DKIM === 
 + 
 +DKIM — DomainKeys Identified Mail — is a mechanism for signing and verifying messages. 
 + 
 +As with [[#spf|SPF]], you need to add a text record to your domain's DNS, but, for DKIM, you also need to make changes to your mail server's configuration.  
 + 
 +What you will need to do will depend on your email server or service provider, so either check the manual or help pages, or get someone who knows what they are doing to help. 
 + 
 +===DMARC === 
 + 
 +DMARC — Domain-based Message Authentication, Reporting & Conformance — is an authentication and reporting mechanism. It builds on [[#spf|SPF]] and [[#DKIM|DKIM]], and lets a sender state whether their email are protected by either or both of these things, and what a recipient should do if those tests fail. 
 + 
 +Because it builds on SPF and DKIM, get those in place first, before you look at implementing DMARC. 
 + 
 +As with [[#spf|SPF]] and [[#DKIM|DKIM]], this is another text record for your domain's DNS. 
 + 
 +From a security point of view, setting your DMARC reject to suggest to recipients that they should reject messages from your domain which fail SPF and/or DKIM checks offers the best security. It requires you to make sure that your SPF and DKIM records are correct and up to date as, otherwise, "genuine" email might be rejected. 
 + 
 + 
 +====Enable two-factor authentication if you use webmail ==== 
 + 
 +If you use webmail — where you can access your email through a web browser — enable [[two-factor_authentication|two-factor authentication]] on your login. 
 + 
 +If you can only access the webmail interface via a VPN (i.e. it is not exposed to the public), the risk of not having two-factor authentication is reduced.
  
 ====Consider PGP/GPG for email encryption==== ====Consider PGP/GPG for email encryption====
Line 88: Line 139:
 [[#Consider PGP/GPG for email encryption|PGP/GPG]] is not for everyone and, even if you use it, it is of no use if your intended recipient does not. [[#Consider PGP/GPG for email encryption|PGP/GPG]] is not for everyone and, even if you use it, it is of no use if your intended recipient does not.
  
-If you need to transfer something sensitive as a once-off by email, put your message, or the files you want to send, into a directory, and then encrypt the directory. Send that encrypted directory to your recipient, via email, and give them the password by a separate, secure channel. Do not email the password, as otherwise you have sent both the thing you are protecting, and the password to access it, by the same means: someone monitoring their email would get both elements.+If you need to transfer something sensitive as a once-off by email, put your message, or the files you want to send, into a directory, and then encrypt the directory. Send that encrypted directory to your recipient, via email, and give them the password by a separate, secure channel. Â 
 + 
 +Do not email the password, as otherwise you have sent both the thing you are protecting, and the password to access it, by the same means: someone monitoring their email would get both elements. Send it some other way, such as by text message, or give it out over the phone.
  
 As with PGP/GPG, this would still leave the subject line and content of the email, along with sender and recipient information, available to anyone. As with PGP/GPG, this would still leave the subject line and content of the email, along with sender and recipient information, available to anyone.
email.1565274072.txt.gz · Last modified: 2021/07/06 09:26 (external edit)