Back to contents

Email encryption

In today's climate of data security, it's a serious risk to go unencrypted. Find out how to protect your emails and share sensitive information without risk.

What is email encryption

Transportagent600x400

What’s a transport agent and how does it work?

Learn what a transport agent is and understand how it routes email messages between users and manages deliveries.

Read article
Smimex2600x400

What is S/MIME: Everything you need to know

Learn how enabling S/MIME brings several advantages to your organization's email security. 

Read article
Tls600x400

Real-world email security – is TLS the answer?

Traditional message encryption protocols such as PGP have often thrown up barriers for both sender and recipient. They remain too technical and complex for the average user, resulting in potentially low adoption rates.

Read article
Tlsencryption600x400

What is TLS email encryption?

Transport layer security (TLS) is widely used and many governing bodies recommend it. But how does it work, and what are the potential drawbacks?

Read article
Gdpremailencryption600x400

The facts about GDPR and email encryption

Email encryption is recommended under EU and UK GDPR - but why? And what are the exact requirements?

Read article
Businessemailencyrpting600x400

Why your business should be encrypting emails

Understand the risks of going without email encryption as well as the benefits it could bring to your business. 

Read article
Sendencryptedemail600x400

How to easily send and open encrypted email

Learn how to keep your data safe by easily sending and opening encrypted emails within Outlook.

Read article
How Does Email Encryption Work600x400

What is encrypted email?

Encrypted email should be a key part of every business' cybersecurity strategy. Find everything you need to know here.

Read article
Filesharing600x400

Quick guide to secure file sharing

Sharing data is something we all need to do - but how do we make the process secure? Find out in our latest guide.

Read article
Emailanalysis600x400

The quick guide to email content analysis

Content analysis uses contextual machine learning and DLP policies to check an email’s content against intended recipients in order to spot any abnormal behaviour and prevent a security breach before it can even happen.

Read article
Locked 600X400 38Kb

Guide to email encryption

Email encryption can be complicated. That's why we've created this simple guide which breaks down different types of encryption, so you can decide what works best for your business,

Read article
Whyencryptemail600x400

Why should you encrypt email?

As a communication method and for sharing data, email is as popular as ever. Despite the influx of other messaging and online secure file sharing solutions, it remains the most widely used tool for organisations to transmit and receive sensitive data.

Read article
Microsoft Email Scams 600X400

How to encrypt emails in Microsoft 365

Sending emails via Microsoft 365? Learn how to encrypt them and keep your data safe.

Read article
Devices600x400

Email encryption and authentication made easy

Learn how to give your recipients secure and seamless access to encrypted email content.

Read article
Encryption101 600x400 32kb

Encryption 101: Back to basics

Looking at a few of the oldest known ciphers, which demonstrate the fundamentals of encryption.

Read article
Encryption101 600x400 32kb

Encryption 101: Columnar transposition cipher

This post will focus on a columnar transposition cipher – a slightly more advanced transposition cipher that produces very different results.

Read article
Encryption101 600x400 32kb

Encryption 101: Substitution ciphers

The basic idea of a substitution cipher is a simple one: take one letter in your message, let’s say ‘A’, and replace it with a different letter, such as ‘E’. Sounds familiar?

Read article
Encryption101 600x400 32kb

Encryption 101: The next encryption revolution

Regardless of what you make of the ethics of the Edward Snowden revelations from 2013, the one thing that can be said confidently is that they started a global discussion about the safety and security of our data

Read article
Encryption101 600x400 32kb

Encryption 101: The Vigenère cipher

The Vigenère cipher is a polyalphabetic substitution cipher and offers some defence against letter frequency analysis. In essence, rather than using a single alphabet when encrypting information, we make use of multiple alphabets – 26 of them to be precise.

Read article
Advancedphishingthreat600x400

Encryption and authentication don’t need to be painful! Here’s how.

Email encryption and authentication are vital for keeping your comms secure. Find out how to make the process pain-free for your recipients.

Read article
Email Encryption600x400 15kb

How does encryption remove risk for auditors?

Understand how encryption works and the benefits it can bring to anyone working in the security space.

Read article
Cloud 600x400 14kb

Securing the cloud: Message-level encryption in Office 365

If current trends continue, in the not too distant future all organisations will use hosted mailboxes. The huge uptake and success of Office 365 for mail services indicates that the days of on-premise mailboxes are numbered

Read article
Next gen typing 600x400 18kb

Email redaction with Egress

Remove sensitive data from outlook emails and attachments to prevent high-risk data breaches

Read article
Nhs600x400

Alternatives to fax in the NHS: how to secure patient data

NHS trusts have been banned from purchasing new fax machines, as part of a modernisation effort that will phase out the technology completely by 2020 and improve NHS data standards.

Read article
Broken Vulnerability 600X400 38Kb

PGP and S/MIME have critical vulnerabilities. What about Egress?

Many Egress users may have heard recently about the security flaws discovered in PGP and S/MIME. The vulnerabilities can mean that messages encrypted using these methods are vulnerable to attacks.

Read article
Tlsemailencryption600x400

Protect email using TLS

Different organization have different data security needs, often dictated by industry regulations. For organizations wanting to secure data in transit, but happy for recipients to receive the email in clear text, TLS encryption can be applied.

Read article
Tlsencryption600x400

Real-world email security – is TLS the answer?

Traditional message encryption protocols such as PGP have often thrown up barriers for both sender and recipient.

Read article
Dmarc data microchip 600x400 40kb

Study shows that poor HTTPS interception is compromising security and putting users’ data at risk

A new study has shown that HTTPS interception, the practice of decrypting and scanning HTTPS connections to monitor traffic for security vulnerabilities, is a much more common feature in security software processes than first thought.

Read article
Email Encryption600x400 15kb

What is Egress Prevent and risk-based email protection?

Egress Prevent uses machine learning and advanced data analytics to secure and protect your sensitive email communications.

Read article
Encryptionmicrosoftemails600x400

How to encrypt Outlook emails in transit

Working with Outlook? Find out how to securely encrypt your emails in transit. 

Read article
Five Benefits Email Encryption600x400

Five key benefits of a secure email encryption solution

Check out the five best reasons to start using email encryption today.

Read article
How Does Email Encryption Work600x400

How does email encryption software work?

Email encryption software is a valuable business tool. Learn how it works in our latest guide.

Read article
Connect Web 600X400 40Kb

Network Encryption

Network layer encryption involves encrypting data as it is sent from one node, and decrypting it on arrival at another. When done correctly this approach plays a valuable role in the “defense in-depth” approach to security by adding a vital layer of encryption on data at the network layer.

Read article
Network600x400

Opportunistic TLS vs Forced TLS

A lot of messaging technology that has been invented recently uses end-to-end encryption, but most emails are not sent like this. A typical email provider relies on the Simple Mail Transfer Protocol (SMTP) to encrypt emails during transmission, often using Transport Layer Security (TLS).

Read article
Smime Key 600X400 35Kb

S/MIME: Is it right for my organization?

Finding an email security solution that prevents data breaches and keeps your system protected can be difficult. Most importantly, your organization needs security protocols that are reliable, easy to use and cost-effective – and ideally integrate seamlessly with your existing IT infrastructure.

Read article
Tlsemailencryption600x400

TLS email encryption: What you need to know

Find out everything you need to now about TLS email encryption in our latest guide. 

Read article
Smimex2600x400

What is S/MIME and how does it work?

S/MIME is a security protocol that digitally signs and encrypts emails. Learn how it works and why it could benefit your business.

Read article
Why Use An Ecryption Service600x400

Why use an email encryption service?

You've probably heard about email encryption. But what are the tangible benefits encryption software can bring to your business?

Read article
Yourbusinessneedsemailencryption600x400

Your business needs enforced email encryption! Here's why

Businesses must keep their email safe. Learn more about what enforced email encryption is and why your business needs it.

Read article
Investigate Magnifying Glass 600X400 36kb

What is S/MIME, and is it right for the modern organisation?

The search for an email encryption solution that suits your organisation’s needs can be a bewildering experience.

Read article

Want to read more on other cybersecurity topics?

Find the answers you need from our bank of first-hand research and thought leadership.

View all cybersecurity topics