What, me worry (about my emails)?

What, me worry (about my emails)?

I never thought I would see the day where executives and major public figures would be proud of their techno-luddite status. Scratch that. Not proud, but grateful. In a story in today’s New York Times, several senators and other public figures are quoted about how they have given up their personal email accounts, or have begun scrubbing their sent folders, thanks to the recent series of leaks from the mailboxes of the DNC and Colin Powell.

Senator Lindsey Graham said, “I haven’t worried about an email being hacked since I’ve never sent one. I’m, like, ahead of my time.” Senator Chuck Schumer is noted for still using a flip phone. And of course there are the email-related stories that doggedly follow one of our presidential candidates around. All of a sudden, it is cool to be more disconnected. Especially ironic, given today is also the day millions will flock to the nearest Apple Store and buy a phone that doesn’t have a headphone jack. (Shelly Palmer’s rant on this is pure pleasure.)

The hacked emails seem to be genuine, at least according to press reports and the impact they have had with the shake up of the DNC leadership. But they have also had the effect that others in the public eye are reconsidering the contents of their own message store.

I have even learned a new acronym: LDL, for let’s discuss live. Meaning, “too hot to talk about in email.”

So let’s all just take a deep breath and look calmly at a few simple rules for your own email usage going forward. First off, yes, emails can be compromised. Don’t say anything there that you wouldn’t want anyone else to read. While you may not think you are a target or of any interest, you have no control over where that message might end up. You might want to walk down the hall for a quick FTF meeting, or even pick up the phone. Think about the 80’s.

Second, if you are very worried, start using encryption, and make sure it covers the complete path end-to-end. There are several instant messaging platforms that are easy to use (Network World did a recent review comparing them, and I have written reviews of encrypted email products for them as well). Yeah, I know, encryption is a pain, but the current crop of products is actually pretty easy to deploy and use. Having said that, hardly anyone sends me encrypted emails, ever.

Third, take a moment to review your password collection for your communications products, including your IMs, email accounts, voice mails and VoIP products. If you use the same password for more than one of these tools, take a day and install LastPass or some other password manager and start treating these passwords more seriously. Do it this weekend.

Finally, don’t hide behind your personal accounts such as Facebook or a non-corporate email address. Those are just as much at risk, as one network anchor realized who hurriedly deleted his Gmail account that was cited in the Times story. Everything is discoverable and vulnerable these days.

Marianne O'Connor

Marketing and comms pro who helps mission-driven tech companies stand up, stand out, and stand for something.

8 å¹´

LDL - love it. Quite the pendulum swing we have going on!

要查看或添加评论,请登录

David Strom的更多文章

  • Where is our national cybersecurity strategy? All over the place

    Where is our national cybersecurity strategy? All over the place

    where I talk about the goal of the White House’s cyber strategy is to make our digital ecosystem more defensible…

  • Document your network

    Document your network

    Over the weekend, I had an interesting experience. Normally, I don’t go into my office then, which is across the street…

  • Everyone is now a software company

    Everyone is now a software company

    Several years ago I wrote, “everyone is in the software business. All of the interesting business operations are…

    1 条评论
  • Hacking 911 systems: an update

    Hacking 911 systems: an update

    It isn’t often that there is a very short trajectory from an academic research paper to reality, but when it comes to…

  • Simple steps to secure your SMB network

    Simple steps to secure your SMB network

    If you run your own small business network, chances are your security could be better. Consider these two news stories…

  • This campaign isn't like high school

    This campaign isn't like high school

    This week I had a chance to talk to some high school kids in the area. They are part of a business class that is…

  • The different worlds of digital and analog entertainment options

    The different worlds of digital and analog entertainment options

    What do the TV series House of Cards, Moneyball pitcher Chad Bradford, women’s erotica purchases, You Tube Spaces and…

  • The debate between privacy and security

    The debate between privacy and security

    It seems as if we are headed for a showdown between privacy and security. I don’t think I have seen a time where there…

    5 条评论
  • When searching for yourself isn’t just for vanity

    When searching for yourself isn’t just for vanity

    How often do you search for yourself or your own business? This isn’t an idle curiosity, and it isn’t just because we…

  • Better cybersecurity training through gaming

    Better cybersecurity training through gaming

    I came across a report entitled Video Games as a Training Tool to Prepare the Next Generation of Cyber Warriors by the…

社区洞察

其他会员也浏览了