What are the top risks experienced when sending sensitive files to external stakeholders by email?
The top risks incurred by orgs fall into these four main categories: insider risks, active threats, technical failures, and supply chain risks. It's worth noting that risks can arise from behaviors both unintentional and intentional.
It is a truth universally acknowledged that email remains the default tool for external collaboration despite its risks. Across industries and sectors, teams frequently turn to email when working with external stakeholders, drawn by its ubiquity, ease of use, and broad acceptance.
Email's role extends beyond just exchanging messages; it has also become a common medium for transmitting sensitive files. This dependence on email is rooted in its ability to facilitate direct, swift communication, enabling organizations to share documents and make decisions efficiently. It serves as a bridge between organizations with different processes, procedures, and technological infrastructures. For example, during contract negotiations between a company and an external supplier, email are used to exchange contract documents.
However, the reality of using email to send sensitive files is replete with risks. This article is dedicated to exploring these risks. We delve into the security challenges of relying on email for sensitive file transmission in external collaborations, examining the implications for all parties involved.
For many people, cybersecurity concepts like threats, vulnerabilities, and risks merge in their head. We talk about the threat of hacking, or systems that are vulnerable to intrusion, or the risk of loss from a data breach. These things all sound the same, but they are not the same thing. To better understand the risks created by sending secure files by email, we also need to understand concepts like threats and vulnerabilities.
Before we go on, let’s quickly define those terms.
One common view of threats, vulnerabilities, and risks is the following view. In essence, threats combine with vulnerabilities to create risks.
This is the mental model we’ll use in the next section as we consider the risks created by sending sensitive files by email.
Colloquially, “sensitive files” are files or documents that include data or content that you’d rather not see widely distributed. Because of the recent focus on personal privacy regulations such as the European Union’s General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), many organizations have assumed that sensitive files only pertain to documents, files, or systems that might contain “special categories of personal data.”
That’s far too limiting, especially when we look through the lens of external collaboration. From this point of view, sensitivity is much more expansive, it goes beyond just personal data to include any documents or files that either party would prefer to keep confidential. We can see this by using the standard classification scheme found in ISO 27001:
Public: Information that is non-confidential and can be freely distributed. By definition, no sensitive files should exist here.
Internal: Data intended for internal use, with access controlled by management.
Example of sensitive files:
Customer Data: Information from customers, handled with high confidentiality and integrity.
Example of sensitive files:
Company Data: Operational data crucial for the business, requiring strict confidentiality.
Examples of sensitive files:
Notice that with ISO 27001’s more party-driven categorization, what might not appear sensitive to your party may be very sensitive to the other (i.e., all the material in the customer data classification) and vice versa. In fact, mishandling these files can lead to breaches, legal repercussions, and loss of trust–hardly what you want when trying to collaborate with an external stakeholder. This wide spread of sensitive files (yours, mine, and ours) underscores the importance of thinking beyond your security and confidentiality requirements, and considering your external stakeholder’s requirements. And protecting these files requires robust security measures like encryption, access control, and secure collaboration platforms that ensure confidentiality while maintaining efficiency.
When we think about the risks of email, it's common to focus on active threats — the hacker breaking into your email server, phishing attacks, or emails being intercepted by a malicious party. However, the categories of risk extend far beyond those dramatic scenarios. Understanding these risks is crucial for organizations to protect sensitive information effectively and maintain trust with external stakeholders.
Our overview covers key categories of risk observed in email communication. Note that while environmental factors (e.g., natural disasters) and regulatory issues are also important, they are not included in this overview to focus on the most direct risks related to email communication.
Often the most common source of security incidents, these risks arise from within the organization and can be both unintentional and intentional. It’s worth noting that unintentional errors can be just as damaging as malicious efforts by insiders. Insider risks include, but are not limited include user errors (like sending emails to the wrong recipient), accidental exposure of data due to lack of awareness, and deliberate actions by malicious insiders.
Wrong Recipient: A common error where emails are accidentally sent to the wrong person.
Wrong Attachments: Occurs when an email is sent to the right person, but with the wrong attachments, potentially exposing sensitive data.
Wrong Attachment Versions: Involves distributing a file that is outdated or not meant for sharing, leading to misinformation.
Information Overload and Mismanagement: Risks created due to issues in managing high volumes of email effectively.
Employee Burnout and Productivity Loss: Negative impact of excessive email usage on employee well-being.
Lack of Training: Risks arising from employees not being adequately trained on email security protocols.
Malicious Insiders: Deliberate actions by insiders to leak sensitive information for personal gain or to harm the organization.
This category includes deliberate, external efforts to compromise email security. It encompasses hackers targeting email servers, phishing and social engineering schemes to deceive users, interception of emails, as well as sophisticated cyberattacks and espionage (APTs). These threats aim to steal data, disrupt communication, or gain unauthorized access.
Phishing/Social Engineering: Deceptive practices aimed at tricking users into divulging sensitive information or credentials.
Malware/Ransomware: Malicious software spread via email, designed to damage systems or hold data for ransom.
Hacking: Unauthorized access attempts to breach email systems and gain access to sensitive data.
Unauthorized Access: Intrusions where unauthorized individuals gain access to email accounts or servers.
Email Interception: Unauthorized interception and reading of email communications during transmission.
Technical issues such as hardware and software failures, outdated systems with unpatched security flaws, and inadequate network security can lead to significant risks, including data loss and compromised email integrity.
Hardware/Software Failures: Failures or malfunctions in the hardware or software supporting email systems.
Outdated Software: Use of email software or systems that are not regularly updated or patched.
Excessive Email and Attachment Retention: Storing large volumes of emails and attachments in inboxes for extended periods.
Network Security Weaknesses: Inadequate security measures for the network infrastructure supporting email communication.
Risks associated with third-party services and vendors, including vulnerabilities in third-party email services and integration issues with other business applications, can affect the security of email communications.
Vendor Compliance and Regulation Risks: Risks arising from vendors not adhering to legal and regulatory standards.
Third-Party Vulnerabilities: Security weaknesses in third-party services, like email hosting or cloud storage, used by organizations (includes forth-party or subcontractor risks).
Supply Chain Interruption Risks: Risks of disruptions in the supply chain affecting the availability or integrity of critical email services or other operations.
Reputational Risks: Risks stemming from association with vendors involved in unethical practices or data breaches.
To effectively mitigate the risks associated with sending sensitive files by email, traditional methods like encryption, using secure email gateways, implementing strong password policies, and regular cybersecurity training for employees are essential. These practices form the backbone of a secure email communication strategy, ensuring basic safeguards against many of the risks outlined earlier.
However, as our understanding of collaboration tools evolves, a more fundamental approach to risk reduction emerges. One of the most effective strategies to mitigate these risks is, quite simply, to reduce reliance on email for sending sensitive files.
In today's digital landscape, numerous external collaboration platforms offer robust security features tailored for sharing sensitive information. These platforms often provide better control over who can access the information, audit trails, the ability to retract access, and secure environments for collaborative work without the need to send files back and forth via email.
For instance, platforms like TakeTurns offer sophisticated security measures and collaboration features that email lacks. They allow real-time collaboration, version control, secure file sharing, and integration with other tools, significantly reducing the risks associated with email communication.
By transitioning to such platforms, organizations can not only enhance the security of sensitive information but also improve collaboration efficiency. This shift represents not just a technological change but a strategic move towards a more integrated, secure, and efficient way of handling external collaborations.
While emails remain a staple in business communication, their role in sharing sensitive files should be re-evaluated in light of the inherent risks involved. By combining traditional email security practices with the adoption of external collaboration platforms, organizations can significantly reduce the risk of data breaches and other security incidents. This dual approach ensures not only the protection of sensitive information but also fosters a more collaborative, productive, and secure working environment.