Your encryption solution could be the best-of-breed technology, have the most advanced features for tracking messages—it might even have won a shiny award from analysts at some firm, but you may still be at risk for data leakage. Why? Because your employees aren’t using it. In fact, 69% of organizations surveyed by the Ponemon Institute last year indicated they believe employees frequently violated policies for email encryption, while 61% indicated that employees use insecure email channels, such as personal Web-based email to send confidential data. So why are employees failing to encrypt sensitive company emails? Are they dumb? Lazy? Resentful they missed a bonus this year?
While it’s easy enough to blame the user, the truth is that email encryption software has become a commodity that’s fairly easy to obtain, but often difficult to use and manage. Over half of email encryption users are frustrated with their encryption solutions being inflexible difficult to use, according to a recent email study. With the average business email user sending and receiving 115 emails per day, it’s no wonder they avoid the 8-10 steps necessary to send or receive a message using antiquated, commoditized encryption technology. But with a high volume of emails being exchanged, potentially unsecured, users are exposing the organization to the very real risk of data leakage.
So what do you do? Do you bite the bullet, keep your 10-step process and hope the losses from productivity outweigh the alternative of a data breach? Evidence would suggest that users would continue to fumble with and avoid such a system—leaving your organization still at risk to a data breach at the email gateway.
True Security Has Usability
It doesn’t matter how secure the technology is if it’s too difficult to use, employees will avoid and circumvent it. Security needs everyone to adopt it, and every change of behavior, additional step or extra click is a hassle that makes a solution more difficult to use and adopt. To encourage adoption solutions must be flexible and simple enough to compliment the email, mobile and tablet solutions users are already comfortable with.
For more information on how encryption can work seamlessly with your existing email and encourage user adoption, visit the Email2 Product Page.