Customers With Disabilities
  • Shop

    Order Services

    See All Plans & Bundles

    Special Deals



    Current Customers

    Add or Change Services

    Renew or Change Bundle

    Find out which Verizon services are available at your address.

  • My Verizon

    Email & Calls

    Check Email

    Verizon Visual 411



    Bill & Payment

    View Bill

    Pay Final Bill

    Manage Auto Pay

    Manage Paper Free Billing

    My Services

    Add or Change Services

    Suspend My Service

    Renew or Change Bundle

    Review Account

    Manage My Internet

    Manage My Voice


    My Rewards+

    Manage My Rewards+

    Refer a Friend




  • Support

    Community help





    Search Support

    Connect with us

    Verizon on Facebook Verizon on Twitter Verizon on Google Plus Verizon on YouTube

  • Watch Fios

    Watch thousands of your favorite TV shows and movies On Demand and Live. Rent or buy your favorites
    and watch them on any device. Or, check what's on tonight and program your DVR. You can do it all!

    Watch Free TV & Movies



    Rent or Buy

    Set your TV Viewing Experience

  • Trending

    Check out this personalized, real-time feed featuring the latest content and entertainment from around the Web including new headlines, sports, entertainment and more.

    News & Lifestyle

    Have a laugh, learn a trick and discover the awesomeness of Fios. Explore Fios Lounge today.

    Fios Lounge





The Verizon Small Business Facebook and Twitter pages have launched. Follow Us at and Find Us at

Email Under the Encryption Microscope

by Employee on ‎12-07-2011 10:33 AM

Mike.pngGuest post by Michael Ginsberg, CEO, Echoworx,a leading provider of managed encryption services to protect confidential information from unauthorized viewers and make the encryption of digital information easy.



There has been a landslide of incidents that have brought to light the issue of protecting information exchange in recent months - especially when it comes to email correspondence.


A sizeable portion of emails contains confidential information relating to employees, customers or company activities. Not only does this present risk from a compliance standpoint, leaking sensitive information to the outside world can erupt into a PR nightmare, leading to lost revenues and a damaged reputation. While for the most part these lapses may be inadvertent, the aftermath can be devastating.


Surprisingly, many aspects of email continue to be unmonitored and documentation is exchanged without thought to who can access that information and for what purpose.


Forrester in fact reports that email ranks only second to portable storage as a source of data leakage. While organizations have been diligent about addressing the obvious privacy issues – such as personal health information or financial details – it is becoming increasingly evident that information leakage is still happening more often than it should. And unfortunately, it’s happening through one of the most common forms of business communications available.


One way to alleviate the security burden is encrypted mail, where sensitive emails can be encrypted directly from the employees desktop.


With the desktops now taken care of IT has more challenges to tackle with the explosion of smartphones onto the market, as employees are embracing BYOD (bring your own device) and are using their smartphones for business correspondence and other sensitive communications. Due to the variety of devices and platforms, IT is unable to monitor these mobile communications.  


This was not a concern when mobile phones were primarily used for voice and personal communications. Now however, business users are turning to their smartphones to text, e-mail, and forward files—all activities that used to be managed by desktop functions where security and authentication processes are well in hand.


This is reminiscent of the early days of wireless networks, when staff took to installing their own routers. This rogue activity undermines the traditional centralized IT management approach. If an iPad or BlackBerry is stolen for example, there’s very little an IT manager can do to safeguard that information. On top of that, credential management for mobile communications is minimal—or in some cases non-existent.


The issue definitely began taking centre stage when the iPhone and Android devices came into the picture. Android especially brings an added risk to the equation, since applications can be downloaded from any location, rather than a centrally managed app store.


At this point in time, it’s safe to assume that every phone is potentially a business device and therefore a danger to security and information integrity.


To get additional information on email encryption, watch this webinar (or go to




About Verizon's Small Business
Get news from Verizon about small business services and market trends that affect your bottom line. Here, you'll find tips and commentary from the Verizon small business group and other experts to help keep your business growing.


Contact the editor:

About the Authors

Tracey Kennedy

Senior Manager: Verizon Small Business

Photo of Tracey Kennedy

Tracey provides Small Business Marketing support and is the voice of many Verizon Automated Notification Announcement marketing campaigns.


My Verizon

  • Check Email
  • Add or Change Services
  • Suspend My Service
  • Renew Your Contract
  • Manage Services
  • Announcements

Support Tools

Watch Fios


  • Visual 411