top of page

Protecting your emails with S/MIME

and other security updates

Email Compliance and Security

Physical Security

 

With the aim of providing our customers with a top-level secure email, our data centers and hardware are equipped with the best services to stand tall against physical and logical breaches.

 

Physical Security

Taking email security to the next level, our Service Provider stores encrypted emails in bulletproof infrastructure and is safeguarded with top-notch security and surveillance, protecting against physical break-ins and malware attacks.

 

Data Centers

Distributed across the US, Europe, China and India, our Service Provider data centers are built to hold large volumes of data with top-quality security. Data servers are located in undisclosed locations, set under 24/7 surveillance, and sealed with biometric authentication to prevent any unauthorised entry.

 

Hardware

Our Service Provider data centers use a fail-proof hardware system, designed with highly advanced technology that manages the storage and retrieval of data flawlessly. In the unlikely situation that any of the data centers fail to function, data can be retrieved from the backup stored in the hardware system.

 

DOS and DDOS control

DOS and DDOS attacks generate unusual traffic to cause denial of service. Our Service Provider follows DDOS mitigation procedures which help overcome these attacks by tracking the traffic patterns and taking necessary steps to avoid disruption of services.

 

 

Email Data Protection

 

Our Service Provider proves its mettle as a secure email provider, with an advanced set of tools that help protect our organisation's data. Rest assured, your information is safe with us.

 

Data Protection

Our assets have data protection tools that our Service Provider supports for administrators. Using systematic protocols, policies, and mechanisms in the service, we are all set to prevent email spoofing, phishing, spam, and data leakage. 

 

DMARC

Our domain is protected from being misused by trespassers by setting up a DMARC policy. When a DMARC policy is established, unauthenticated emails sent in the name of our organisation are quarantined or rejected, depending on the policy.

 

Email policy

We take control of the emails sent and received in our organisation by customising email policies. Restrictions can be applied for specific networks, devices, domains, and users to curb data leaks.

 

Malware detection

Emails with attachments received are scanned for specific extensions and bounced when malware is detected. This secure attachment policy restricts us from uploading files with certain extensions to prevent malware from being transferred.

 

Spam filtering

Our Service Provider screens all inboxes from unwanted emails and authorises secure and encrypted emails. Using the Spam filtering function, incoming emails are scanned for phishing and spoofing and pushed to the inbox or spam folder accordingly.

 

 

Encrypted Email

 

Our Service Provider ensures a secure email by providing an additional layer of protection against unauthorised access through encrypted emails. Data is encrypted both at rest and in transit, leaving nothing to chance.

 

Encryption

Encrypted emails are unreadable by anyone other than the intended recipients. The risk of unauthorizsed interception is greatly minimised by encrypting our data in storage and in transit.

 

Encryption at Rest

Emails are stored on servers in encrypted format. Our data is split into fragments and each fragment is then further encrypted before being stored on our disks. The keys that are used for encryption are managed with the utmost safety and reliability.

 

Encryption in transit

Secure Socket Layer (SSL) connection encrypts email traffic between our devices and the servers. Our Service Provider uses SSL connection for all communications from POP/IMAP/SMTP clients to their servers so that our data cannot be read or tampered with during transit.

 

S/MIME

S/MIME provides top-notch security for our organisation's email communications by encrypting the message itself. The keys used to encrypt the messages are securely stored on our Service Provider’s servers. Digital signature and the encryption services in S/MIME, protect our emails against data leaks, phishing, email spoofing, and other email attacks.

 

Encryption Level Indicator

We are always kept in the loop about the security level of the emails we send and receive. All emails between our Service Provider’s servers are encrypted in transit using TLS and are marked accordingly. Whereas if the other provider involved does not support TLS, the email is marked as Plain to keep us informed.

 

 

Secure Email Access

 

Our emails are for your eyes only. To make sure they stay that way, our Service Provider has ensured secure access to our email account across multiple devices. The ironclad authentication process is designed to keep out unauthorised persons.

 

Secure Access

Securing access to our account is the first and the most crucial step in protecting our data. With this in mind, our Service Provider has built multiple lines of defense to protect us from phishing attacks.

 

Two Factor Authentication

Two Factor Authentication (TFA) acts as an extra layer of security to our account. With the OneAuth application, Touch ID, push notification, OTP, and QR code can serve as an additional proof of identity while signing in to our Mail accounts. Even if our passwords are compromised, you can always count on TFA to keep the account safe.

 

Single Sign-On

Single Sign-On enhances security by providing a central access to all our applications. With our credentials stored in one highly secure place, the chances of it being compromised are slim. The workflow across our applications becomes safer and easier without having to enter individual passwords in multiple places.

 

OAuth 2.0

Knowing the importance of keeping our credentials protected, our Service Provider supports OAuth 2.0. Using the OAuth 2.0 authentication process, we can access our mail from other third party applications without having to disclose our password to the external application.

 

Unusual Activity Report

Our Service Provider constantly monitors our accounts for any unusual activity. In the occurrence of any such activity—including a login from a new location—our administrators are promptly notified. We will then enhance our account's security if required.

 

 

Certificates and Compliance

 

Focused on offering a reliable and secure email experience, our Service Provider is crafted to meet various international security standards. As a testament to this, they support multiple certifications and undergo routine audits that keep their security up to date.

Security Certificates

Our Service Provider undergoes routine third-party audits for quality assurance in email security. They have earned ISO/IEC 27001, the set of standards for information security management systems and SOC 2 Type II, a certification administered to SaaS providers for security, availability, processing integrity, confidentiality, and privacy.

 

Archival and eDiscovery

Email archiving allows us to collect, preserve, and index all inbound and outbound emails, making them easily discoverable during audits. Emails are recoverable at any point of time through eDiscovery. This helps protect our organization's intellectual property.

 

General Data Protection Regulation

Our Service Provider is GDPR compliant. Personal data that is collected during sign ups or any personal information communicated via emails is protected under the European Data Protection Regulation enforced by the EU Commission. With user privacy given foremost importance, your personal details are never mined to run ads.

 

Audit Tracking

Our Service Provider sends us instant alerts using Audit Tracking. Administrators can enable alerts for unusual email activities like emailing confidential information to third-parties or malicious file downloads by users in the organisation to take subsequent action.

 

HIPAA Compliant

Our Service Provider is HIPAA (Health Insurance Portability and Accountability Act) compliant. They do not collect, use, store or maintain health information for their own purposes. They provide tools for administrators to implement a HIPAA compliant email service for our organisation.

bottom of page
CYLEX