{"id":6396,"date":"2015-07-06T19:59:20","date_gmt":"2015-07-07T00:59:20","guid":{"rendered":"http:\/\/hcstx.org\/?p=6396"},"modified":"2015-07-06T19:59:20","modified_gmt":"2015-07-07T00:59:20","slug":"email-security-101","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2015\/07\/06\/email-security-101\/","title":{"rendered":"Email Security 101"},"content":{"rendered":"<p class=\"selectionShareable\"><a href=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/07\/nsa1.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-6398\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/07\/nsa1.jpg\" alt=\"nsa\" width=\"249\" height=\"202\" \/><\/a><\/p>\n<p class=\"selectionShareable\">Taken from the article:<strong><a href=\"https:\/\/gigaom.com\/2013\/06\/15\/how-to-prevent-the-nsa-from-reading-your-email\/\"> How to prevent the NSA from reading your Email<\/a>\u00a0<\/strong>by Raj Sabhlok<\/p>\n<p class=\"selectionShareable\">It always seems to take some sort of \u00a0major meltdown for people to bother to think seriously about security and privacy.\u00a0Whether you\u2019re afraid of being erroneously\u00a0targeted for typing the word \u201cbomb\u201d one too many times or you just don\u2019t want someone\u00a0sniffing\u00a0through your private correspondence, there are steps you can take to make it effectively impossible for the sneakiest hacker \u2013 or the savviest NSA agent, as the case may be \u2013 to monitor your missives.<\/p>\n<h2 id=\"encryption-is-essential\">Encryption is essential<\/h2>\n<p class=\"selectionShareable\">When done correctly, encryption is all but impossible to break (yes, yes, every encryption scheme is technically breakable, but in today\u2019s reality, good encryption is for all intents and purposes unbreakable). And while nearly <a href=\"http:\/\/www.scmagazine.com\/thirty-five-percent-of-companies-opt-not-to-use-encryption\/article\/285090\/\">70 percent\u00a0of companies<\/a>\u00a0use\u00a0encryption to store sensitive data, many companies and individuals don\u2019t bother to take these same measures for email. Even though every single day we likely send\u00a0sensitive or personal data such as credit card and social security numbers, confidential corporate details and all types of personal correspondence.<\/p>\n<p class=\"selectionShareable\">By its very DNA, encryption is a confusing thing. Even those users who do take the extra step of using encryption to safeguard their email mistakenly assume that encrypting their messages in transit is enough to keep out prying eyes. But there are actually three distinct steps to take that can ensure you lock out snoopers.<\/p>\n<p class=\"selectionShareable\">Read the Remainder at <strong><a href=\"https:\/\/gigaom.com\/2013\/06\/15\/how-to-prevent-the-nsa-from-reading-your-email\/\">Gigaom<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Taken from the article: How to prevent the NSA from reading your Email\u00a0by Raj Sabhlok It always seems to take some sort of \u00a0major meltdown for people to bother to think seriously about security and privacy.\u00a0Whether you\u2019re afraid of being erroneously\u00a0targeted for typing the word \u201cbomb\u201d one too many times or you just don\u2019t want&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[1317,883,1132,1189,65],"tags":[1669,1670,1671,1672,1673,1674,1675],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/6396"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=6396"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/6396\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=6396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=6396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=6396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}