{"id":28226,"date":"2019-08-29T10:03:12","date_gmt":"2019-08-29T14:03:12","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/emagazine\/\/28226\/"},"modified":"2021-07-19T04:35:44","modified_gmt":"2021-07-19T08:35:44","slug":"email-management-history","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/email-management-history\/28226\/","title":{"rendered":"Working in the &#8216;post-email&#8217; era"},"content":{"rendered":"<p>It\u2019s been more than two decades since <a href=\"https:\/\/www.amazon.com\/exec\/obidos\/ASIN\/0139786104\/davidstromswebin\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Marshall Rose and I wrote our book about internet email.<\/a> Since then, it\u2019s become an almost redundant term: how could you have email without using the internet? For that matter, how can you have a business without any email connection to the outside world? It seems unthinkable today.<\/p>\n<p>But for something so essential to our work and lives, email system management today leads to many ironic situations.<\/p>\n<p>Today, I want to consider the last ten years or so. I call this decade the \u2018post-email era\u2019 because email has now become the enabling technology for an entire class of applications that weren\u2019t previously available, or easily accessible, before. Like Slack, multi-factor authentication logins, universal SMS and the thousands of apps that notify us, if we choose, by email.<\/p>\n<p>Ironically, all of this has almost eclipsed the actual use of email itself. While ten years ago we had many of these technologies, now they\u2019re in more general use. And by \u2018post-email\u2019 I don\u2019t mean that we\u2019ve stopped using it \u2013 quite the contrary. Now it\u2019s so embedded in our daily operations that we rarely think about it. It\u2019s taken for granted, like the air we breathe (its second irony).<\/p>\n<h2><strong>Email hosting \u2013 the choice is binary<\/strong><\/h2>\n<p>When a new business is formed, usually the decision for its email provider comes down to hosting its email on either Google\u2019s or Microsoft\u2019s servers. That\u2019s a big change from ten years ago when cloud-based email was still being debated and (in some cases) feared.<\/p>\n<p>Another change is reduced costs. This has made email an affordable commodity: for just a few dollars per month per employee, everyone can have up to 1TB or unlimited storage. It\u2019s immense. Remember when the first cloud emailers had 1GB of storage? That seems so quaint \u2013 and so limiting \u2013 now. For all the talk back then about \u2018inbox zero\u2019 (culling messages from your inbox), we have set the perfect conditions for email hoarders. Another irony.<\/p>\n<h2><strong>Choose your own email client<\/strong><\/h2>\n<p>Apart from all this room to keep our work documents, another major reason for using the cloud is that it frees up the decision as to which email client to run (and to support) for each user.<\/p>\n<p>A third reason is that the cloud allows end-users to run multiple email clients, depending on what device they\u2019re using and for what task they want to accomplish. Both concepts were pretty radical 20 years ago, and even five years ago they weren\u2019t as well accepted as now. Today, many of us spend as much time using email on our phones as our desktops, and use multiple programs for our email without a second thought. Some of us \u2013 including myself \u2013 have switched to using web-based email almost exclusively. That was almost unthinkable a decade ago.<\/p>\n<h2><strong>Self-host your email server<\/strong><\/h2>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/29095942\/Post_Email_Era_2.jpg\"><img decoding=\"async\" class=\"aligncenter wp-image-28227 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/29095942\/Post_Email_Era_2-1024x768.jpg\" alt=\"\" width=\"1024\" height=\"768\"><\/a><br>\nWhy would anyone want to host their own email server anymore? Here\u2019s another irony: one reason is privacy. The biggest thing to happen to email in the past ten years was a growing awareness of how exposed our email communications could be. Between Edward Snowden\u2019s revelations and Hillary Clinton\u2019s server, it\u2019s now crystal clear to the world at large that your email could be read by your government.<\/p>\n<p>When Marshall Rose developed the early email protocols, he didn\u2019t hide this aspect of its operations. It just took the rest of the world many years to catch on. As a result, we now have companies that are deliberating locating in data havens to prevent governments from gaining access to their data streams. Today, a business should ask where its potential messages will be stored, whether they will be encrypted, and who has control over its encryption keys. That certainly wasn\u2019t the topic of many IT security conversations \u2013 or even decisions about selecting an email provider \u2013 ten years ago.<\/p>\n<blockquote><p>Why would anyone want to host their own email server anymore? One reason is privacy.<\/p>\n<\/blockquote>\n<p>One way to take back management over your email is literally to host your own email server so your message traffic is completely under your control. That has been a difficult proposition even for tech-savvy smaller businesses \u2013 until now. This is<a href=\"https:\/\/thehelm.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"> what Helm is trying to do,<\/a> and they\u2019ve put together a sexy little server (about the size of a small gingerbread house) which can sit on any internet network anywhere in the world and deliver messages to your inbox. It doesn\u2019t take a lot of technical skill to set up (you use a smartphone app), and it will encrypt all your messages end-to-end. Helm doesn\u2019t touch them and can\u2019t decrypt them either. Because of this, the one caveat is that you can\u2019t use a webmail client. That\u2019s a big trade-off for many of us who have grown to like webmail.<\/p>\n<p>Now users can pick two items: security, privacy or convenience. But not all three. That\u2019s the rub. With Helm, you get privacy and security, but not convenience (if you\u2019re a webmail user). Another irony: webmail has become so pervasive but you need to go back to running your own server and email desktop clients for totally locked-down security.<\/p>\n<h2><strong>Strengthen your email encryption <\/strong><\/h2>\n<p>Speaking of email encryption, one thing that hasn\u2019t changed in the past decade is how it\u2019s rarely used. One of the curiosities in the Snowden revelations was how hard he had to work to find a reporter who was adept enough at using PGP (Pretty Good Privacy) to exchange encrypted messages. Encryption is still hard. And while Protonmail, Tutanova and others have come into play, they\u2019re still more curiosities than in widespread general use.<\/p>\n<h2><strong>The rise of spam and phishing<\/strong><\/h2>\n<p>Another trend is how spam and phishing have become bigger problems. This is happening as our <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/endpoint-select\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">endpoint security<\/a> gets better at filtering malware out of our inboxes, so hackers are finding new ways to infiltrate organizations \u2013 and they\u2019re getting sneakier at doing it.<\/p>\n<p>It\u2019s something of a contradiction: you\u2019d hope that better spam processing would make us safer, not more at risk. Although the volume of spam mail is reducing, what does get through the net is more harmful to your business. All it takes is just one user on your network who clicks on one wrong attachment and a hacker can gain control over your desktop, and eventually your entire network. Now, that scenario is a common one witnessed in many TV shows and movies, like pop singer Rihanna who played a hacker in Ocean\u2019s 8. Not very realistic, but certainly fun to watch. To get better protected, you need to educate your employees to be better aware of the risks.<\/p>\n<p>Welcome to the many, many ironies of our \u2018post-email era\u2019.<\/p>\n<p><em>This article represents the personal opinion of the author.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For something so essential to our work and lives, email today leads to many ironic situations for the IT team to resolve.<\/p>\n","protected":false},"author":2517,"featured_media":28228,"template":"","coauthors":[3467],"class_list":{"0":"post-28226","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-opinions","7":"emagazine-category-small-business","8":"emagazine-category-trends","9":"emagazine-tag-email","10":"emagazine-tag-endpoint-security"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/email-management-history\/28226\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/secure-futures-magazine\/email-management-history\/20364\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/28226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2517"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/28228"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=28226"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=28226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}