Block Replies to Categorized Phishing Emails
Convert Large Attachments for Safe Delivery
Retrieve Safely Converted Large Attachments
Recall Email
Encrypt Conditional Email Content
Block Replies to Categorized Phishing Emails
Block Replies to Categorized Phishing Emails
Importance: Required / Reference to ITU-T X.1236 8.3.2 (1)
- When an incoming email is identified as originating from a malicious email address, the system should issue a warning to the recipient or automatically block the email.
- This helps prevent users from engaging with potentially harmful or phishing emails, reducing the risk of data leakage and security breaches.
Convert Large Attachments for Safe Delivery
Convert Large Attachments for Safe Delivery
Importance: Required / Reference to ITU-T X.1236 8.3.2 (2)
- Securely converting large attachments from an isolated internal network to the external network is crucial to prevent data leaks.
- The system should provide a secure method for converting and sending large attachments, ensuring that sensitive information remains protected during transit.
Retrieve Safely Converted Large Attachments
Retrieve Safely Converted Large Attachments
Importance: Required / Reference to ITU-T X.1236 8.3.2 (3)
- After converting and safely delivering emails with large attachments to the external network, it is essential to have a secure retrieval mechanism in place.
- This mechanism is crucial to ensure that users can securely access these emails, with a guarantee that no data is lost or leaked in the process.
Recall Email
Recall Email
Importance: Required / Reference to ITU-T X.1236 8.3.2 (4)
- Implementing an email recall feature is vital for preventing data leakage.
- Users should have the ability to recall sent emails, especially when they contain sensitive information that should not be accessible to unintended recipients.
Encrypt Conditional Email Content
Encrypt Conditional Email Content
Importance: Recommended / Reference to ITU-T X.1236 8.3.2 (5)
- Implementing email content encryption based on specific conditions, such as checking the sender’s IP address or monitoring the number of times an email is opened, is recommended.
- Encrypting outbound emails adds an extra layer of security, especially for sensitive communications