Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityAccess ManagementFire & Life SafetyPhysical Security

Don't underestimate mail security during the hybrid work era

By Alex Sappok
mail-security-unsplash-1170x.jpg

Photo by Lucas George Wendt on Unsplash

August 19, 2022

COVID-19 quickly and unexpectedly ushered in the hybrid work era, presenting newfound flexibility for workers that came with its own unique corporate security complications. One of the most significant and oft-overlooked risks is the increased potential for mail threats. 


For employees to get back to work safely, the Biden Administration proposed vaccine mandates for U.S. companies, but the Supreme Court denied this, effectively leaving the decisions to the states. Some organizations have been following their own rules and requiring employees to be vaccinated or lose their jobs, like outdoor apparel company Carhartt.


The controversy and divisiveness of these mandates made companies fear that departing employees might send illicit materials in the mail along with their work-provided gear. The standard corporate policy for winding down remote employees includes shipping a return box to ex-employees’ homes so that items can be sent back to headquarters or the closest office location.


Although mandates and mask requirements have been relaxed somewhat recently, this is an opportunity to learn from the mistakes of the past year and better prepare for the next wave of the virus and the controversies that are sure to follow.


Sadly, most companies do not meet the Department of Homeland Security (DHS) guidelines for mail security or have the right technology and standard operating procedures (SOPs) in place. Enterprises must be better prepared with a full-scale mail security program that can adapt to an increasingly porous attack surface.


The underestimated dangers of mail threats

Vaccine mandates were the most recent widespread trigger for mail threat concerns but typify the larger problem. The United States Postal Service (USPS) found that a significant portion of mail threats come from unhappy or disgruntled employees, known as insider threats. Political and social discourse gets more contentious by the day, directly impacting the risk of mail threats.


Remote or hybrid work also creates new potential mail threats. Dangerous materials can be sent to residential addresses disguised as work-related packages that could expose employees and their families. 


Companies need to view mail threats as disruptive and potentially harmful to people and businesses, regardless of whether they are real or hoaxes. Even if the main threat is a hoax, it can lead to business interruption, as seen recently in the Apple HQ shutdown.


Subway Restaurants headquarters in Milford, Connecticut, also received a fake powder threat that led to a shutdown and investigation, which local police and company executives believed to be sent by a recently laid-off employee. 


Beyond physical threats, mail can also be used as a form of corporate espionage or cyber threat called Warshipping. It is a trojan horse-style attack where a bad actor sends a mail package containing a small, rigged Raspberry Pi device capable of scanning WiFi networks and downloading data while the package is unopened and unscreened in a facility. The device is as small as a business card and can be easily concealed within two pieces of cardboard.


IBM’s white hat hacking team, X-force Red, first publicized this kind of attack in 2019, but it has been around for much longer. More conventional “phygital” threats exploiting both physical- and cyber-security vulnerabilities include a USB drive rigged with malware, the most recent being a spate of threats the FBI warned about in January 2022.


Despite the severity, mail threats have historically been overlooked since they are often under-reported. Because of this, most companies do not often support mail security procedures that meet the DHS standard of care.


Yet, the USPIS Dangerous Mail Investigations (DMI) Unit responds to 10 dangerous mail incidents every day, on average. Collectively, the ATF and USPIS have analyzed over 262K suspicious mail items and 6.3K reported mail incidents in its latest reported 2020 data. It’s clear organizations must develop a more rigid mail scanning process to not only better protect against the threat itself but also to limit potential liability resulting from lax security practices.


Developing a resilient mail security standard operating procedure (SOP)

While every business is different, there are fundamentals of a mail security program that every organization should adopt:


●    A mailroom security policy statement: Clearly outlined rules for safely scanning mail.

●    Global mail security and suspicious item screening processes: Document and train internal teams on standardize mail screening process, including the proper handling of items, the use of technology screening tools, and the right chain of command. 

●    Emergency response plan: Outline each action the individual scanning items should take if an illicit substance or dangerous item, real or perceived, is discovered.

●    Scalable mail threat detection: The solution must cover all offices and entry points, not just the headquarters, which is more typical.

●    Establish site-specific rules: The location’s risk profile, facility layout and other unique requirements can impact an SOP. Potential examples of how rules may vary include where incoming mail is being inspected (onsite or separate location), other security measures beyond mail, the activities occurring on site (e.g., manufacturing, management, etc.), and much more.


It’s important to consider the technology used for mail threat detection. Common mail screening technology, like X-ray, does not properly detect the nine types of mail threats identified by the DHS: explosives, illicit items, contraband, powders, liquids, chemicals, biological, radiological, nuclear, and hoaxes, among others. According to RaySecur’s annual report, most threats are small and contain powders or other potential chemical or biological threats or hoaxes which are not detected by X-ray.


One of the most shocking examples of this is when Dr. Fauci chronicled his traumatic incident involving a white powder threat in a NY Times interview. If it can happen to one of the most contentious individuals during the pandemic with all the security and resources available to him, it can happen to any person or organization. 


Enterprises need to consider and implement mail security for all sites, given that the political, economic and social climates are unpredictable and constantly evolving. The concern over mail threats stemming from the vaccine mandates is only the beginning of the increased risk management concerns associated with remote/hybrid work and the potential legal implications of not having a mail security program up to the standards of the Department of Homeland Security (DHS).


This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: cybersecurity emergency response Mail screening physical security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Alex Sappok, Ph.D., is the CEO of RaySecur, a security imaging company with the DHS Safety Act-designated T-ray desktop scanner for mail and package threat detection. Prior to RaySecur, Alex was the founder and CEO of FST, Inc, an MIT spin-out advanced sensors company acquired by CTS Corporation (NYSE: CTS). He holds over a dozen patents in the fields of radio frequency sensing and S.M. and Ph.D. degrees in Mechanical Engineering from MIT.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • From the ER to the Executive Suite, Hospitals Tighten Up

    Don’t let your guard down over IT security during the pandemic

    See More
  • computer

    Reshaping cybersecurity in the Remote Work Era

    See More
  • Employee works from home with online devices

    Meeting the moment for hybrid work cybersecurity

    See More

Events

View AllSubmit An Event
  • April 16, 2025

    Modernizing GSOC Operations: Ensuring Full Control and Complete Situational Awareness

    ON DEMAND: For many organizations, physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!