Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Email Security Survey: Dangers for Enterprises

May 14, 2008

IT security software provider Surety, LLC has results of the 2008 Email Security and Authentication Survey. The survey, which included more than 800 IT security, email security and compliance professionals, revealed significant concerns about email content security and the preservation of emails for litigation, including the following surprising takeaways:

More than 65 percent of respondents lack confidence that their organization's email records would be admitted as evidence in legal, regulatory or patent disputes;

More than 80 percent of respondents are concerned about their ability to authenticate email records and attachments; and

More than 50 percent of respondents remain unclear on new regulations and legal expectations related to email authentication, including e-discovery.

The survey of more than 800 IT security, email security and compliance professionals revealed that 65 percent of respondents lack confidence that their organization's email records would be admitted as authenticated evidence in legal, regulatory or patent disputes.

The survey further revealed that more than 80 percent of respondents are concerned about their ability to authenticate email records and attachments and more than 50 percent of respondents remain unclear on new regulations and legal expectations related to email authentication.

"During a time when courts have set forth clear expectations for the authentication of electronically stored information (ESI), including email, it is troubling to learn that nearly half of IT professionals responsible for preserving email records are not fully aware of these requirements," said Timothy Carroll, Partner, Vedder Price P.C. "These findings underscore why so many organizations are turning to content security solutions such as trusted time-stamping to preserve the integrity of their electronic records throughout the chain of custody."

"Courts are wise to the ease with which electronic records can be manipulated," said Tom Klaff, CEO of Surety, LLC. "High profile cases such as In re Vin Vinhnee and Lorraine v. Markel relate the expectation that electronic records be retained in their original state without alteration. The inability to irrefutably establish that your electronic records and its associated metadata have not been deleted or altered can be costly. These survey findings relate the necessity for IT professionals and legal teams to work together to deploy solutions that ensure litigation-readiness."

Other findings in Surety's the 2008 Email Security and Authentication Survey include:

*    Email retains its position as the most critical enterprise application. Seventy-one percent of respondents indicated that their organization's use email to share information on a wide range of business-critical data, including documents related to company financial information, human resources and Intellectual Property (IP) and contracts with external parties.

*    Email takes center stage during e-discovery and during litigation. Nearly one-third of respondents indicate that their companies have been required to produce email during e-discovery requests and their email records have been used during litigation.

*    Many organizations have been slow to implement appropriate email storage and content security solutions. According to the survey, 48 percent of respondents do not have tools in place to store emails in their original form in a manner that does not leave them susceptible to tampering.

*    Wide-variety of corporate initiatives drive adoption of email authentication solutions. Regulatory compliance, e-discovery concerns, risk avoidance and internal policies mandating improved security represent the top drivers for the adoption of authentication solutions.

Full findings for Surety's 2008 Email Security and Authentication Survey are available at www.surety.com/images/whitepapers/Surety_EmailSecuritySurvey_2008.pdf.

Survey Methodology

The survey was conducted by eMedia USA on behalf of Surety between April 8 and April 23, 2008, and included 808 IT security, email security and compliance professionals.

Share This Story

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing