Quickbase blog: Signs your team is misusing email for collaboration

There are numerous articles on the misuse of email (including this post where we talk about ways to onboard Gen Y workers), but one of the biggest mistakes is email becomes the general all-purpose tool for all kinds of inappropriate collaboration methods for your team. While email is great for point-to-point communications, it falls down when it comes to sharing and editing spreadsheets and documents, scheduling meetings, and tracking projects — all things that I talk about in my latest post for the Quickbase Fast Track blog here.

Email is more than just the @ sign

With the passing this week of Ray Tomlinson, I am tripping down memory lane and thinking once again about email. Ray, for those of you that don’t recall, was credited with the invention of the @ sign back in 1971 as a mechanism to separate a user from the computer that ran the user’s account. It took decades before it became the ubiquitous part of the Internet addressing system that we all take for granted today.

But, no disrespect to Ray, email is a lot more than just the @ sign, although it certainly is the easiest and most recognizable part of it. If you want to really dive into the history of email, I would start with Dave Crocker’s excellent compendium site. Crocker had a hand in inventing several key elements of email infrastructure himself and wrote this excellent history of early email for the Washington Post several years ago.

As you review some of these documents, you’ll quickly see that email isn’t just the product of any one person. Like many of the things behind the Internet and the world of open source software, dozens if not hundreds of people contributed, block by block and bit by bit. Today’s email system makes use of numerous different protocols to get a message from you to me and back again. What is astounding is that essentially email is the same basic service and “has not been replaced or interrupted in 40 years. It simply grew from a couple hundred users to a couple billion,” as Crocker wrote in his Post piece. Well, maybe not so simply, but still.

One thing not often discussed is the fact that for its early years, email thrived outside of the Internet. Many of the early email systems were local to a company, and only able to exchange messages with other users there. Vendors such as cc:Mail, Network Courier, and Higgins (remember those?) dominated that early corporate landscape. Eventually, the Internet would connect these disparate systems together and avoid the use of messaging gateways or remote dial-up modems. Now it is almost impossible to use email and not be connected to the billions of others online. Of course, finding a current email address for a recipient is another matter.

In the 1990s, I was lucky to have worked with some of these early pioneers, such as Crocker. Also with Marshall Rose, who wrote some of those early Internet email standards. Marshall and I co-authored a book called Internet Messaging back in 1998. Penn Jillette, part of the comedy magic team of Penn and Teller, wrote the foreword to our book. He says, “email is still the greatest thing ever invented in the history of the world. ‘What about fire?’ you say. And I answer, what good would it be without an email to ‘come and get it?'” Penn also had some sage advice: “When I see your words [via email], they are in my font and color on my computer, and the computer feels like part of my brain. Telephone is talking; email is whispering thoughts directly into my mind.”

All food for thought when you send your next email.

Network World: 7 encrypted email services to hide your messages

Whether you think Ed Snowden is a patriot or a traitor or somewhere in between, it certainly has been an interesting couple of years in the secure email business. It is a continued series of ironies, starting with the fact that Snowden had trouble convincing his chosen scribes to make use of encrypted email technology itself to transmit his documents. As I wrote about earlier this year, since Snowden’s revelations, more people have been motivated to employ encryption than ever before.

Ironically, it seems that the type of encryption that you use can make you a target of the spy agencies, who can scoop up your transmissions and figure out your origins. As Bruce Schneier said in a post last year, “There’s nothing that screams “hack me” more than using specially designed al Qaeda encryption software.”

That is a scary thought. But I don’t want to debate this here; instead I wanted to take a closer look at both new and older email encryption technologies and how much they actually protect your communications.

tutanota outlook betterI took this two-year mark of Snowden’s unintended flight to Russia to write this review of seven different products for Network World. They include Hushmail, ProtonMail, Datamotion SecureMail, HP’s Voltage SecureMail, Tutanota, Virtru and AppRiver. Using one of them will certainly be better than not using any encryption, even if it raises your profile with certain three-lettered agencies. Tutanova’s Outlook plug-in is pictured above.

You can read my full review here.

The post-Snowden era has been a good one for secure email

Email book coverTwo years ago a young man left his girlfriend and home with his laptops and a fantastic story that has changed the world and the way we think about our Internet privacy. I am of course talking about the flight and plight of Ed Snowden and his cache of secret documents about the massive NSA surveillance of electronic communications.

Whether you think Snowden is a patriot or a traitor or somewhere in between, it certainly has been an interesting couple of years in the secure email biz. It is a continued series of ironies, starting with the fact that Snowden had trouble convincing his chosen scribes to make use of encrypted email technology. (He isn’t the only one.) While he ultimately was successful in securing his communications with the press, another irony was how things ended up for him: now he is living in Russia, certainly not one of the most privacy-friendly places in the world. It is also ironic that his Russian residency has enabled his new career as a professional speaker, albeit using various remote video technologies since he can’t get on a plane because he doesn’t have a passport. (Part of me is envious of this, having to still give speeches the old fashioned way by getting on planes. But I am glad that I have my passport.)

But the ironies extend beyond Snowden’s life to more important matters. We have evidence that shows how the NSA abused numerous statutes in what they call “bulk metadata collection” of phone calls and emails. And we all now know what metadata means, and how former NSA director Michael Hayden said last year: “We kill people based on metadata.” Certainly, the Snowden effect is quite real, given the current debates in Congress over reauthorizing various legislative means for them to continue these practices.

And the ultimate irony of them all is another Snowden effect: while the NSA revelations have closed down several secure email providers such as Lavabit and Silent Circle, others have taken their place and encrypted email usage is most likely at an all-time high, thanks to the paranoid and prudent among us.

I have spent a lot of time listening to Snowden’s various public discussions, held at SxSW, with John Oliver for his HBO show, and at a recent conference at Princeton where he exchanged words with a New York Times reporter that broke some of the early stories. And while I am not sure where I stand on the traitor/patriot index, Snowden certainly has a lot of interesting things to say. It is clear that he has spent a good portion of his clandestine career preparing for his media close ups and photo ops. He also has a lot of time on his hands to keep up with current events.

I think Snowden has done more than just about anyone since Phil Zimmerman (the creator of PGP and now involved with DarkMail) to encourage email encryption usage. When Marshall Rose and I wrote a book about corporate email use back in 1998 (cover reproduced above), we said that secure email was “best described as a sucking chest wound.” For most of the last 17 years, secure email was more a curiosity and almost unknown and unused in corporate America. That changed two years ago, and it is catching on in more places.

It is still too difficult to use, as this story in Ars Technica takes you through how to deploy it on an individual basis. Maybe not a sucking chest wound, but still more than just a mere blister to be sure.

I am interested in hearing more about your own secure email usage, and it is partly motivated by a review that I am writing for Network World comparing several of the more useful business-oriented tools. Having used some of these products for decades, I welcome your own thoughts and will let you know when the review is published, probably later this summer.

And if you want to re-read a semi-serious blog post that I wrote last year where I thanked the NSA for enabling all sorts of activities, here you go.

To all entrepreneurs: Focus!

For the past three and a half years, I have been meeting occasionally with a nice young man named Aaron Witt who has a startup software business called ConvertMyEmail.com. Aaron is smart, he is earnest, he works hard, and he is making a modest amount of cash from the company. The business is one in an area that I happen to know a lot about (email software), and I think I have been mostly helpful in getting it going.

When we get together for our periodic mentoring sessions, Aaron is hyper-organized. He comes with a solid agenda; we go through it point by point. He has PERT charts that track his goals and what he has to accomplish when, and takes them to heart. He goes through during our session his stickiest points that he is wrestling with at the moment. He listens well and takes careful notes, and then more often than not acts upon them. As a mentee, he is one of my favorites because he has all these process things down pat. From the outside, it looks like he is making progress.

There is just one thing, almost Shakespearean in terms of a tragic flaw: he lacks focus.

When we began our sessions in late 2009, he had a full time job where he had to travel around the world for his company. As you might imagine, that took a lot of his time and I couldn’t really blame him for wanting to stay with the regular paycheck. But as it happened, another firm bought out his and he became redundant and was cut loose last year. Aha, I thought. Finally, time where he can really get behind his business and make it sing.

It hasn’t happened, although he is doing all the right things. Why? Because of his lack of focus.

We met this week for another mentoring session and an update, and he gave me the bad news. Well, he didn’t initially see it that way. “Did I mention that I am thinking about starting another company?” he asks. Oy vey, I am thinking. Here we go again. We discussed this new company – which has at its core a dandy idea – and I am beginning to think, he just can’t stay on company #1. I told him my feelings, and that he needs to stick with the first business and give it his all, otherwise he will be responsible for two failures. “That is what my wife tells me.” Yes, maybe I should give her a call (although there is something sacrosanct about the mentor/mentee confidence, similar to a confessional booth almost).

 

Coincidentally, I met another young entrepreneur this week for the first time. He was all over the map: in addition to working a full time job, he was starting a new company and volunteering at several charities. Focus, I told him. (It is like that line about plastics in The Graduate. You don’t need to say anything more.)

In all my years of coaching and mentoring entrepreneurs, focus is Job 1. Not raising capital (although that can be tricky). Not hiring the right programmer (ditto), or building the right set of Web sites and social media entities, or nailing customer satisfaction, or the hundreds of other things that can swallow a startup and quickly sink it. It is staying focused. Take your eye off the ball, and someone takes your ball away.

Whitepaper: Adventures in Secure Email

Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being something painful, and as a result we tend to avoid this protection. Haven’t we all been schooled that sending emails in plain text is like having a post card plastered to the wall of your local coffee bar? Haven’t all the various exploits with stolen credit cards and hackers breaking into various Web-based email services been warning enough? Apparently not.

Oddly, this summer marks the eleventh year anniversary of identity-based message encryption with more than a billion secure messages being exchanged annually. But that still pales in comparison to the many insecure messages containing sensitive data being exchanged in the clear. You can read my whitepaper that I prepared for Voltage Security here.

Voltage webinar and video screencast on mobile secure email

Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being something painful, and as a result we tend to avoid this protection. Haven’t we all been schooled that sending emails is like having a post card plastered to the wall of your local coffee bar? Haven’t all the various exploits with stolen credit cards and hackers breaking into various Web-based email services been warning enough? Apparently not.

Today I will be part of a webinar showing the issues surrounding mobile email and the solution that Voltage has with its product. You can tune in here. You can also watch a short three minute video screencast review that I have done showing how their iPad and Android app works here.

Upcoming speeches on email security

I will be doing a free webcast for Voltage Security entitled, “Simplified email data security for mobile smartphones and tablets” on July 12. You can register here. Joining me will be Mark Schweighardt, director of product management at Voltage. We’ll be talking about some of the challenges posed by current mobile device security solutions for securing email communications on smartphones and tablets and how their new mobile client solves these issues.

Also in July I will be speaking at the Department of Defense-oriented TechNet America conference outside of St. Louis. My talk is entitled, “Why You Shouldn’t Email Your Sensitive Documents” and will review some of the alternatives to using email to protect the transfer of sensitive information. You can download my slides here and register for the conference here.

Why You Shouldn’t Email Sensitive Corporate Documents

E-mail traverses the public Internet in plain text, and can be easily copied or intercepted. Just ask the Gmail users famously hacked in 2010 and again in 2011, or the U.S. Chamber of Commerce which had at least six weeks worth of e-mail data containing sensitive information stolen in a breach that was widely reported in December 2011.

Today, as increasing global competition drives the need for increasing inter-enterprise collaboration, the use of e-mail to share collaborative information with partners and geographically dispersed team members creates unacceptable security, compliance, and information governance risks. If your users are collaborating on a sensitive project and sharing a confidential document or data, the last thing you want them to do is e-mail it back and forth over the Internet.

I provide some strategies to get around this issue in a white paper that I wrote for Intranlinks here.

What We’ve Got Here is a Failure to Communicate

Fans of Paul Newman will recognize his character’s famous line in Cool Hand Luke. Never in the history of electronic communications do we have so many choices and yet experience so many communication failures. This was made clear to me recently when I tried to get in touch with a “friend” of mine. I put the word in quotes because I mean it in Facebook terms: someone that I may or may not have met f2f, but want to stay in touch. Let’s call this friend Bob for simplicity.

My go-to communication method is email, so I first tried to send Bob a quick email to answer a question. Sadly, I have 9,000 contacts in my Gmail but Bob is one of the many of them who have moved on to another email address. The mail came back undeliverable. That wasn’t a good sign. But even if it got through, it doesn’t mean anything these days: there are lots of folks that ignore their emails, or have bad spam filters, so sometimes they don’t see them even if the address is correct.

Then I thought, perhaps I have Bob under my contacts at LinkedIn, which is my second place that I can usually track someone down. Strike two: LinkedIn knows about Bob with the outdated email that I had. Apparently, Bob hasn’t been too diligent about his updates. Yes I could try Plaxo but didn’t bother.

Bob’s phone is listed as his work number in my database, and of course he no longer works at this company anyway. Sometimes you can get the main number of the company or press 0 for a receptionist and they can be quite helpful. But this firm got rid of their receptionists long ago (chalk it up to progress) and just has a dial-by-name directory so that doesn’t help things. Once I got someone else’s replacement and they were quite helpful, pointing me to the new (or at least next) employer, but still, that doesn’t happen all too often these days.

Besides, even with a phone number or several numbers, that doesn’t mean anything. I have plenty of family members who are very hard to track down, and I have multiple numbers for them. People don’t like to answer their phones anymore. (Or maybe just not answer my calls. Hmm.)

Facebook? Bob and I aren’t connected there. And Bob has a common name, so trying to track him down and befriend him is an exercise in frustration. Do I remember any mutual friends of Bob that can connect me? I can’t remember how we first met: this isn’t unusual, as my memory isn’t what it used to be these days.

Even if we were Facebook “friends” that still doesn’t mean I am out of the woods. Yes, I could try Facebook messaging or IM, but if Bob isn’t online or doesn’t check his account all that frequently, that may or may not pan out.

Maybe Bob is on AOL or Skype or MSN IM? Nope, or at least I don’t think so. I have a lot of people on various IM lists, some that I have identified with their real names and others that have puzzling screen names with no clue as to who they are. Most of my IMs are to people that I work with (or did work with) on a daily basis: my AOL IM list for example, is frozen in time back to 2004 when I last worked at CMP (now UBM) and that was our main corporate communications channel. One of these days I am going to weed these out. In the meantime, there isn’t any real way to find someone on IM, unless you know of his or her ID to begin with. The same goes for Twitter.

There are some people that have turned Twitter into their go-to communications platform, but I am not even close there. Maybe that will motivate me to start.

I guess I could Google Bob, that might work, but for common names it is unlikely.

So yes, electronic communications has made us incredibly productive. But sometimes I do miss the olden times; back when real people answered their phones and tracked folks down when they didn’t.

So, as Newman says.

I welcome your thoughts and suggestions, please post to my story on ReadWriteWeb here.