• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Personal email makes for a big business risk

Envelope And Key Showing Safe And Secure EmailI’ve been writing a lot on LinkedIn lately about personal email communication. For me, it’s been on the decline and turned into something more functional around my consumer lifecycle. I don’t use it for emailing my friends anymore. Instead, it is just used for bill paying and finding sales for sites I frequent.

Something has emerged lately around personal email accounts related to business though, and it is proving to be a complex issue for compliance officers. Personal email accounts seem to be on the rise for conducting work in the shadows. Let’s take a look at two high profile cases.

When Hillary Clinton was Secretary of State, she chose to use her own personal email server for communications. Now, I’m going to stay away from political bombs and focus on the real risk here. Her own email server wasn’t subject to the same security, monitoring and retention policies as a system that was designed for sensitive emails.

In another case, the Chancellor of the University of Illinois was caught using her own personal email to hide scathing and disparaging emails. The University had a request subject to the Freedom of Information Act that would have appeared had she been using University email, but also she apparently seemed to admit what she was up to in a discovered email.

This risk of data loss or personal email use are real threats that companies have a hard time mitigating. There’s not too much you can do to protect against someone intentionally trying to hide what they’re doing, but you can take some steps beyond end user education to try and prevent it.

A great place to start that’s been around forever in Exchange, is auto-forwarding. Outlook allows users to configure rules that will auto-forward every message to another account. Turn this feature off. Sure, they can still manually forward messages, but you’ve just made it a little harder for them to manage it.

Design a good records management policy around specific content types and outline the repositories for certain types of data and where they can reside. Supplement the policy with a rights management solution, like Azure Rights Management. This allows IT to automatically protect content conditionally and also gives the end users the power to protect data themselves. Here’s an example:

Mark needs to email a spreadsheet of potential salary adjustments to managers. He can protect the data with an Azure Rights Management template so that only the managers can view the spreadsheet and the content expires on the day the salary adjustments go live.

Using this records management policy, you could also use Exchange Online’s archiving feature to automatically archive the entire mailbox or just certain emails that meet a specific criteria. Users won’t even see what you’re doing, but you can ensure the data that legally needs to be kept is kept. Did I not mention yet that you should check with legal on all this? It is probably a good idea.

To further protect your content through Exchange, you can layer on a Data Loss Prevention strategy that looks for certain patterns of data, and takes an action. For example, you can put a policy in place that no emails can be sent externally with Social Security numbers in it. Best of all, there are reporting tools you can use to see who is trying to take such actions.

One particular challenge is having multiple email accounts on a mobile device. With ActiveSync, you can copy and paste between email programs. You can supplement what ActiveSync does though with Mobile Device Management through Windows Intune. With the right policies in place, you can allow your corporate data to be segregated from personal data on a device. This means no more copy and paste between corporate apps and personal apps.

All in all, there are technologies to help you mitigate the risk of data loss and compliance issues. It’s probably best to take steps to implement user education and a strict policy against using personal emails for work. As is evident by the recent news articles, personal email can become a thorn in your side and a well-defined strategy will keep your business protected.

Visit www.ArrayaSolutions.com to find out more about the solutions your organization can use to ensure the security of its email environment or to reach out to one of our Account Executives. Remember to follow Arraya on Twitter @ArrayaSolutions to keep on top of the latest company news and insights.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}