<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Encrypted Attachments Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/encrypted-attachments/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/encrypted-attachments/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Fri, 11 May 2018 15:31:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Encrypted Attachments Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/encrypted-attachments/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to E-Mail Encrypted Attachments</title>
		<link>https://fosterinstitute.com/how-to-e-mail-encrypted-attachments/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 11 May 2018 15:31:58 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Encrypted Attachments]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Secure Attachments]]></category>
		<category><![CDATA[Secure email]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2637</guid>

					<description><![CDATA[<p>E-mail messages can be intercepted or read by an unauthorized individual. When you want privacy, one way is to encrypt your documents before you attach them to your email message. Microsoft Office, for Windows and Mac, has a feature on the File menu called Protect Document. Choose that option, and enter a secret password. Use [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-to-e-mail-encrypted-attachments/">How to E-Mail Encrypted Attachments</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>E-mail messages can be intercepted or read by an unauthorized individual.<span id="more-2637"></span></p>
<p>When you want privacy, one way is to encrypt your documents before you attach them to your email message.</p>
<p>Microsoft Office, for Windows and Mac, has a feature on the File menu called Protect Document. Choose that option, and enter a secret password.</p>
<p>Use a phrase such as: the chairs are in a row.</p>
<p>E-mail that file to your recipient.</p>
<p>Then, phone, or text, the password to your recipient. If you email the recipient the password, even if it is in a separate email message, whoever is reading your email messages will receive both the attachment and the secret code.</p>
<p>Please forward this to any of your friends who may want to send sensitive email attachments.</p>
<p>The post <a href="https://fosterinstitute.com/how-to-e-mail-encrypted-attachments/">How to E-Mail Encrypted Attachments</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
