Email Organization: PO Box or Entire Post Office

by | Aug 9, 2019 | Executive Email Security, Uncategorized

The dreaded stack up of email!

You get several hundred emails a day. Twelve of those emails need to be read immediately. A hundred of those are subscribed email blogs. The rest are essentially junk.

Given that volume of email, would you rather have one box in a post office to store and organize that email. Or would you rather have the entire post office to store and organize that email?

The PO box lumps all the email together like traditional email. Maybe some random worker tosses obvious spam, maybe you have people label things they send you in a certain way for identification. But in the end it all ends up crammed into the same box. The entire diverse volume of inbound email you have, all jammed into one box.

On the other hand, having a post office means virtually unlimited organizational command, with infinite sophisticated worker threads using your explicit organization methods to determine what goes to your infinite mailboxes when. Instead of looking through new piles of mail in case there is something important, what if all important email was in a select box that notified you when something new was placed there? What if you had specific individual boxes for your most important newsletters? A box that remained silent, but was a step away should you have time for reading. What if you kept all of the junk mail sorted in their own boxes so if a mistake was ever made, it was an efficient process to go find the misplaced email?

If a email system was created around this architectural analogy, email might become bearable, even a blessing instead of a curse!

This is exactly what Enveloperty email is. Traditional email is having a single PO box for all of your email to be stuffed into. Enveloperty email is having an entire post office to service your email needs. A sophisticated blending of custom folders and a special sauce means pulling those twelve vital emails out of 1,000 consistently with minimal set up. The rest of the non critical emails are stored based on either priority, sender or commonality, just a click away! Taking the power away from the sender, and putting it where it belongs, with you the recipient!

The Special Sauce

The special sauce of Enveloperty is instead of organizing email based on who sent it, it is organized on where it was sent. This takes the control from the sender, and gives it to you the receiver, which is how it should be! No longer will receivers be at the mercy of senders, which will flip the paradigm causing a more sustainable email ecosystem. This is because with Enveloperty, a receiver can absolutely deny a sender efficiently, making business models like pharma spam and unwanted marketing emails nonviable! Over time, senders will either learn to send email on a permission basis, or fade out of existence.

Like the organic revolution changed how food is sourced and suppliers are held accountable through the consumer, email senders will be held accountable through the recipients. By giving recipients the ability to deftly ignore unwanted email, senders will have to maintain high quality content and reputations to have their content viewed. These changes would mean a sustainable email environment. Radically different from the turn and burn email marketing that is so common today. In the modern marketing paradigm email lists are bought, and addresses collected through gimmicks so “content” can be thrown at the wall to see what sticks. In general, any market that resorts to number games, means ethics aren’t a high priority. Email can be a elegant tool to empower productivity worldwide. Which is why this perversion of it must be eradicated by design.

Email Productivity

There has never been a person laying on their dying bed thinking to themselves, “I wish I spent more time on email.” Email is a necessary infrastructure that facilitates good cooperation which means good work. But email is not in and of itself how businesses make money. Following this logic, a maximumly efficient amount of focus should be spent on email. Focus instead of time is the metric, because time stretches on forever. Time spent where one matter is the entirety of ones effort however, is very finite. In general out of a eight hour work day, people are only focused and productive for three hours. This means that an interruption inside those three hours are absolutely devastating. Which is why Enveloperty measures gains in productivity in two dimensions. Dimensions measured in number of interruptions at bad times, and overall amount of time spent on inbound email.

Interruptions

Interruptions are considered bad when either the notification is for email that is entirely not wanted, or not wanted at that time. The common tactic of turning a device on silent is not acceptable for people in important positions in case of emergencies. Those people don’t get to sit one out. So in traditional email systems there is the problem of receiving notifications that interrupt important work.

Enveloperty solves this problem by having one maximum importance folder. Only email of the utmost importance is channeled to this folder triggering a notification. All other email is reserved a click away for when the user has the time. But other folders can be configured to trigger notifications at the users leisure. A common tactic is to have the most important email go to inbox. But have penultimate important email folders trigger notifications as well. When the user goes into a meeting or the like, the penultimate folders notifications are turned off. Accommodating a wildly flexible notification organization as the user desires.

Total Time

The total amount of time invested in email is a huge concern for upper ranked people. Nightmarish stories abound of people who spend ten or more hours going through email daily. They start when they wake up in the morning, and carry on until the moment they close their eyes at night. Research has found that the vast majority of this wading through email is in service of a handful of emails. Time adds up so vastly because of the fear of missing out. Powerful people are afraid of missing an important email, because it could have dire effects.

Going back to the post office example, Enveloperty handles this conundrum by having worker threads in the background sort your email by your specifications. When done correctly, users can confidently check two to three folders for important email, and then move on.

Email Security

Email is an excellent attack vector. Practically everyone uses email and it has long been stagnant of architectural changes. At this point in time most standard email systems are a copy of the original architecture with some glue, grease and scotch guard slapped on. This is particularly troubling because it has raised tremendously in popularity as an attack vector. As people become dramatically more comfortable operating digitally, they become linearly more susceptible for rewarding attackers.

Phishing

Phishing is a method of compromise where the attacker pretends to be someone else asking for information. The methods and strategies involved are growing at an accelerated rate currently due their recent success. Where a zero day vulnerability or other technical exploit requires advanced training, insight and persistence, if you can talk you can phish. Phishers play a numbers game like most unsophisticated attackers. They rationalize that if they send x number of attacks, y percent will fall victim yielding z cash flow.

Another more targeted form of phishing is spear phishing and boutique phishing. Where a phisher will send tens of thousand of attacks to anyway who matches their criteria, spear phishing attacks are targeted at individuals. Large amounts of research goes into determining the best way to compromise a target using privileged information. With the popularization of social media, and numerous marketing intelligence companies, a steep increase of successful spear phishing has been observed. By having unique and specific addresses for key employees that can ask for and authorize payments, the barrier to entry for a successful attack is raised dramatically.

Enveloperty uses shadow banning principles. Unlike other systems, feedback isn’t given to malformed requests or sequences of commands. The standard return for a successful command is 250 ok. When a bad command is sent, a different return is sent on most systems for troubleshooting purposes. Enveloperty sends 250 ok’s for practically all commands. This derails attackers because they can’t figure out what is actually going through vs what is being shadow banned. This draws out their research phase dramatically. Attackers generally follow the path of least resistance. They look for easy money, they don’t want to battle it out with a system unless they have a great reason to. Shadow banning has already proven a great deterrent stopping attackers, because they realize it just isn’t worth their time or effort.

Extortion

Have you ever received an email where it is promised that if you don’t give them money, they will release your embarrassing information to the public or hurt you physically? That is extortion. Extortionists attempt to play off of common fears to convince you to capitulate. Even those who know it is false still feel a quick pain of fear upon reading such emails. You know what the best defense against these attempts are? Not receiving the email in the first place!

Using the intimate control over inbound email Enveloperty offers, these extortion attempts are never brought to your attention. This way no matter how convincing they are, you don’t have the opportunity to slip up. If ever you are at risk of authentic extortion, the bad actors will be sophisticated enough to contact you anyways. Extortion may seem like an esoteric concern, but for those in power at businesses it is a preventable everyday occurrence.

Account Compromise

Pretty much the worst thing that can happen is for an attacker to gain access to an email account without anyone noticing. The most common way for this entire account compromise to happen is by attackers gaining the credentials to the account and walking in the front door. The most common way for this to happen is for the user to reuse credentials across multiple services. A service with lax security gets users credentials compromised, then hackers try those credentials across a wide variety of services.

Enveloperty addresses this threat by not allowing users to pick their credentials. Strong usernames and passwords are given to the user, breaking any reuse cycle that may have existed. Furthermore login attempts are logged and limited to detect and defend brute force attacks where a computer tries as many combinations as it can.

Support The Solution

Enveloperty is always looking for qualified people to join the private beta! If you know what inbox zero or phishing is, if you receive a large amount of email, or are a email technophile we would love to hook you up with an account! Reach out to PoVsOffice at enveloperty.com if you’d like to get started or talk!