Digital data protection is important to protect from security breaches below.
- Data Theft
- 
Denial of service 
- 
Integrity Attacks
Data Theft and Email:
Digital information categorised into two ways structured and unstructured data. 
Structured Data:
- Structured Data controls available for typical data. 
- 
Structured data stored in database.
Unstructured Data:
Unstructured data's like email and file attachments, word/pdf, excel, pictures and videos. 
A look at Deficiency:
- A weak user authentication and permissions.
- Transmission in the clear. 
- No controls of intermediate servers. 
- No control over redistribution.
Sieve  RFC 5228:
Sieve  is a language for filtering e-mail messages. Sieve is designed to be implementable on either a mail client or mail server. Sieve is meant to be extensible, simple and independent of access protocol, mail architecture and operating system.
- Email messages unencrypted can be hacked.
- Sender emails copied send to email server, sender email server copy the email in mail server and send to  recipients email server coped email and send to original recipient.
- Email has no control on email server. 
- Always whenever you are using Gmail, outlook, yahoo, they will download a copy to their own mail servers. 
- Email servers are owned by third party server. 
- After 180 days your emails are considered 'abandoned'. 
- Email older than 6 month - no warranty or portable cause required.
- By the means of wire tapping email servers hacked by hackers.
The Gateway of Email Server:
Email server has gateway as SMTP email, 90% of Malware smuggled in via SMTP email gateway.
SMTP:Simple Mail Transfer Protocol:
Simple Mail Transfer Protocol (SMTP) is the standard protocol for email services on a TCP/ IP network.
SMTP port 587 is used with encryption messages with wrapper. 
- SMTP Port 25 is the default port used for relaying.
- 
SMTP Port 465 should no longer be used at all. 
- SMTP Port 2525 used when all other port is blocked.
SMTP Inherent vulnerability:
- SMTP vulnerabilities is unsecured storage and transmission. 
- 
SMTP  is lack of redistribution controls. 
- 
SMTP is lack of temporal.
Partial solutions:
- Transmission Encryption which will encrypt the connection but this can be compromised. 
- Bulletin board systems
- 
Add on message encryption
- 
Enhanced authentication
Bulletin board solutions for secure email:
- Recipients to get email notifications to log into a Web portal for their messages. 
- Bulletin boards are user friendly. 
- Bulletin boards are high quality and encrypted.
Add on Message:
- Add on message is used to stop Phishing.
- But add on message not having capacity to stop spear Phishing. 
- Add on message encrypt stored and sent emails.
Enhanced authentication:
Enhanced authentication will be used to prevent from any attack by hacker.
Root cause:
Generally unstructured data files can be easily copied from victim to attacker. So cyber  security measures are important. 
The Fix:Securing files By default:
The fix will be only using encrypted Internet connection, so we need to follow below steps, 
Step:1: Application file will generate encryption key specific to files. 
Step:2: Application automatically locks the file
Step:3: Application able to hide true file name. 
Step:4: Application will create a new special shared key. 
Step:5: Also application creates a specific file key to user. 
Secure Data at Creation:
Granularly encrypt each data object with AES 256 symmetric encryption.
- Absio offers email encryption service. 
- 
Secures data at rest. 
- 
Encrypt each file with its own key. 
- 
Distributed key management. 
Hill Station view: