How to Encrypt Emails with Google

Aug 15, 2022 | Tech Tips

By Mary Grlic

What does Encryption Mean?

Encryption is a way of scrambling data so that only authorized users can understand and access the information. Technically, encryption involves translating human “plaintext” to incomprehensible code known as ciphertext. The text is put into random order to make sure outside interceptors cannot understand it. To decrypt a message, users will need to know the code, which is the set of characters to decode the encrypted data. When users encrypt an email, they actively protect the message and its contents from interception or unauthorized access.

Why encrypt?

Encryption ensures the maximum security of your messages. While emails travel through the internet, hackers may be able to intercept the data packets and access the content within the message. With so many hackers waiting and ready to attack at any time, it is so important to encrypt your messages to protect them from interception. Billions of unencrypted messages are sent and received daily, making them susceptible to eavesdropping. 

What might you need to encrypt?

When sending confidential or personal information through the internet, it is especially important to encrypt your messages. You should not send any private information via email, such as your social security number, because outside organizations would be able to see this data. This will threaten your data security and put you at a major risk. You must encrypt any personal identification and confidential business properties, but always be cautious when sending messages via email to protect your cybersecurity! Email encryption is particularly important for industries that deal with sensitive data, like medical records or financial information. An example is healthcare services that follow HIPAA, which may benefit from the security measures provided with Google Workspace for healthcare organizations.

How does Google already protect your messages?

Transport Layer Security (TLS) is Google’s basic form of encryption. TLS encrypts data to ensure privacy across the web. As long as the recipient you are emailing uses a mail service provider that also supports TLS, this service will protect your emails. Most major mail providers, like Gmail and Outlook, support TLS. However, if the user you are messaging does not have a mail server that supports TLS, your messages will not be encrypted. This means that any user can gain access to contents within the email at any point of transport. With platforms like Google Workspace, users can choose to only use TLS for incoming and outgoing emails. 

End-to-end encryption means that the service provider itself does not have any access to your emails during the transmission process. The only user who can see your messages is the recipient(s) of that email. Google’s end-to-end encryption does not guarantee the protection of your emails and their contents. Major mail services can scan your messages for spam and phishing, as well as create convenient auto-reply messages based on the contents of the email. In this regard, although Google’s features are convenient, the provider still has access to your allegedly “encrypted” messages.

TLS is not the end-all, be-all security marker. While it is secure, you still must be careful when sending messages through email to ensure that no unauthorized users access private data.

Confidential Mode from Google: is it the same as encryption?

If you want to protect sensitive information via Gmail, you can toggle “confidential mode” on your email. Confidential mode will prevent unauthorized users from getting the message. Note that sending emails in “confidential mode” is not the same as encrypting emails. With confidential mode, you can set an expiration date for the message, meaning the recipient will not be able to access it after a set period. Confidential mode also revokes the ability to forward, copy, print, or download the email. However, recipients can still screenshot or photograph the message. Malicious software can override confidential mode and allow users to save or download attachments as well. 

There is an option for senders to lock the confidential email. Recipients will not have access to the message without entering the second layer of security. Confidential mode is an added security measure but may provide a false sense of protection, so be cautious when utilizing confidential mode. 

To send emails in confidential mode:

  1. Go to Gmail 
  2. Click the icon to “Compose”
  3. In the bottom right corner of the window, turn on “Confidential Mode” by clicking on the icon
  4. In confidential mode, the sender can modify the following expiration date of the message and choose to create an SMS passcode for the email   
Turning on confidential mode in Google’s interface

To remove access from a confidential message:

  1. Go to Gmail 
  2. On the left of the window, click “Sent”
  3. Open the confidential email you previously sent
  4. Click “Remove access”

Opening messages sent in confidential mode:

  • Recipients can access the messages and their attachments until it expires or until the sender removes access
  • Recipients cannot copy, paste, download, forward, or print the email and its attachments
  • Recipients may need a password, sent via SMS

Additional Security Measures from Google

If you want an additional layer of security, it is important to get an enhanced form of protection from Google. Secure/Multipurpose Internet Mail Extensions (S/MIME) is a widely accepted protocol used to send encrypted messages. It is only available for paid Google Workspace and GSuite accounts. This service encrypts messages and can make digital signatures to verify the sender’s identity.

S/MIME encrypts emails with user-specific keys to protect messages during both transmission and delivery. The recipient must receive and then decode the message. S/MIME only works if both users protect their messages with a service that supports it. Additionally, both the recipient and the sender must share the code in advance. Similar to TLS, it does not protect the message once it has received its destination. Google can still review the message to place into the “spam” pile or create an auto-reply, making it not entirely encrypted once it reaches its destination. A Google Workspace administrator must approve S/MIME for employees to use the service. 

Google Workspace additionally offers Client-side encryption, which gives users “direct control of encryption keys.” Any customer data stored in Google Workspace is not accessible by Google. This is beneficial for organizations that store a lot of confidential or regulated information. Within Google Workspace, users can create an “encrypted document.” To work properly, Client-side encryption must be paired with one of Google’s key service partners, like FlowCrypt. Google is currently working on enabling Client-side encryption throughout all of the workspace, such as Gmail and Google Meet. It is now only available for Drive, Docs, Sheets, and Slides, as well as other compatible files such as Office files and PDFs.

Pretty Good Privacy

Pretty Good Privacy (PGP) is a security program for email encryption and decryption. It can be an additional security measure when you are sending messages and attachments via the internet. By going through several levels of coding and decoding, PGP is a great way to protect your messages. PGP uses a three-step process:

  1. PGP generates a random session key. Users cannot guess this key. The key expires after one use.
  2. The session key is encrypted using the public key of the intended recipient of the message. The public key is associated with one person’s identity so anyone can use it to send that received the message.
  3. The sender sends their encrypted PGP session key and the recipient decrypts the message with their private key. The recipient then uses the session key to decode the actual message.

People can use PGP to encrypt emails and verify digital signatures. Users can use PGP to encrypt files and attachments, and overall, protect their digital footprint. If a user is not sure of another user’s identity, they might also want to include a digital signature that must be decoded.

PGP is a great way to protect and encrypt emails, but there are some disadvantages in everyday use. PGP is difficult to use; encryption with PGP takes time and effort, which can make it complicated for some users. They also must fully understand how to use PGP or else it will not work correctly. Similar to TLS and S/MIME, both users must enable PGP so that it works properly. Third-party PGPs may not be ideal, but they do get the job done when it comes to encryption and digital safety. You will need to download external software to encrypt your messages using PGP.

PGPs for Google and Microsoft

FlowCrypt is a browser plug-in that can be downloaded on the Chrome web store for Gmail end-to-end encryption. With FlowCrypt, users can add “Secure Compose” to their email so that they can easily encrypt emails with just a click of a button. FlowCrypt is easy to set up, allows users to send and receive encrypted emails and attachments, and creates digital signatures.

Similarly, for Outlook 2010-2019, gpg4o is a Microsoft PGP add-on. This service uses OpenPGP encryption through GnuPG (GPG) and operates like other PGPs. Users will have a session key that consists of a public and private key to access the encrypted messages. Using a private key, senders and recipients can decrypt the contents. Users can get gpg4o in the download center. Compatible devices must have Microsoft Outlook 2010 or later and a version of GnuPG v1.4.21 or higher. If they do not have this software, the installation process will guide users through downloading and installing this software. There is a free license available for non-commercial users as well.

Data Backups and Destruction

By Mary Grlic Wiping your hard drive disk (HDD) is the most effective way to ensure all your data, files, documents, and personal information are secure before putting your hard drive to rest. Deleting applications or files from your device will not be enough, as this...

Pharming and Keeping your Business Safe

By Mary Grlic Phishing and pharming are the two most common types of cyber crime, making up just about 33% of cyber crime attacks in the USA (2020). In 2021, over 50 financial institutions were victims of a pharming attack against customers in the United States,...

Time to Recycle Old Routers

By Mary Grlic Ever thought about how old your router is? How do you know if a wireless router is bad? According to cybersecurity company Kaspersky, 73% of users never thought about upgrading or securing their router. Maybe it does not seem like a big deal, but in...