Delay or schedule sending an email messages
You can delay the sending of a message via WorldPosta systems, or you can set rules to delay the sending of all messages by having them held in the Outbox for a period of time after you send it.
1. While composing your message, select Options.
2. Under Delivery Options section, select Do not deliver before checkbox, then select the delivery date and the time you want.
3. When you finish, Click Close, and return to compose your message.
4. When you’re done composing your message, click Send.
When you click Send the message remains in the Outbox folder until the delivery time.
If you decide later that you want to send the message:
1. Open the Outbox folder.
2. Open the delayed message.
3. From Options menu, select delay message.
4. Under Delivery Options, remove the check box “Do not deliver before”
5. Click close.
6. Click Send.
Delay the delivery of all messages
1. Click file.
2. Select Manage Rules & alerts.
4. Click New Rule.
5. In the Step 1:
Select a template box, under Start from a Blank Rule, click Apply rule on messages I send, and then click Next.
Select condition(s) list, select the check boxes for any options that you want, and then click Next.
If you do not select any check boxes, a confirmation dialog box appears. If you click Yes, the rule that you are creating is applied to all messages that you send.
Select action(s) list, select the defer delivery by a number of minutes check box.
6. In the Step 2:
Edit the rule description (click an underlined value) box, click the underlined phrase a number of and enter the number of minutes for which you want the messages to be held before it is sent.
Note: Delivery can be delayed up to 120 minutes.
7. Click Ok, and then click Next.
8. Select the checkboxes for any exceptions you want and then click Next.
9. In the Step 1: Specify a name for this rule box, type a name for the rule.
10. Select Turn on this rule checkbox, then click Finish.
Note: After you click Send, each message remains in the Outbox folder for the time that you specified.
Efail attacks are the latest vulnerability that has been announced on the 15th of May 2018. It attacks encrypted emails that are using PGP and S/MIME encryption protocols, decrypts it, and have full access to the message content and all your company sensitive details.
Not just the currently received message while transferring it but also efail attacks can work on the already existing history of messages.
Unfortunately, efail have no fix announced so far, so the recommendation in order to prevent this attack to happen is to stop using PGP and S/MIME encryption tools and switch to using an alternative end-to-end encryption tool.
The Electronic Frontier Foundation (the leading organization defending civil liberties in the digital world) confirmed this vulnerability and advised to stop using immediately PGP encryption tools and delete any related components and also to not open any old messages using PGP encryption.
The investigations so far proved that the problem is not with the PGP encryption protocol itself but the problem resides in the email client when affected that starts an unauthorized transferring of your email content, that unauthorized transfer is called data exfiltration. As a workaround, you can decrypt your encrypted emails in a separate application outside of your email client.
How do efail attacks work?
Well, let me explain this in the simplest way. The attacker access your PGP or S/MIME encrypted message, either over the network before receiving it or an already existing email that you have, inject it with a certain code that will make the client email(after automatically decrypting the received email) transfer all the data in the message to the attacker
In-House or Cloud Exchange?
Each corporate has its own email database that needs to be stored safely and efficiently.
As a business owner, you may have a lot of concerns regarding how to store your company’s data and communications including sensitive ones. Some of these concerns are where to store these data? How to manage it? And how much this storage and maintenance will cost you?
Well, let us start by answering the “Where” question by two terms, In-house Exchange or Hosted Exchange.
● In-House Exchange: You may choose to store your communication data on your own Exchange servers that your team built by themselves in your corporate and you will have the full control over this data centre
● Hosted Exchange: Or you may choose to store your data over a hosting Cloud so that the provider will make a Microsoft Email for you located on remote servers
So now let’s take a closer look at each of the above options to help you take the right decision for your corporate. We will use Worldposta, the cloud base email service, as an example to better explain some features
|In-House Exchange||Hosted Exchange|
|Pricing||Despite the initial budget needed in order to build up your email data centre from scratch,
You will never know how your business communication will grow or how often you will need maintenance for your system components or when you need to save a failure. These are unpredictable expenses,
you will need a capital to pay for
|The price is a known fixed one that you pay monthly for the hosted service per user. This makes things easier to manage your budget|
|Operating Expenses||You will need to set a specific budget for all software and hardware components. And
since your IT team will be the one responsible to manage and maintain your in-house data centre then this will also cost you time and effort
|There will be some initial expenses for installation and one-time migration in order to set up the needed services and minimal ongoing IT maintenance costs.
So the payment here is just to receive the service
|Storage||As your corporate is growing you will need to increase your email capacity so you could be able to manage all the incoming and outgoing communications needed .this capacity increase, cost you more resources(servers, software) and more time||As your corporate is growing your email capacity is easily increased using the latest technologies to adjust to your work needs. As for WorldPosta, it can offer multiple plans and you can choose based on your business needs. They offer a capacity up to 200GB storage per user and 35MB attachment size|
|Expertise||Your IT team will need to have expertise on how to install and built the exchange server and how to maintain it effectively. So you may need frequently held training||You will depend on the expertise of the hosting exchange provider and free your IT team from this headache.
WorldPosta Technical support team are available 24/7 to solve any issues
|Upgrades||Your team will be responsible to make sure that the system is up running and upgraded to the latest version||The system is up running and updated to the latest version automatically with no worries|
|Scalability||Managing growth is a complex process. As the company’s email grows you will need more resources, an adaptive network and software in order to have the ability to run your system effectively with no downtime or failures. And again it’s your IT team responsibility with your budget support to set up the system properly||The system is flexible to scalability changes by adding and deleting users easily. The hosting provider is frequently updating the system to fit all needed changes. Your email system is always ready to handle all your business demand which gives more stability to your communication system and therefore your production flow.|
|Protection||Your communication network needs to be exclusively protected against any spam or any external harm. So your team, again and again, is still responsible to provide the latest, updated and most advanced protection layers and antiviruses to keep your communications save||In case of the hosted exchange the protection layers and antivirus/spam are already built in to scan your system and prevent any unwanted messages to ruin your network
As for WorldPosta, an email filtering server is used to manage the protection process by applying several stages of scanning before approving the message safety. These stages include anti-spam layers, anti-viruses, Malware detection, images analysis, content blocking and more several intelligent built-in techniques
|Disaster Recovery||Disasters are unpredictable, then your system could go suddenly down. To face that sudden disaster you will need to have backups and clusters and email archives to keep a clean copy of your data so that your team can take back your system up. These processes are overwhelming for any company and it’s time-consuming||Your email system is always available due to the built-in continuity system to ensure that your system will not go down
For WorldPosta, servers are distributed in 35 available zones and are integrated with Amazon AWS servers which guarantee a high availability with maximum performance
Cloud computing technologies are used to solve a lot of complexity that are facing business these days from the financial side, the ease and flexibility of use from another side.
Now that you knew how to face your work complexity, how to ensure the best levels of security furthermore, in what way to face your communication and business growth, I hope this could help you to take the best decision for your company. I believe it’s not difficult any more to decide what the best is for your company.
Have you ever wondered how machines or servers can talk to each other? Yes they can talk exactly like a human being but with a different language
When I was young my older sister used to teach me how we signal our brain to hear what other people say and translate it and then send back a signal from the brain to our mouth so we could talk back, I grew up and I realized that it’s not just for humans but also machines can do the same signal process but by establishing a wireless or internet connection between two points and start a flow of sending and receiving signals that held data between these two ends.
A lot of devices can be connected to each other over several networks and these networks are all also connected to each other, and that’s the internet definition. When a message is sent from one device to another, it passes through different roads depending on the traffic holding the address of the other endpoint it should be reaching.
Email Messaging Protocols
In this article, we will be talking specifically about Email Messaging Protocols and its three main types used to manage and set the rules for the communication between two ends and we are going to know what is happening behind the scene when sending and receiving emails.
Internet Mail Access Protocol, This is an email protocol used in the receiving process by allowing the user to access a sent email over a remote web server.
By using this protocol received emails are stored and saved over the server, they are not downloaded to your device so this allows the user to access the email from anywhere.
IMAP synchronization between the server and the client email is limited to the email only, which means the calendars, Tasks, contacts and all other components are not included in the synchronization process. Besides these limitations the synchronization process is slow and some IMAP versions need external synchronization applications with extra costs to accelerate synchronization
An example of providers using IMAP is the GMAIL.
Post Office Protocol and 3 is for the current version used.
This protocol is similar to the previous one (IMAP) in being responsible to manage to retrieve emails, but they are different in storing the received data, so for the POP protocol the email is downloaded on your personal device and then deleted from the server, which limits accessing your email to one device only where your received data are downloaded, but this could save memory over the server.
Simple Mail Transfer Protocol. This is the standard protocol used for the email sending process
Messaging Application Programming Interface. This messaging protocol works the same way as IMAP but MAPI has additional beneficial features.
So the received emails are stored over the server and could be accessed from anywhere.
The Key point that distinguishes the MAPI Protocol is the synchronization process.
The synchronization process is built in and applied for the email folders, subfolders, Calendar, Tasks, and contacts.
Using MAPI protocol, every 25 users need 1 Mega pure internet, so the connection needed is very light and will not be affected by any congestions.
One of the examples using the MAPI protocol is WorldPosta email service provider
How these protocols work together?
To know how this sending and receiving process work, you have to be familiar with some keywords:
Mail servers: This is an application that works on receiving the sent email from the sender and deliver it to the receiver device
DNS: Domain Name System, its main role is to resolve the domain name to IP address or vice versa, to make it short, the DNS is responsible to find the address in order to deliver the mail to the correct end.
How does it work?
In this emailing process, we have two ends, the sender and the receiver.
The sender starts by entering the address of the receiver and send the needed communication, this part is done using the STMP protocol.
The email then goes to the mail server responsible for the mail transfer until delivery, at that stage the DNS start to resolve the address received in order to find the corresponding mail server of the receiver. Then the email will be sent using this resolved address to the mail server of the receiver by also using STMP protocol for sending the email.
As a final stage, the email will be delivered and transferred from the recipient’s mail server to the recipient using POP or IMAP, or MAPI protocol for retrieving the message.
This is a simple illustration of how things go behind scenes when pressing the send button on your email box application.
What is DNS server?
When you enter a domain name or it’s easier to say a “link “over the internet, this domain name is sent to the DNS server in order to find the matching IP address record for this domain name and help users to find a specific website or help computers to communicate when sending emails. So the role of DNS is to resolve domain names into IPs.
A network consisting of a number of DNS servers define the domain name system.
● Each node in the DNS Hierarchy represents the name of the server.
● Each server is responsible for his DNS namespace Zone.
● Each DNS server function to resolve requests in its own zone.
Let’s take an easy example: eos.cs.berkely.edu
.edu : is the Top Level Domain (TLD)
Berkely.edu : is the secondary level domain
cs.berkely.edu: is the sub-domain
eos.cs.bekely.edu : is the Host domain where “eos” is the host server name.
eos.cs.berkely.edu is the definition of a fully qualified domain name (FQDN).
Now that we have briefly explained the DNS concepts, let’s move to a different point of discussion.
You can configure only one Primary DNS for one zone and multiple secondary DNS for redundancy as a cloning backup for your DNS. The Primary DNS holds the original client data while the secondary holds a synchronized copy of the original data.
The copy on the Secondary domain is a read-only copy but it could be updated when making any changes in the configuration files belonging to the primary server.
Besides the use of the secondary domain as a backup, it could also be used for load balancing so that the flow does not overwhelm the Primary domain which may cause a denial of service.
Can you delete a secondary domain after creating it?
Yes, this can be easily done, but once it’s deleted it could never be retrieved back.
After deletion of the secondary domain, the automated transfer or synchronization will automatically stop and all changes impact only the Primary one.
How to delete the Secondary domain?
Following some simple steps:
● From the DNS menu, choose “secondary DNS”
●Choose the secondary domain that you want to delete
● Select the “delete” from the action list
● You have to confirm the deletion by clicking yes on the pop-up confirmation box
● After confirming deletion you then submit your request
Note: you can create a new secondary domain any time after deletion if needed.