itb-au logo
Story image

Why businesses should ban email attachments

27 May 2019

The humble email attachment is an integral part of daily business communication – but according to one company, email attachments should be banned outright in favour of more ‘secure’ and ‘reliable’ collaboration methods.

“Businesses rely on documents to operate,” says M-Files A/NZ alliance and partner director, Nicholas Delaveris. “When people are working from an outdated version of a document, they can waste time, make errors, and potentially risk the success of the project they’re working on.”

“Furthermore, documents shared via email can easily be sent to the wrong person accidentally, compromising information security. Organisations can benefit from eliminating email attachments altogether, replacing this outdated mode of collaboration with a modern, intelligent information management system.”

The company says there are several other ways email attachments are inefficient:

1. Version control delays. When various team members have worked on a document, it takes significant extra work to go through each version and parse the different edits into one document.

Not only that, but those team members may at some point be viewing an outdated version, changes can be missed, and incorrect information could slip through.

2. Disorganised approval processes. Even if documents don’t need to be edited by various team members but simply approved, email isn’t the most efficient way to manage this. For example, if a project manager sends an attachment to 20 team members asking for a simple reply to confirm approval, they must then keep track of who out of the 20 recipients has replied, who has approved the document, and who has made changes. They’ll also need to chase the people who don’t respond in a timely manner. All of this takes time and creates myriad opportunities for errors.

3. Confidentiality issues. Email attachments are uncontrolled duplicates. Once an attachment has been sent, it exists in an environment outside the creator’s control and can be edited and forwarded without oversight. And, the email attachment could be sent to an unintended recipient. In short, document creators have no access control.

  • An enterprise content management (ECM) system easily solves these inefficiencies by letting users:
  • Share the document with a link to one unified version, rather than an attachment which spins off many different versions. From there, content stakeholders can check the document out, make changes or comments and check it back in for the next person, effectively enforcing a single document process.
  • Control who can access the document and who can edit it, and add, remove, or suspend access to the document if the stakeholder group changes.
  • Monitor quickly which recipients have accessed the document and who hasn’t yet completed the assignment.
  • Request sign-off in the form of a simple assignment workflow where users mark the document as completed and receive automatic reminders.
  • Inspect the entire document history including version changes, who edited it and when, and what edits were made.
  • Facilitate mobile access to content.

“Most organisations don’t think twice about using email attachments for collaboration,” says Delaveris. “However, this method is inefficient and risky. Businesses should consider an ECM system to avoid these challenges, increase their operational efficiency, and improve their document security capabilities.”

Story image
GitHub shares 'greatest hits' open source repositories with historic libraries
Barely 12 months after launching an initiative to preserve open source software for future generations, GitHub is now sharing these collections with major libraries around the world.More
Story image
The devices that are changing the streaming game in time for Christmas
Here are some of the best products in the streaming business, used by veterans and beginners alike.More
Story image
Australia’s environment deserves real-time monitoring
Australia’s regulators are indirectly polluting the environment due to the adoption of a new regulatory framework. It’s not the framework that’s the issue, but the fact that an upgrade to monitoring technology doesn’t accompany it.More
Story image
How to keep office equipment safe in the COVID-19 era
In addition to basic hygiene procedures like mandating the use of hand sanitiser and encouraging the use of masks, organisations can minimise the risk of cross-contamination and infection when employees are using shared devices.More
Story image
Webinar: TLC for Kids on their usage of Nintex Drawloop DocGen
The charity is using the software to free up resources and enable its team to focus on its mission — which, simply put, is to put smiles back on sick kids’ faces. It does this through its TLC Ambulance, Rapid TLC, and distraction box programs, and its services are used over a million times each year across Australia.More
Link image
The definitive checklist to distinguish a broken authentication system
An improper or insecure implementation of authentication is a critical web application security risk. This checklist will discern the good from the bad.More