When was the last time you wanted to throw your fax machine out the window? If you're like most managers and office workers, faxes might be first on your list of Top 10 Most Annoying Machines. Half the time they don't send correctly, or they're busy when you try to send.
Don't throw your fax out just yet, though. Faxing still offers some important advantages over emailing. In some ways, faxes are actually more secure than email.
1. Email attachments can harbor viruses. Many administrators feel that fax is slow and inefficient, no longer conducive to today's fast-paced business. But email attachments can harbor viruses that can debilitate your computers and leave your IT department struggling to reinstall software and beat the clock against an infection spreading across your network.
According to many security researchers, nearly every common email attachment file format can harbor a virus — Acrobat PDFs, Word and Excel documents, application files and more. The widespread use of email attachments leads many office workers to feel complacent about what they open, so they often aren't careful enough and infect their computers before they know it. If the alternative is a fatal virus in your network, taking a couple of extra minutes to fax instead of email a document might be worth the hassle.
2. Faxes don't get blocked like emails. Because emails can harbor viruses and are a target for hackers, many companies have filters that scan and reroute messages directly to the junk mailbox. Some employees might wait and wait for an attachment that never comes — because it's been blocked for being too large, poorly named or another reason. When the system falsely identifies an email as junk, it's called a "false positive," and the mistake can slow down business. By the time the sender calls to verify whether the email was received, a project might be late or a sales opportunity might be missed.
Fax offers the benefit that a message won't be filtered as "junk" by the network, and it also can't print corrupted files. Naturally, other problems could occur, for example if someone grabs a fax intended for another colleague. However, as long as colleagues are only sending business-related materials and are honest with one another, this is unlikely to be a problem.
3. Faxes can keep your data private. To most non-tech folks, email feels like it's just as secure as a fax, or more so. After all, it doesn't leave pages scattered across the office for snooping co-workers to sift through. However, if you're performing business as usual, it's probably OK for your closest office mates to see your faxes. If you're really worried, you can go hang out by the fax machine and wait for the most important messages to arrive.
In reality, most email isn't protected from prying eyes either, unless you go out of your way to add encryption. Because email's not encrypted as it gets transmitted, IT staff or hackers listening in to the transmission can intercept the data and spy on the messages. Fax, on the other hand, is an encrypted transmission. People can't hack and decode your fax message if you're using a plain old fax service on the telephone lines.
So, Fax is Better than Email?
Not exactly. Ultimately, fax isn't the strongest form of security . It still has notable flaws and eventually will be replaced by encrypted email and attachments. In the meantime, though, fax can offer some benefits — and you now have a few reasons to keep your old machine around.
Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more
For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more
In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more
With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more