{"id":1723,"date":"2019-01-10T17:51:55","date_gmt":"2019-01-10T17:51:55","guid":{"rendered":"http:\/\/www.kruptos2.co.uk\/blog\/?p=1723"},"modified":"2019-02-07T13:04:03","modified_gmt":"2019-02-07T13:04:03","slug":"how-to-send-encrypted-email-attachments-using-kruptos","status":"publish","type":"post","link":"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/","title":{"rendered":"How to Send Encrypted Email Attachments using Kruptos"},"content":{"rendered":"\n<p>Kruptos2 Professional allows you to create encrypted email attachments so you can email your sensitive documents to anyone who has a Windows based computer. Your recipients do\u00a0<strong>not<\/strong>\u00a0need to have <a href=\"http:\/\/www.kruptos2.co.uk\/download.html\">Kruptos 2 Professional installed<\/a> all they need is the correct password to gain access to your shared documents.<\/p>\n\n\n\n<p>Kruptos 2 Professional encrypted attachments utilise the same power behind\u00a0<a href=\"http:\/\/www.kruptos2.co.uk\/k2help\/windows\/shredding.html\">self-extracting files<\/a>\u00a0so you can be sure your files are secure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Creating Encrypted Email Attachments using Windows Explorer<\/h3>\n\n\n\n<p>1. Open windows explorer (Windows key + E)<br>2. Select the files and folders you want to destroy and choose\u00a0<strong>Kruptos 2 Professional | Encrypted Email<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/www.kruptos2.co.uk\/k2help\/windows\/design\/emailexplorer.png\" alt=\"start bar\"\/><\/figure>\n\n\n\n<p>3. Enter your password, password hint and a name for the email attachment<br>4. Click the browse button and navigate to the folder where you would like to save your encrypted attachment<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/www.kruptos2.co.uk\/k2help\/windows\/design\/emailwindow.png\" alt=\"start bar\"\/><\/figure>\n\n\n\n<p>5. Click the&nbsp;<strong>Create<\/strong>&nbsp;button<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/www.kruptos2.co.uk\/k2help\/windows\/design\/emailAttachemnt.png\" alt=\"start bar\"\/><\/figure>\n\n\n\n<p>6. Your encrypted attachment file will now be created. You can now choose to attach your encrypted attachment to new email or to attach later. If you choose to attach now <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2.html\">Kruptos 2 Professional <\/a>will attempt to open your default email client and create a new email with the attachment.<\/p>\n\n\n\n<p><em>Note<\/em>\u00a0if you use a web based email client: a) Select\u00a0<strong>No<\/strong>\u00a0&#8211; send email a later time<br>b) Open your webmail client and create a new email<br>c) Add the encrypted attachment to your email.<br>d) Send<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"mce_23\">Creating Encrypted Email Attachments using Kruptos 2 Projects<\/h3>\n\n\n\n<p>1. Start&nbsp;<strong>Kruptos 2 Professional<\/strong><br>2.&nbsp;<a href=\"http:\/\/www.kruptos2.co.uk\/k2help\/windows\/projects.html\">Add your files<\/a>&nbsp;to your project or open an existing project<br>3. Click the&nbsp;<strong>Email<\/strong>&nbsp;button on the Toolbar<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/www.kruptos2.co.uk\/k2help\/windows\/design\/emailbutton.png\" alt=\"start bar\"\/><\/figure>\n\n\n\n<p>4. Enter your password, password hint and a name for the email attachment<br>5. Click the browse button and navigate to the folder where you would like to save your encrypted attachment<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/www.kruptos2.co.uk\/k2help\/windows\/design\/emailwindow.png\" alt=\"start bar\"\/><\/figure>\n\n\n\n<p>6. Click the&nbsp;<strong>Create<\/strong>&nbsp;button<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/www.kruptos2.co.uk\/k2help\/windows\/design\/emailAttachemnt.png\" alt=\"start bar\"\/><\/figure>\n\n\n\n<p>7. Your encrypted attachment file will now be created. You can now choose to attach your encrypted attachment to new email or to attach later. If you choose to attach now <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2.html\">Kruptos 2 Professional<\/a> will attempt to open your default email client and create a new email with the attachment.<\/p>\n\n\n\n<p><em>Note<\/em>\u00a0if you use a web based email client: a) Select\u00a0<strong>No<\/strong>\u00a0&#8211; send email a later time<br>b) Open your webmail client and create a new email<br>c) Add the encrypted attachment to your email.<br>d) Send<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"mce_28\">Using Encrypted Email Attachments<\/h3>\n\n\n\n<p><strong>Encrypted email attachments contain a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Zip_(file_format)\">Zip file <\/a>which in-turn contains an encrypted self-extracting file. To use and extract the contents of an encrypted attachment:<\/strong><\/p>\n\n\n\n<p>1. Open the attachment and then double click the self-extracting file (Alternatively you can save the self-extracting file to any destination the double click to open)<\/p>\n\n\n\n<p>2. The following wizard will be displayed<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/www.kruptos2.co.uk\/k2help\/windows\/design\/SFX-Wizard.png\" alt=\"auto encryption\"\/><\/figure>\n\n\n\n<p>3. Click&nbsp;<strong>Next<\/strong>&nbsp;to continue<br>4. Enter a location to extract the contents of the Self-Extracting file to: simple click the &#8216;browse&#8217; button and navigate to the desired location, then click&nbsp;<strong>Next<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/www.kruptos2.co.uk\/k2help\/windows\/design\/SFX-Wizard1.png\" alt=\"auto encryption\"\/><\/figure>\n\n\n\n<p>5. Choose options, then click&nbsp;<strong>Next<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/www.kruptos2.co.uk\/k2help\/windows\/design\/SFX-Wizard2.png\" alt=\"auto encryption\"\/><\/figure>\n\n\n\n<p>6. Enter the correct password then click&nbsp;<strong>Extract<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/www.kruptos2.co.uk\/k2help\/windows\/design\/SFX-Wizard3.png\" alt=\"auto encryption\"\/><\/figure>\n\n\n\n<p>7. The contents of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Self-extracting_archive\">Self-Extracting file<\/a> will now be extracted and decrypted using the provided password.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/www.kruptos2.co.uk\/k2help\/windows\/design\/SFX-Wizard4.png\" alt=\"auto encryption\"\/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Kruptos2 Professional allows you to create encrypted email attachments so you can email your sensitive documents to anyone who has a Windows based computer. Your recipients do\u00a0not\u00a0need to have Kruptos 2 Professional installed all they need is the correct password to gain access to your shared documents. Kruptos 2 Professional encrypted attachments utilise the same &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"ast-button\" href=\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/\"> <span class=\"screen-reader-text\">How to Send Encrypted Email Attachments using Kruptos<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":1725,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,7,36],"tags":[],"class_list":["post-1723","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-how-to","category-kruptos-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Send Encrypted Email Attachments using Kruptos - Kruptos Security Blog<\/title>\n<meta name=\"description\" content=\"How to Send Encrypted emails, Encrypted email attachments, Kruptos email attachments email encrytion, encrypt and send email, Encrypted emails using kruptos\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Send Encrypted Email Attachments using Kruptos - Kruptos Security Blog\" \/>\n<meta property=\"og:description\" content=\"How to Send Encrypted emails, Encrypted email attachments, Kruptos email attachments email encrytion, encrypt and send email, Encrypted emails using kruptos\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/\" \/>\n<meta property=\"og:site_name\" content=\"Kruptos Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-10T17:51:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-02-07T13:04:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/email-encrypt.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"336\" \/>\n\t<meta property=\"og:image:height\" content=\"240\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thiru\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thiru\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/\"},\"author\":{\"name\":\"Thiru\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\"},\"headline\":\"How to Send Encrypted Email Attachments using Kruptos\",\"datePublished\":\"2019-01-10T17:51:55+00:00\",\"dateModified\":\"2019-02-07T13:04:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/\"},\"wordCount\":499,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/email-encrypt.jpg\",\"articleSection\":[\"Data Protection\",\"How To\",\"Kruptos News\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/\",\"name\":\"How to Send Encrypted Email Attachments using Kruptos - Kruptos Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/email-encrypt.jpg\",\"datePublished\":\"2019-01-10T17:51:55+00:00\",\"dateModified\":\"2019-02-07T13:04:03+00:00\",\"description\":\"How to Send Encrypted emails, Encrypted email attachments, Kruptos email attachments email encrytion, encrypt and send email, Encrypted emails using kruptos\",\"breadcrumb\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#primaryimage\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/email-encrypt.jpg\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/email-encrypt.jpg\",\"width\":336,\"height\":240,\"caption\":\"kruptos email encryption\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kruptos2.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Send Encrypted Email Attachments using Kruptos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"name\":\"Kruptos Security Blog\",\"description\":\"The Kruptos Security Blog\",\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\",\"name\":\"Kruptos Security Blog\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"width\":200,\"height\":58,\"caption\":\"Kruptos Security Blog\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\",\"name\":\"Thiru\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"caption\":\"Thiru\"},\"description\":\"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Send Encrypted Email Attachments using Kruptos - Kruptos Security Blog","description":"How to Send Encrypted emails, Encrypted email attachments, Kruptos email attachments email encrytion, encrypt and send email, Encrypted emails using kruptos","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/","og_locale":"en_US","og_type":"article","og_title":"How to Send Encrypted Email Attachments using Kruptos - Kruptos Security Blog","og_description":"How to Send Encrypted emails, Encrypted email attachments, Kruptos email attachments email encrytion, encrypt and send email, Encrypted emails using kruptos","og_url":"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/","og_site_name":"Kruptos Security Blog","article_published_time":"2019-01-10T17:51:55+00:00","article_modified_time":"2019-02-07T13:04:03+00:00","og_image":[{"width":336,"height":240,"url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/email-encrypt.jpg","type":"image\/jpeg"}],"author":"Thiru","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Thiru","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#article","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/"},"author":{"name":"Thiru","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf"},"headline":"How to Send Encrypted Email Attachments using Kruptos","datePublished":"2019-01-10T17:51:55+00:00","dateModified":"2019-02-07T13:04:03+00:00","mainEntityOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/"},"wordCount":499,"commentCount":0,"publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/email-encrypt.jpg","articleSection":["Data Protection","How To","Kruptos News"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/","url":"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/","name":"How to Send Encrypted Email Attachments using Kruptos - Kruptos Security Blog","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#primaryimage"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/email-encrypt.jpg","datePublished":"2019-01-10T17:51:55+00:00","dateModified":"2019-02-07T13:04:03+00:00","description":"How to Send Encrypted emails, Encrypted email attachments, Kruptos email attachments email encrytion, encrypt and send email, Encrypted emails using kruptos","breadcrumb":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#primaryimage","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/email-encrypt.jpg","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/email-encrypt.jpg","width":336,"height":240,"caption":"kruptos email encryption"},{"@type":"BreadcrumbList","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kruptos2.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Send Encrypted Email Attachments using Kruptos"}]},{"@type":"WebSite","@id":"https:\/\/kruptos2.co.uk\/blog\/#website","url":"https:\/\/kruptos2.co.uk\/blog\/","name":"Kruptos Security Blog","description":"The Kruptos Security Blog","publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/kruptos2.co.uk\/blog\/#organization","name":"Kruptos Security Blog","url":"https:\/\/kruptos2.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","width":200,"height":58,"caption":"Kruptos Security Blog"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf","name":"Thiru","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","caption":"Thiru"},"description":"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.","url":"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1723"}],"version-history":[{"count":3,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1723\/revisions"}],"predecessor-version":[{"id":1834,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1723\/revisions\/1834"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media\/1725"}],"wp:attachment":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}