{"componentChunkName":"component---src-content-posts-2022-05-18-how-to-send-secure-email-attachments-in-gmail-mdx","path":"/en/blog/how-to-send-secure-email-attachments-in-gmail/","result":{"pageContext":{"id":"9a57310c-7202-581b-9bcc-f51aef748f96","title":"How to send secure email attachments in Gmail","pathname":"/blog/how-to-send-secure-email-attachments-in-gmail","publishDate":"2022-11-28T07:27:49.799Z","skipProduction":null,"image":{"src":"https://s1.nlocker.app/media/1.326.0/images/locker/blog/secure-attachments.jpg","alt":"how to send a secure email"},"layout":"Post","category":{"name":"How-To","path":"how-to"},"author":{"id":"1","name":"Eva Simpson","description":"Eva is usually the quiet one in the gang. But don’t let that silent demeanor fool you. She’s a brown belt in Brazilian Jiu-Jitsu. And when she’s not kicking butts, Eva loves to dissect complex tech topics in a way even 5-year olds would understand.","image":"images/locker/blog/avatars/eva-simpson@2x.jpg"},"seo":{"title":"How to send secure email attachments in Gmail","description":"Email attachments are commonly used to spread malware. Take these easy steps to secure email attachments.","noindex":null,"nofollow":null,"canonical":"https://nordlocker.com/blog/how-to-send-secure-email-attachments-in-gmail/","excludeFromSitemap":null,"languages":["en"],"defaultLanguageRootPage":false},"social":{"title":"How to send private and secure emails","description":"Gmail may not be the most private email provider, but you can take steps to protect yourself.","image":"https://s1.nlocker.app/media/1.326.0/images/locker/blog/secure-attachments.png","siteUrl":"https://nordlocker.com/en/blog/how-to-send-secure-email-attachments-in-gmail/"},"languages":["en"],"isLayoutCentered":null,"isLightMode":null,"structuredDataPageType":null,"headerContentTableElements":["h2"],"isPopular":null,"navBarInitiallyTransparent":null,"readingTime":"3 min read","popularBlogPosts":[{"node":{"id":"1e408799-4682-52fa-88d0-ca616cb16af0","fields":{"readingTime":"3 min read"},"frontmatter":{"title":"4 ways to encrypt or password-protect a PDF for free without Acrobat","pathname":"/blog/how-to-encrypt-pdf","publishDate":"2022-07-26T11:35:16.602Z","image":{"src":"https://s1.nlocker.app/media/1.1463.0/images/locker/blog/pdf-encryption.jpg","alt":"password protect encrypt PDF"},"featured":false,"category":{"name":"How-To","path":"how-to"},"author":{"name":"Eva Simpson","image":"images/locker/blog/avatars/eva-simpson@2x.jpg"}}}},{"node":{"id":"c75290a2-c5f5-572f-bcce-8dd55fe4778f","fields":{"readingTime":"11 min read"},"frontmatter":{"title":"Encryption 101: your complete guide","pathname":"/blog/encryption","publishDate":"2022-05-18T12:55:12.722Z","image":{"src":"https://s1.nlocker.app/media/1.1549.0/images/locker/blog/encryption.png","alt":null},"featured":false,"category":{"name":"Infosec 101","path":"infosec-101"},"author":{"name":"John Sears","image":"images/locker/blog/avatars/john-sears@2x.jpg"}}}},{"node":{"id":"1c375a07-7754-5ed4-a679-b55e185b6b89","fields":{"readingTime":"12 min read"},"frontmatter":{"title":"Everything you need to know about cloud computing","pathname":"/blog/what-is-cloud-computing","publishDate":"2022-04-26T12:55:12.722Z","image":{"src":"https://s1.nlocker.app/media/1.790.0/images/locker/blog/cloud-computing-types.jpg","alt":null},"featured":false,"category":{"name":"Expert Analysis","path":"expert-analysis"},"author":{"name":"John Sears","image":"images/locker/blog/avatars/john-sears@2x.jpg"}}}}],"intl":{"locales":[],"translations":{},"locale":{"active":true,"code":"en","title":"English","default":true,"rtl":false},"pathPrefix":""},"content":{}}},"staticQueryHashes":["718137192"]}