Blog

Top 3 Real Estate Title Settlement Tech Issues & Insights from ALTA ONE at Optimize!22

November 11, 2022 / in Blog / by Zafar Khan, RPost CEO

From ALTA ONE, The Top 3 Peer Insights (We Took Notes for You) The American Land Title Association conference in San Diego (ALTA ONE) was quite an event – on beautiful Coronado Beach, white sand, and (unfortunately) more fog and rain than most expected for California-in-drought. We at RPost had a team of cybersecurity experts […]

Top 5 Insurance Tech Issues & Insights From AppliedNet at Optimize!22

November 09, 2022 / in Blog / by Zafar Khan, RPost CEO

From AppliedNet, The Top 5 InsurTech Peer Insights (We Took Notes For You) To extend the premise of today’s in-person user conferences – learning from peers – we’ve prepared a list of the five most significant issues or insights that we heard from insurance agents’ and brokers’ conference participants in October.

eSign and eSecurity Tips to Help Inflation Hedge

November 04, 2022 / in Blog / by Zafar Khan, RPost CEO

Cutting costs while effectively adding superior services is the perfect inflation hedge. “It’s the economy, stupid!” This phrase gained fame from the political strategist, James Carville, who was trying to describe what voters cared about in 1992. We’re not even going to dip our toe into today’s political maelstrom; however, I could not help but […]

How To Know if Someone Read Your Email in Another Country Where it Has No Business

October 28, 2022 / in Blog / by Zafar Khan, RPost CEO

Get visibility into who may be watching your email so you can immediately re-establish your privacy. Netflix has scored a big hit with The Watcher, as the show has logged over 850 million viewing hours since it debuted a month ago. The Watcher tells a familiar story about a young family moving from the city […]

Alert on External Email When There Is an Actual Issue

October 21, 2022 / in Blog / by Zafar Khan, RPost CEO

Only RMail offers features that can foil BEC attacks without “cry wolf” email stamps. We’ve talked a lot about the hydra of BEC (business email compromise) attacks recently due to the increasing share of these types of attacks within the universe of cybercrime that employ multiple techniques to lure users into sending money to the […]