Blog

How to Send Large Files by Email

June 30, 2016 / in Blog / by Zafar Khan, RPost CEO

You may have noticed that when you send a large file attachment by email, it sometimes gets kicked back to you undelivered with an error message that says something like: “The attachment size exceeds the allowable limit.” But what are these limits? And how can you securely send a large file attachment when it’s too […]

Online Ads Provide Hacker Entry Point

June 23, 2016 / in Blog / by Zafar Khan, RPost CEO

In the recent Tech Essentials article “Changing Trends in Cyber Security,” we highlighted how hackers are becoming more innovative in their ability to use generally available social media (i.e. LinkedIn recruiter tools) and other business applications to target email recipients with imposter email and lure them into wiring money to hackers.

RMail Equips RIAs with Tools to Manage Email Security and Compliance

June 13, 2016 / in Blog / by Zafar Khan, RPost CEO

RPost has launched an educational campaign to ensure that registered investment advisors (RIA’s) can securely communicate with clients and comply with rules enforced by auditors and regulatory organizations.

Hashed but Not Salted

May 20, 2016 / in Blog / by Zafar Khan, RPost CEO

You may remember the 2012 LinkedIn data breach, in which 6.5 million LinkedIn user accounts were believed to have been compromised. According to BBC and LinkedIn itself, the number of affected LinkedIn users from that 2012 data breach could actually be upwards of 100 million, or the majority of the 165 million users LinkedIn had in 2012.

Understanding HIPAA: Enforcement, Encryption, and Documentation

May 16, 2016 / in Blog / by Zafar Khan, RPost CEO

Email encryption is one of the strongest defenses that an organization can implement against data breaches brought on by the improper disclosure or distribution of medical records or protected health information (PHI). But without written policies and procedures governing the use of encryption services, these efforts mean next to nothing in the eyes of HIPAA […]