Most would agree that “who said what when” is at the centre of most disputes. In today’s email-centric world, many turn to their “Sent Folder” or “Inbox” to demonstrate who said what when. They may forward these emails to the people with whom they are in dispute, or may print the email to serve as […]
Should the US government require technology companies to provide a “master key” to unlock all encrypted files? What began as a hypothetical question in the US Presidential Primary Election debates has evolved into an interesting standoff between tech titans and the FBI around encrypted files stored on an Apple iPhone (used by one of the […]
Businesses cannot rely solely on cyber insurance policies to protect themselves and their clients from certain cybercrimes. In a recent case, Chubb Insurance refused to cover a cyber security loss of $480,000 despite the fact that Chubb had insured the victimized company for computer funds transfer fraud.
From small startups to global enterprises, email is the single most critical application used by businesses and their employees today. According to a report by technology research firm Radicati Group, Inc., the number of worldwide email users reached 2.6 billion in 2015 and is expected grow to over 2.9 billion users by the end of 2019. From […]
Email encryption systems often advertise identical benefits, but there are some critical differences that you should understand before choosing a system. Below we outline three different methods: True Direct Delivery, Secure Store and Forward and Public Key Exchange. The best method for security and ease of use is the “True Direct Delivery” method employed in […]
May 05, 2026
April 22, 2026
April 17, 2026
April 03, 2026
March 27, 2026