Many people, nostalgic for their 90s-era email account passwords, are having (or already had) their emails hacked. I don’t mean to date myself (a lonely pursuit anyway), but I can remember having passwords in the 90s that were quaint by modern standards—in addition to being woefully inadequate to protect against today’s cybersleuths.
RMail is SMART technology that actively hunts attacks that are already underway so you can swiftly dismantle them before they strike. “War is politics by other means,” wrote the famous military theorist, Carl von Clausewitz, back in the early 19th century, which was a time when wars were fairly limited, low tech, and almost gentlemanly […]
Ransomware Attacks Won’t Die–Just Multiply Ransomware has become such a hot topic with a seemingly new case every day that we thought we would pick up where we left off last week…
We hope you are enjoying the “Tech Trends to Expect in 2017″ series. Last week, we made the second of three weekly predictions on technology trends we think will manifest in 2017. Here’s our third and final prediction of the series: Prediction 3: Cybersecurity will be a primary purchase driver for consumers shopping for professional services Consumers are […]
The RPost team thanks you, our community of users, customers, partners, shareholders, and advocates, for another exciting year at RPost. Your support enables the RPost team to continue innovating for our customers, and to maintain RPost as a worldwide leader in cyber security, compliance, and productivity solutions.
Have you, your staff, or a client ever sent an important email that the recipient claimed he or she did not receive? Over the next three weeks, Tech Essentials will explore common misconceptions about email delivery that will prepare you in case delivery of your (or a client’s) time-dependent email is disputed. Let’s get started […]
Most disputes center on who said what to whom and when. When an email gets lost without the sender being aware, the entire conversation or negotiation can derail, and there can be serious financial and/or reputational damage as a consequence.
In the past, for individuals and small businesses, cyber security was important to mitigate the inconvenience of spam, viruses that required restoring back-ups of corrupt files, and letters to credit bureaus to clear up identity theft issues.
In the recent Tech Essentials article “Changing Trends in Cyber Security,” we highlighted how hackers are becoming more innovative in their ability to use generally available social media (i.e. LinkedIn recruiter tools) and other business applications to target email recipients with imposter email and lure them into wiring money to hackers.
March 01, 2024
February 23, 2024
February 16, 2024
February 09, 2024
February 01, 2024