Email Encryption

Message Level Email Encryption Even Inside Recipient’s Inbox

October 16, 2020 / in Blog / by Zafar Khan, RPost CEO

Get Your Computer Fixed. Lose an Election Your computer stops working. All your remote working has taken its toll on a personal laptop you never indented to use this extensively. You panic because you can’t go into the office, and there’s nothing your remotely-working IT person can do when your machine can’t turn on.

How to Decrypt an Encrypted Email – Simplify Recipient User Experience

December 14, 2010 / in Blog / by Zafar Khan, RPost CEO

When sending encrypted email using RMail services, the sender can choose one of the following options:

The Importance of Auditable Proof of Compliance in Email Encryption

March 27, 2012 / in Blog / by Zafar Khan, RPost CEO

The Council of Insurance Agents and Brokers, in the 2010 Insurance Industry Email Encryption Buyer’s Guide, identified the most important criteria for compliant email encryption – criteria that holds true today as some of the most important purchase considerations.  The Email Encryption Buyer’s Guide selects RMail email encryption as top choice (for both 2010 and 2011). RMail ranked […]

How RMail Encryption is Secure and Different from Lavabit and Silent Circle

August 14, 2013 / in Blog / by Zafar Khan, RPost CEO

On Thursday, August 8th, rather than allegedly allowing the U.S. government access to their users’ messages, two secure email services, Lavabit and Silent Circle’s Silent Mail, suddenly and voluntarily closed their doors. The publicity surrounding the shutdowns have once again led to questions about “how RMail encryption is different?”

If Only Hillary Clinton Knew About RMail

March 18, 2015 / in Blog / by Zafar Khan, RPost CEO

The constant challenge for IT professionals and security experts is to balance security and usability. If the most secure system is too complicated or cumbersome to use, people will circumvent it. Once the official or corporate system is circumvented, security has devolved from professional (IT executive) to amateur (end user).

Email Encryption: Choosing the Right System

January 08, 2016 / in Blog / by Zafar Khan, RPost CEO

Email encryption systems often advertise identical benefits, but there are some critical differences that you should understand before choosing a system. Below we outline three different methods: True Direct Delivery, Secure Store and Forward and Public Key Exchange. The best method for security and ease of use is the “True Direct Delivery” method employed in […]

Supercharge Your Customers’ Email with RMail®

January 25, 2016 / in Blog / by Zafar Khan, RPost CEO

From small startups to global enterprises, email is the single most critical application used by businesses and their employees today. According to a report by technology research firm Radicati Group, Inc., the number of worldwide email users reached 2.6 billion in 2015 and is expected grow to over 2.9 billion users by the end of 2019. From […]

67% of RPost User Survey Respondents Concerned About Prospect of Unfettered Government Access to Encryption

February 23, 2016 / in Blog / by Zafar Khan, RPost CEO

Should the US government require technology companies to provide a “master key” to unlock all encrypted files? What began as a hypothetical question in the US Presidential Primary Election debates has evolved into an interesting standoff between tech titans and the FBI around encrypted files stored on an Apple iPhone (used by one of the […]

Changing Trends in Cyber Security

May 05, 2016 / in Blog / by Zafar Khan, RPost CEO

In the past, for individuals and small businesses, cyber security was important to mitigate the inconvenience of spam, viruses that required restoring back-ups of corrupt files, and letters to credit bureaus to clear up identity theft issues.

Understanding HIPAA: Enforcement, Encryption, and Documentation

May 16, 2016 / in Blog / by Zafar Khan, RPost CEO

Email encryption is one of the strongest defenses that an organization can implement against data breaches brought on by the improper disclosure or distribution of medical records or protected health information (PHI). But without written policies and procedures governing the use of encryption services, these efforts mean next to nothing in the eyes of HIPAA […]