Get Your Computer Fixed. Lose an Election Your computer stops working. All your remote working has taken its toll on a personal laptop you never indented to use this extensively. You panic because you can’t go into the office, and there’s nothing your remotely-working IT person can do when your machine can’t turn on.
When sending encrypted email using RMail services, the sender can choose one of the following options:
The Council of Insurance Agents and Brokers, in the 2010 Insurance Industry Email Encryption Buyer’s Guide, identified the most important criteria for compliant email encryption – criteria that holds true today as some of the most important purchase considerations. The Email Encryption Buyer’s Guide selects RMail email encryption as top choice (for both 2010 and 2011). RMail ranked […]
On Thursday, August 8th, rather than allegedly allowing the U.S. government access to their users’ messages, two secure email services, Lavabit and Silent Circle’s Silent Mail, suddenly and voluntarily closed their doors. The publicity surrounding the shutdowns have once again led to questions about “how RMail encryption is different?”
The constant challenge for IT professionals and security experts is to balance security and usability. If the most secure system is too complicated or cumbersome to use, people will circumvent it. Once the official or corporate system is circumvented, security has devolved from professional (IT executive) to amateur (end user).
Email encryption systems often advertise identical benefits, but there are some critical differences that you should understand before choosing a system. Below we outline three different methods: True Direct Delivery, Secure Store and Forward and Public Key Exchange. The best method for security and ease of use is the “True Direct Delivery” method employed in […]
From small startups to global enterprises, email is the single most critical application used by businesses and their employees today. According to a report by technology research firm Radicati Group, Inc., the number of worldwide email users reached 2.6 billion in 2015 and is expected grow to over 2.9 billion users by the end of 2019. From […]
Should the US government require technology companies to provide a “master key” to unlock all encrypted files? What began as a hypothetical question in the US Presidential Primary Election debates has evolved into an interesting standoff between tech titans and the FBI around encrypted files stored on an Apple iPhone (used by one of the […]
In the past, for individuals and small businesses, cyber security was important to mitigate the inconvenience of spam, viruses that required restoring back-ups of corrupt files, and letters to credit bureaus to clear up identity theft issues.
Email encryption is one of the strongest defenses that an organization can implement against data breaches brought on by the improper disclosure or distribution of medical records or protected health information (PHI). But without written policies and procedures governing the use of encryption services, these efforts mean next to nothing in the eyes of HIPAA […]
June 02, 2023
May 26, 2023
May 19, 2023
May 12, 2023
May 05, 2023