It is easy to fall into a workplace routine; you know how to get something done and your process works. Eventually you look to train others to use the shortcuts and process that you have found works, happy to hand off the tasks to another.
Recommendation engines operate behind the scenes everywhere, to make life a little more enjoyable, simpler, and more relevant. But do these make us all narrower minded?
Your close friends Siri and Alexa may have done more to change how IT staff are re-inventing how they think about Internet security than years of tech tips and training sessions.
There is a wide body of people that believe they are sending information private because they are sending using Microsoft Office 365, Gmail, or using a third-party service that sends all messages using transmission layer security.
With the recent media focus on cybersecurity, whether it is talk of Russian hackers scheming to influence US presidential elections, or the pervasive pressure to comply with GDPR or HIPAA (healthcare privacy regulations) or other consumer data privacy requirements, “encryption” is one of the solutions that is often introduced.
The DHS is using Congress’ “Real ID” Act of 2005 to require all US states to issue new, more robust IDs for air travel originating in the United States.
The ubiquity of smart phones and their apps have reduced the attention span for the masses. People now expect their information in big fonts, nice colors, and pretty pictures.
The term “security by obscurity” has been around for a long time. Traditionally, this has referred to the idea that the best way to keep a system safe is to keep its design (and any potential vulnerabilities) a secret. To many, “security by obscurity” has also represented the idea that there is safety in numbers, such as on a social media network that has hundreds of millions of users. One might argue that the intersection of social media, online platforms that gather and sometimes sell (for legitimate purposes) personal data, and peoples’ addiction to electronic communication convenience, may call for a new way of thinking about one’s own (or a client’s) security by obscurity.
In our recent Tech Essentials edition, about the “million-dollar email,” delivery proof was at question. The recent events highlighted below emphasize the additional importance of being able to easily prove the content of your sent email. As you will read, it is very easy for a recipient to modify an email with a few mouse strokes, print to PDF, forward the modified copies, and suddenly you, the sender, are on the defensive… trying to prove what you sent was not what the receiver claims to have received from you.
While it’s very common to hear from attorneys and law firms who use RMail for their high-profile cases in district and circuit courts, here we share a story from one RMail user, where the value of our Registered Email™ receipt was literally, his family’s home.