Blog

The Certified Mail Envelope Was Empty

September 06, 2016 / in Blog / by Zafar Khan, RPost CEO

You show up in court with a US Certified Mail “Green Card” delivery receipt, evidence that supposedly proves you delivered a timely notice. The other party simply stands up and says quizzically, “Sure we got the certified letter, but no one in our office could figure out why we were sent an empty envelope!”  And […]

Tips for Staying Cyber Safe on The Road

August 26, 2016 / in Blog / by Zafar Khan, RPost CEO

Next week marks the last official week of summer vacation. It is likely also the beginning of your “back to work” business travel. Business travellers should note these specific precautions when conducting business transactions from the road, especially if you are likely to be more focused on the speed of getting things done rather than […]

Shadow Brokers Release NSA Hacking Tools to The Public

August 18, 2016 / in Blog / by Zafar Khan, RPost CEO

A hacking group called Shadow Brokers has reportedly stolen powerful hacking tools from the Equation Group, a hacking group believed to be NSA-backed and responsible for many of the largest state-level hacks in history. On Saturday, Shadow Brokers released a subset of these tools to the public, which several former employees of the NSA’s hacking division, known as […]

Preventing An “Assange October Surprise”

August 11, 2016 / in Blog / by Zafar Khan, RPost CEO

Does your news feed closely resemble the plot of a Russian spy novel? It certainly might if you’ve been following the recent drama and mudslinging between the Democrats, the Russian government, the FBI, and the CIA, following the public release of private DNC emails. And that’s before the warnings of an “October Surprise” promised by […]

Russian Hackers and Pig Latin

August 03, 2016 / in Blog / by Zafar Khan, RPost CEO

With the recent media focus on cybersecurity, whether it is talk of Russian hackers scheming to influence US presidential elections or “Brexit” votes, or the pervasive pressure to comply with HIPAA (healthcare privacy regulations) or other consumer data privacy requirements, “encryption” is one of the solutions that is often introduced.