Encryption Security

Understanding Common Misconceptions About Email Delivery (Part 2)

March 15, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

Most disputes center on who said what to whom and when. When an email gets lost without the sender being aware, the entire conversation or negotiation can derail, and there can be serious financial and/or reputational damage as a consequence. Have you ever been in a situation where an email vanishes? Part 2 of “Common Misconceptions about Email Delivery” prepares you in case delivery of your (or a client’s) time-dependent email is disputed. Let’s get right into the m [...]

Understanding Common Misconceptions About Email Delivery (Part 1)

March 10, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

Have you, your staff, or a client ever sent an important email that the recipient claimed he or she did not receive? Over the next three weeks, Tech Essentials will explore common misconceptions about email delivery that will prepare you in case delivery of your (or a client’s) time-dependent email is disputed. Let’s get started with a few pervasive misconceptions. 1. I did not get a bounce notice, so I know my email got there. This is a f [...]

“Who Said What When” Is at The Center of Most Disputes

March 10, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

Most would agree that “who said what when” is at the centre of most disputes. In today’s email-centric world, many turn to their “Sent Folder” or “Inbox” to demonstrate who said what when. They may forward these emails to the people with whom they are in dispute, or may print the email to serve as their record. Before relying on this simple text record, it is essential to consider how it will stand up to scrutiny if its content authenticity, timestamp of sending, [...]

67% of RPost User Survey Respondents Concerned About Prospect of Unfettered Government Access to Encryption

February 23, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

Should the US government require technology companies to provide a “master key” to unlock all encrypted files? What began as a hypothetical question in the US Presidential Primary Election debates has evolved into an interesting standoff between tech titans and the FBI around encrypted files stored on an Apple iPhone (used by one of the San Bernardino shooters). In January, while all of this was still a hypothetical question, RPost conducted a user poll for general interest [...]

Fake CEO Email Lures $480k Transfer, Cyber Insurance Policy Denies Coverage of Loss

February 18, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

Businesses cannot rely solely on cyber insurance policies to protect themselves and their clients from certain cybercrimes. In a recent case, Chubb Insurance refused to cover a cyber security loss of $480,000 despite the fact that Chubb had insured the victimized company for computer funds transfer fraud. The case involved a cyber insurance policy issued to Houston-based Ameriforge Group Inc. (AFGlobal Corp.) by a division of Chubb Group. Criminals impersonating AFGlobal’s CE [...]

Supercharge Your Customers’ Email with RMail®

January 25, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

From small startups to global enterprises, email is the single most critical application used by businesses and their employees today. According to a report by technology research firm Radicati Group, Inc., the number of worldwide email users reached 2.6 billion in 2015 and is expected grow to over 2.9 billion users by the end of 2019. From simple text communication and large file transmissions, to validating sensitive documents and completing revenue-generating transactions, it’s clear comp [...]

Email Encryption: Choosing the Right System

January 08, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

Email encryption systems often advertise identical benefits, but there are some critical differences that you should understand before choosing a system. Below we outline three different methods: True Direct Delivery, Secure Store and Forward and Public Key Exchange. The best method for security and ease of use is the “True Direct Delivery” method employed in RMail services, a member benefit of The Florida Bar. 1. True Direct Delivery – This system wraps [...]

The Formula for Success in Internet Security

August 25, 2015 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

As we wrote in March in our blog, “If Only Hillary Clinton Knew About RMail,” one cannot ignore the need for both security and ease of use. The constant challenge for IT professionals and security experts is to balance security and usability. If the most secure system is too complicated or cumbersome to use, people will circumvent it. Once the official or corporate system is circumvented, security has devolved from professional (IT executive) to amateur (end user). [...]

If Only Hillary Clinton Knew About RMail

March 18, 2015 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

The constant challenge for IT professionals and security experts is to balance security and usability. If the most secure system is too complicated or cumbersome to use, people will circumvent it. Once the official or corporate system is circumvented, security has devolved from professional (IT executive) to amateur (end user). Former Secretary of State Hillary Clinton’s use of a personal email system purportedly set up in her house by a colleague is a perfect, high profile e [...]

Is All Privileged Client-Provider Email Cataloged by The US Government and Accessible by Request?

February 24, 2015 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

All service providers (such as lawyers, doctors, accountants, financial advisors, etc.) who believe their communications with clients are private — and in some situations, privileged — should take note. Conversely, all clients who believe their communications with trusted service providers are private should also take note. If you believe the revelations reported by The Guardian after a recent July 17th interview with NSA whistleblower Edward Snowden, you should consider [...]