Our newly released update for the RMail Outlook plugin includes major updates to the LargeMail® service. After installing the new version, RMail users will be able to attach and send files up to 200MB directly from the “Send Registered” dialog box. There is also a new option to send files via LargeMail automatically when your […]
On Thursday, August 8th, rather than allegedly allowing the U.S. government access to their users’ messages, two secure email services, Lavabit and Silent Circle’s Silent Mail, suddenly and voluntarily closed their doors. The publicity surrounding the shutdowns have once again led to questions about “how RMail encryption is different?”
As we wrote in March in our blog, “If Only Hillary Clinton Knew About RMail,” one cannot ignore the need for both security and ease of use. The constant challenge for IT professionals and security experts is to balance security and usability. If the most secure system is too complicated or cumbersome to use, people will circumvent […]
The constant challenge for IT professionals and security experts is to balance security and usability. If the most secure system is too complicated or cumbersome to use, people will circumvent it. Once the official or corporate system is circumvented, security has devolved from professional (IT executive) to amateur (end user).
All service providers (such as lawyers, doctors, accountants, financial advisors, etc.) who believe their communications with clients are private — and in some situations, privileged — should take note. Conversely, all clients who believe their communications with trusted service providers are private should also take note.
Email encryption systems often advertise identical benefits, but there are some critical differences that you should understand before choosing a system. Below we outline three different methods: True Direct Delivery, Secure Store and Forward and Public Key Exchange. The best method for security and ease of use is the “True Direct Delivery” method employed in […]
From small startups to global enterprises, email is the single most critical application used by businesses and their employees today. According to a report by technology research firm Radicati Group, Inc., the number of worldwide email users reached 2.6 billion in 2015 and is expected grow to over 2.9 billion users by the end of 2019. From […]
Businesses cannot rely solely on cyber insurance policies to protect themselves and their clients from certain cybercrimes. In a recent case, Chubb Insurance refused to cover a cyber security loss of $480,000 despite the fact that Chubb had insured the victimized company for computer funds transfer fraud.
Should the US government require technology companies to provide a “master key” to unlock all encrypted files? What began as a hypothetical question in the US Presidential Primary Election debates has evolved into an interesting standoff between tech titans and the FBI around encrypted files stored on an Apple iPhone (used by one of the […]
Have you, your staff, or a client ever sent an important email that the recipient claimed he or she did not receive? Over the next three weeks, Tech Essentials will explore common misconceptions about email delivery that will prepare you in case delivery of your (or a client’s) time-dependent email is disputed. Let’s get started […]
November 06, 2024
November 01, 2024
October 29, 2024
October 25, 2024
October 14, 2024