Encryption Security

Millions Give Up Personal Privacy and Even Safety To “Catch Them All”

July 14, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

If you see grown men and women staring at their phones as they walk into police stations, churches or the backyards of strangers, you could be witness to the latest video gaming phenomenon to take the world by storm. Launched in July of 2016 for Android and iOS, Nintendo’s Pokémon Go free mobile game is already the #1 downloaded and top-grossing app in every country it is available. Pokémon Go uses your camera and your GPS location to “pla [...]

Will Biometric Data Replace Passwords?

July 07, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

Many companies are continually struggling to protect customer data from hackers, thieves and other cybersecurity threats. Some firms have begun using biometric data in place of passwords. For example, many banks now allow customers to use fingerprint or iris identification to access bank accounts from mobile devices. This includes Bank of America, JP Morgan Chase and Wells Fargo. Google and other technology firms are working to combine biometric information to further strengthen security using [...]

How to Send Large Files by Email

June 30, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

You may have noticed that when you send a large file attachment by email, it sometimes gets kicked back to you undelivered with an error message that says something like: “The attachment size exceeds the allowable limit.” But what are these limits? And how can you securely send a large file attachment when it’s too large to send by standard email? Most email providers enforce file size limitations on email attachments. For example, both Gmail and Yahoo limit file attachme [...]

Online Ads Provide Hacker Entry Point

June 23, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

In the recent Tech Essentials article “Changing Trends in Cyber Security,” we highlighted how hackers are becoming more innovative in their ability to use generally available social media (i.e. LinkedIn recruiter tools) and other business applications to target email recipients with imposter email and lure them into wiring money to hackers. This upfront investment (in social media marketing tools, for example) permits hackers to tailor their message such that it appe [...]

RMail Equips RIAs with Tools to Manage Email Security and Compliance

June 13, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

RPost has launched an educational campaign to ensure that registered investment advisors (RIA’s) can securely communicate with clients and comply with rules enforced by auditors and regulatory organizations. Tech Essentials for Investment Managers is a weekly e-brief series that includes news articles, webinars and videos discussing the key cybersecurity and compliance issues, news, and solutions RIAs should be aware of. As part of this campaign, RIAs will also l [...]

Hashed but Not Salted

May 20, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

You may remember the 2012 LinkedIn data breach, in which 6.5 million LinkedIn user accounts were believed to have been compromised. According to BBC and LinkedIn itself, the number of affected LinkedIn users from that 2012 data breach could actually be upwards of 100 million, or the majority of the 165 million users LinkedIn had in 2012. The shocking enormity of this data breach is attracting many security analysts to scrutinize the breach itself. One secur [...]

Understanding HIPAA: Enforcement, Encryption, and Documentation

May 16, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

Email encryption is one of the strongest defenses that an organization can implement against data breaches brought on by the improper disclosure or distribution of medical records or protected health information (PHI). But without written policies and procedures governing the use of encryption services, these efforts mean next to nothing in the eyes of HIPAA auditors who have been redoubling their efforts to investigate non-compliance across the health care industry. For exampl [...]

The Biggest Threat to Your Online Security Could Be Your Password

May 11, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

Email security has been a hot topic as of late, with last week’s news of a supposed breach of 272 million email usernames and passwords and recent statements made by a hacker who claims to have accessed Hillary Clinton’s private email server two years before the private server’s existence was first reported by the New York Times. In the latter story, the hacker known as “Guccifer” claims he correctly guessed Clinton confidant Sidney Blumenthal’s AOL password and used the hacked e [...]

Changing Trends in Cyber Security

May 05, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

In the past, for individuals and small businesses, cyber security was important to mitigate the inconvenience of spam, viruses that required restoring back-ups of corrupt files, and letters to credit bureaus to clear up identity theft issues. While painful, the cost of these was generally in the hundreds of dollars and perhaps a few hours of inconvenience. Today, we see a convergence of trends that is changing the dynamics of cyber security for individuals and small business [...]

Understanding Common Misconceptions About Email Delivery (Part 3)

March 24, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

In the final part of our three part series on common misconceptions about email delivery, we’ll discuss a type of system that many attorneys use and believe can prove fact of e-delivery. Some attorneys send (or advise clients to send) disclosure documents using a link-retrieval system. The recipient receives a link to download the document. A record of the delivery of the disclosure document generally would protect the sender in certain future disputes about what risks or tra [...]