Hey You, Get Off (or On) My Cloud 15 or so years ago, ‘the cloud’ was considered the next big thing in business and personal technology. No longer did each machine you used Needed? have files or applications stored on it locally. When you worked on a document in the office, you now didn’t need to email it to yourself so you could work on it from your home PC. If you wanted to do online banking or instant messaging, you no longer had to load the actual applications onto each machi [...]
Let’s Ring in a New Era of Privacy? The German philosopher, Hegel, wrote (and I’m paraphrasing here) that history is merely a never-ending series of reactions to reactions. Once a thing is done, there is an inevitable reaction to it and then a reaction to that and so on. Technology works the same way in that innovations are often countered and re-countered by subsequent innovations. The technology that allowed for connectivity via social media spawned an outcry about [...]
RMail: The N95 Mask of Email Encryption Software Earlier this week, a house party in Beverly Hills, California made national headlines, as hundreds of revelers went maskless and practiced virtually zero social distancing. Worse still was that gunfire erupted later on in the party, and three people were shot. Parties like this are hardly limited to California, as it’s clear that people all over the nation (and world) are using rented ‘party houses’ as a substitute for the nightclu [...]
The Chinese Don’t Need Impeachment Inquiries. They Have A Citizen Score China is becoming the first society to connect all the data from a vast array of digital surveillance technologies, with an aim to seemingly control the population. China’s communist party is developing a “citizen score” to incentivize “good” behavior, harnessing advances in artificial intelligence, data mining, storage, facial recognition and indoor and outdoor video from connected devices and surveill [...]
Pig Latin, Russian Spies and Email Encryption With the recent media focus on cybersecurity, whether it is talk of Russian hackers scheming to influence US presidential elections, or the pervasive pressure to comply with GDPR or HIPAA (healthcare privacy regulations) or other consumer data privacy requirements, “encryption” is one of the solutions that is often introduced. When sending email, email encryption can indeed protect your strategic dialog from potential [...]
Not All TLS is Created Equal Many, many software service sales professionals throw around security phrases to make cyber security sound simple. Today, as technologies advance and threats get ever more sophisticated, encrypting email for privacy compliance is not getting simpler. The devil (hacker) is in the details. Here, we will try to (in a simple manner) decipher a commonly referred to [...]
Foreign Journalists Discover Treasure in Bermuda As enchanting as the Bermuda sea is, during rough weather, Bermuda’s beguiling reefs have been the source of many lost ships over the past hundreds of years during trans-Atlantic journeys shipping treasures and taxes from the Americas to Europe. However, no one could have anticipated the rough waves that just crashed upon some of the world’s richest and most well-known companies as the true hidden treasure in Bermuda had long been a [...]
Email encryption systems often advertise identical benefits, but there are some critical differences that you should understand before choosing a system. Below we outline three different methods: True Direct Delivery, Secure Store and Forward and Public Key Exchange. The best method for security and ease of use is the “True Direct Delivery” method employed in RMail services, a member benefit of The Florida Bar. 1. True Direct Delivery – This system wraps [...]
With RMail service, the sender can opt to send encrypted messages by Message-Level Encryption, Transport Layer Encryption, or a combination. As such, there are four scenarios for encrypted transmission. In all cases, the encrypted message is delivered direct to the recipient’s desktop; RMail never requires the recipient to visit a website to collect their email. Encrypted Data Flow Path A [...]
RPost’s SecuRmail service employs AES 256-bit encryption to convert select email into a more private encrypted format. The recipient must have an up-to-date PDF reader to view the encrypted message and any attachments received with that message. To view attached files embedded in the encrypted PDF file, one must use Adobe Reader 7.0 (circa 2004) or equivalent PDF from another manufacturer. The latest free Ad [...]
January 27, 2023
January 20, 2023
January 13, 2023
January 06, 2023
December 30, 2022