15 or so years ago, ‘the cloud’ was considered the next big thing in business and personal technology. No longer did each machine you used need to have files or applications stored on it locally. When you worked on a document in the office, you now didn’t need to email it to yourself so you could work on it from your home PC. If you wanted to do online banking or instant messaging, you no longer had to load the actual applications onto each machine you wanted to use. The possibilities were transformative. Your music could be accessed anywhere from any device. Movies could be rented via download or streaming instead of via using cracked DVDs that skipped, etc.
The German philosopher, Hegel, wrote (and I’m paraphrasing here) that history is merely a never-ending series of reactions to reactions. Once a thing is done, there is an inevitable reaction to it and then a reaction to that and so on.
Earlier this week, a house party in Beverly Hills, California made national headlines, as hundreds of revelers went maskless and practiced virtually zero social distancing. Worse still was that gunfire erupted later on in the party, and three people were shot. Parties like this are hardly limited to California, as it’s clear that people all over the nation (and world) are using rented ‘party houses’ as a substitute for the nightclubs that have been shut down due to the pandemic.
China is becoming the first society to connect all the data from a vast array of digital surveillance technologies, with an aim to seemingly control the population. China’s communist party is developing a “citizen score” to incentivize “good” behavior, harnessing advances in artificial intelligence, data mining, storage, facial recognition and indoor and outdoor video from connected devices and surveillance.
With the recent media focus on cybersecurity, whether it is talk of Russian hackers scheming to influence US presidential elections, or the pervasive pressure to comply with GDPR or HIPAA (healthcare privacy regulations) or other consumer data privacy requirements, “encryption” is one of the solutions that is often introduced.
Many, many software service sales professionals throw around security phrases to make cyber security sound simple. Today, as technologies advance and threats get ever more sophisticated, encrypting email for privacy compliance is not getting simpler. The devil (hacker) is in the details.
As enchanting as the Bermuda sea is, during rough weather, Bermuda’s beguiling reefs have been the source of many lost ships over the past hundreds of years during trans-Atlantic journeys shipping treasures and taxes from the Americas to Europe. However, no one could have anticipated the rough waves that just crashed upon some of the world’s richest and most well-known companies as the true hidden treasure in Bermuda had long been a quietly kept secret by offshore Bermudian lawyers.
Email encryption systems often advertise identical benefits, but there are some critical differences that you should understand before choosing a system. Below we outline three different methods: True Direct Delivery, Secure Store and Forward and Public Key Exchange. The best method for security and ease of use is the “True Direct Delivery” method employed in RMail services, a member benefit of The Florida Bar.
With RMail service, the sender can opt to send encrypted messages by Message-Level Encryption, Transport Layer Encryption, or a combination. As such, there are four scenarios for encrypted transmission. In all cases, the encrypted message is delivered direct to the recipient’s desktop; RMail never requires the recipient to visit a website to collect their email.
RPost’s SecuRmail service employs AES 256-bit encryption to convert select email into a more private encrypted format. The recipient must have an up-to-date PDF reader to view the encrypted message and any attachments received with that message.
To view attached files embedded in the encrypted PDF file, one must use Adobe Reader 7.0 (circa 2004) or equivalent PDF from another manufacturer. The latest free Adobe Reader is located at: http://get.adobe.com/reader/