If you see grown men and women staring at their phones as they walk into police stations, churches or the backyards of strangers, you could be witness to the latest video gaming phenomenon to take the world by storm.
Many companies are continually struggling to protect customer data from hackers, thieves and other cybersecurity threats. Some firms have begun using biometric data in place of passwords. For example, many banks now allow customers to use fingerprint or iris identification to access bank accounts from mobile devices. This includes Bank of America, JP Morgan Chase and Wells Fargo. Google and other technology firms are working to combine biometric information to further strengthen security using information such as eye scans, fingerprints, face shape, voice recognition and even body movement. The prevailing idea is that although a single biometric indicator would not be secure enough by itself, a combination of many such indicators could “result in something more than 10 times as secure as a fingerprint.” And an ancillary promise is that biometric-based security would afford the ultimate in convenience to end users, who would no longer face the challenge of remembering convoluted passwords of their own creation.
RPost has launched an educational campaign to ensure that registered investment advisors (RIA’s) can securely communicate with clients and comply with rules enforced by auditors and regulatory organizations.
Email encryption is one of the strongest defenses that an organization can implement against data breaches brought on by the improper disclosure or distribution of medical records or protected health information (PHI). But without written policies and procedures governing the use of encryption services, these efforts mean next to nothing in the eyes of HIPAA auditors who have been redoubling their efforts to investigate non-compliance across the health care industry.
In the past, for individuals and small businesses, cyber security was important to mitigate the inconvenience of spam, viruses that required restoring back-ups of corrupt files, and letters to credit bureaus to clear up identity theft issues.
Should the US government require technology companies to provide a “master key” to unlock all encrypted files? What began as a hypothetical question in the US Presidential Primary Election debates has evolved into an interesting standoff between tech titans and the FBI around encrypted files stored on an Apple iPhone (used by one of the San Bernardino shooters).
By Henry Truc. Originally published on Equities.com.
It seems nearly impossible to quantify how big the email industry has gotten. As the most prevalent form of digital communication today, especially with regards to business and professional matters in our day-to-day lives, it’s really easy to take email for granted. According to The Radicati Group, it’s estimated that over 200 billion emails are exchanged per day—that’s right, per day—through 4 billion-plus accounts globally. Business emails account for well over half those figures, and that’s only trending higher.
From small startups to global enterprises, email is the single most critical application used by businesses and their employees today. According to a report by technology research firm Radicati Group, Inc., the number of worldwide email users reached 2.6 billion in 2015 and is expected grow to over 2.9 billion users by the end of 2019. From simple text communication and large file transmissions, to validating sensitive documents and completing revenue-generating transactions, it’s clear companies rely heavily on email for an array of business-critical activities. Not surprisingly, as email continues to expand as a means of business communication, so do the risks of threats to email security. With regulatory compliance pressures top of mind, businesses must now adhere to digital privacy laws and government mandates associated with these digital communications.
Email encryption systems often advertise identical benefits, but there are some critical differences that you should understand before choosing a system. Below we outline three different methods: True Direct Delivery, Secure Store and Forward and Public Key Exchange. The best method for security and ease of use is the “True Direct Delivery” method employed in RMail services, a member benefit of The Florida Bar.
The constant challenge for IT professionals and security experts is to balance security and usability. If the most secure system is too complicated or cumbersome to use, people will circumvent it. Once the official or corporate system is circumvented, security has devolved from professional (IT executive) to amateur (end user).