Does your news feed closely resemble the plot of a Russian spy novel? It certainly might if you’ve been following the recent drama and mudslinging between the Democrats, the Russian government, the FBI, and the CIA, following the public release of private DNC emails. And that’s before the warnings of an “October Surprise” promised by […]
Is Technology Fashionable? What’s Trendy… Can Summer Fashion Meet Technology? In fashion, about this time of summer, all those light breezy summer clothes start to appear on sale. It’s like clockwork. Mid-summer sales.
As consumer awareness of data privacy issues increases, companies that don’t take their clients’ data privacy seriously are getting hit harder and harder. In healthcare, a Florida healthcare provider paid a $5.5 million fine (a HIPAA record) earlier this year for allowing more than 115,000 patient records to be improperly accessed and disclosed. Last year, […]
Service professionals and business managers are continually trying to improve workplace productivity, not just to increase profits but also to reduce tedium in their daily work flows. Web applications for customer relationship management (Salesforce.com), professional networking (LinkedIn), messaging, eSigning, and file sharing (RPost), for example, can be extremely helpful tools for streamlining work flows.
Robert Bond, one of the world’s premier legal experts in data privacy and information security, just hosted an exclusive webinar where he presented a number of practical reasons why every legal professional needs to do more than just use standard Microsoft Outlook or other basic technologies when corresponding with clients, other legal counsel, the courts […]
How to Say ‘Leave Me Alone’ without an ‘Opposite Shock’ A year ago, there was a sudden “shock” to the world that caused mass disruption in people’s normal routines, forcing an uncomfortable behavioral change for most. This pandemic-induced shift to an isolated work-from-home (WFH) routine should become a shibboleth once vaccines flow freely. But perhaps […]
In the recent Tech Essentials article “Changing Trends in Cyber Security,” we highlighted how hackers are becoming more innovative in their ability to use generally available social media (i.e. LinkedIn recruiter tools) and other business applications to target email recipients with imposter email and lure them into wiring money to hackers.
HBO’s Game of Threats How did a hacker get his hands on the latest script of Game of Thrones (GoT), episode 5, season 7? It was an email hack plain and simple. The good news? “We do not believe that our e-mail system as a whole has been compromised,” said HBO chairman and CEO Richard […]
Email encryption systems often advertise identical benefits, but there are some critical differences that you should understand before choosing a system. Below we outline three different methods: True Direct Delivery, Secure Store and Forward and Public Key Exchange. The best method for security and ease of use is the “True Direct Delivery” method employed in […]
We all send emails — some trivial and others that are incredibly important or time sensitive. For the important email messages, how do you know – and prove – that your email was delivered?
December 12, 2025
December 05, 2025
November 21, 2025
November 14, 2025
November 07, 2025
© 1999-2025 RPost. All Rights Reserved.
Terms & Conditions, RMail | Gmail App Compliance.
RPost Patented
(click for patent list).