RSign Makes the Migration Process Effortless with its Managed Migration Service and Ready-at-a-Click Integrations Feeling glum lately? You’re not alone. According to a University of Michigan study, Americans and Europeans are experiencing historically low levels of happiness and well-being. A vast majority of Americans feel like their country is on the wrong track, and Europeans […]
Earlier this week, Microsoft announced its acquisition of social networking site LinkedIn for $26.2 billion. Satya Nadella, CEO of Microsoft, summarized the acquisition as follows: “We are in pursuit of a common mission centered on empowering people and organizations.”
When it comes to getting a new car, one of the first decisions many consider is whether to buy or lease. Of course, there are pros and cons to either approach. Buying a car means you own it (and perhaps get positive feelings about owning it), and you have more freedom over its use; you […]
Ingram Micro Australia has added RPost email security services to its cloud marketplace, considering the heightened interest in email security and compliance that has fueled demand for RPost. Ingram Micro is the world’s largest technology distributor.
No “October Surprises” at Our Optimize! FinTech Conference (Just Great Insights from Amazing Customers) We at Tech Essentials realize this has been a doozy of a week in terms of news—mostly political and mostly bad. For those who needed a respite from Tuesday’s chaotic debate and the torrent of election-focused headlines, we offered a live virtual […]
Email Security Beyond the Soundbite The ubiquity of smart phones and their apps have reduced the attention span for the masses. People now expect their information in big fonts, nice colors, and pretty pictures.
Your Spit Is Your Real Government ID The DHS is using Congress’ “Real ID” Act of 2005 to require all US states to issue new, more robust IDs for air travel originating in the United States.
Not All TLS is Created Equal Many, many software service sales professionals throw around security phrases to make cyber security sound simple. Today, as technologies advance and threats get ever more sophisticated, encrypting email for privacy compliance is not getting simpler. The devil (hacker) is in the details.
Folklore of Opportunistic Privacy There is a wide body of people that believe they are sending information private because they are sending using Microsoft Office 365, Gmail, or using a third-party service that sends all messages using transmission layer security.
End of Summer Phishing, Hooks Office 365 Users The phishermen are getting smarter, using better lures to catch ever smarter phish (in this case, you, as an Office 365, OneDrive, SharePoint, or Dropbox user).
March 24, 2023
March 17, 2023
March 10, 2023
March 03, 2023
February 24, 2023