Last week we highlighted two of the top five e-security human errors that can cause pain for professionals, so we’re here now to finish out the list. As you may recall, there are some mistakes that can be forgiven in the workplace (although microwaving leftover fish at 10 am is fairly borderline). However, there are those […]
In the annals of workplace mistakes, there is a hierarchy. At one level, there is the failure to make a fresh pot of coffee after finishing off the last carafe. Maybe one level up is when you decide that it’s a good idea to microwave (in the office kitchen at 10am) that leftover fish entrée […]
Get Some Rest (for Your Files) for the Rest of Your Summer As we head into one of the summer’s final weekends, I’m doing the usual exercise of wondering where all the time went. This certainly was not a restful summer for the world what with Delta variants, ransomware attacks, record-setting wildfires and now hurricanes […]
RPost’s SecuRmail service employs AES 256-bit encryption to convert select email into a more private encrypted format. The recipient must have an up-to-date PDF reader to view the encrypted message and any attachments received with that message. To view attached files embedded in the encrypted PDF file, one must use Adobe Reader 7.0 (circa 2004) […]
When sending encrypted email using RMail services, the sender can choose one of the following options:
All service providers (such as lawyers, doctors, accountants, financial advisors, etc.) who believe their communications with clients are private — and in some situations, privileged — should take note. Conversely, all clients who believe their communications with trusted service providers are private should also take note.
There is set of RPost services that when combined, provide for an elegant and secure way of transmitting electronic insurance certificates, electronic titles (real estate, land, auto titles), permits, regulator issued licenses, and university transcripts while ensuring:
In Dr. Ball’s blog, he smartly notes: “Application metadata resides within the file and moves with the file, not changing unless the contents of the file are altered. System metadata resides outside the file and can be altered without impacting the contents of the file. Hashing the file hashes its contents, not information about the file. That is, you only hash what’s stored inside the file, not its system metadata.” He also […]
Three Electronic Signature Service Areas – When to Use “Sending for Signature”, “Form sign”, “Sender Signs” The main RSign electronic signature service upgrade runs on RSign’s Registered Email™ technology platform and is unique in that it permits senders to send for signature and have electronic signing capabilities anywhere – from their mobile device, browser-based email […]
RSign achieves top score in breadth and depth of eSignature services, compliance with industry/country regulations and technical standards, and enterprise scalability categories.
October 29, 2024
October 25, 2024
October 14, 2024
October 08, 2024
October 04, 2024