Most recent

The GDPR Compliance Deadline is Nearly Upon Us—What Does this Mean for Email?

If you aren’t already in the know, GDPR stands for General Data Protection Regulation . The EU has had a mixed bag in terms of its efforts to regulate Internet privacy—for example, there’s the time they tried to ban people under 16 years old from using social media—but fortunately, the GDPR doesn’t go quite as far as that. Here are its main tenants:
Read More
19 Jun 2017

How to Prevent Your Emails from Ending up on WikiLeaks

The Democratic National Committee’s convention in Philadelphia was expected to be a predictable gathering focused on discrediting the opposition.  Instead, the Democrats found themselves embroiled in a fast-paced spy thriller full of unexpected twists and turns.  

Read More
17 Oct 2016

Securely Sharing Data with Business Partners and Agencies

Do you store your financial records at an accounting firm? Do you store blueprints with a patent lawyer? Maybe you're a startup being funded by a venture capitalist—or your company is involved with mergers and acquisitions. The list goes on and on, but the point we're making is that there are a lot of reasons why your company might be sharing data with other businesses—but are you securely sharing those extremely sensitive information?

Read More
13 Sep 2016

How to Secure Communication with Your Customers & Prevent Data Leakage

When it comes to data leakage, it doesn't really make a difference whether your business is B2B or B2C—customer communications is still risky business. Selling business-to-business often involves exposing sensitive parts of the enterprise—giving your business customers access to online payment portals, shared drives, and sensitive information like bank account numbers.

Read More
25 Aug 2016

Methods for Securing Email Exchange

title="" width="180" height="110"> It may surprise you to learn that a great deal of leaked data has never been "hacked" from anywhere. Much of the time, your employees might "hack" themselves—they might send emails to the wrong recipient by mistake.
Read More
20 Jun 2016

An A to Z Guide to Secure File Transfer

If you handle credit cards, you may already be in breach of PCI. If you handle medical records, you may already be in breach of HIPAA. The reason? Uncontrolled data exchange.

Read More
09 Jun 2016

Cloud Data Protection Must Extend to Secure Email Exchange

In our previous blog we spoke about how to extend cloud data protection to storage that was hosted off-premise. Storage is one of the primary applications for cloud storage. It’s easy for individuals to sign up for without detection or permission from system administrators, and thus it’s easy for end users to abuse cloud storage in turn, either unknowingly or on purpose.

Read More
30 May 2016

Are You Sending Secure Email Messages?

Have you ever been asked to exchange a private document with your mortgage banker, realtor, accountant or doctor? Most are going to answer this question with a resounding, yes. Have you ever stopped to think if the content of that email message or its attachments were secure or not?

Read More
29 Mar 2016

How to Prevent Data Leakage with Secure Email

Imagine receiving an urgent phone call from one of your bank employees or contractors, apologizing for the fact that they just accidentally sent an email with a customer’s confidential account information to a random email address. Even worse, what if the phone call came from the random person who received and opened the email? Either way, both scenarios have very bad implications and pose a massive breach of privacy.

Read More
05 Aug 2014