Should the US government require technology companies to provide a “master key” to unlock all encrypted files? What began as a hypothetical question in the US Presidential Primary Election debates has evolved into an interesting standoff between tech titans and the FBI around encrypted files stored on an Apple iPhone (used by one of the […]
Businesses cannot rely solely on cyber insurance policies to protect themselves and their clients from certain cybercrimes. In a recent case, Chubb Insurance refused to cover a cyber security loss of $480,000 despite the fact that Chubb had insured the victimized company for computer funds transfer fraud.
From small startups to global enterprises, email is the single most critical application used by businesses and their employees today. According to a report by technology research firm Radicati Group, Inc., the number of worldwide email users reached 2.6 billion in 2015 and is expected grow to over 2.9 billion users by the end of 2019. From […]
Email encryption systems often advertise identical benefits, but there are some critical differences that you should understand before choosing a system. Below we outline three different methods: True Direct Delivery, Secure Store and Forward and Public Key Exchange. The best method for security and ease of use is the “True Direct Delivery” method employed in […]
In a society that embraces online shopping, GPS location tracking, mobile texting and email anytime and anywhere, it is no wonder that technology’s promise of convenience continues to overrule many peoples’ instincts to protect and secure their private information.
April 26, 2024
April 19, 2024
April 12, 2024
April 05, 2024
March 29, 2024