Blog

Quiz: How Do You Know Your Email Was Delivered?

February 29, 2016 / in Blog / by Zafar Khan, RPost CEO

We all send emails — some trivial and others that are incredibly important or time sensitive. For the important email messages, how do you know – and prove – that your email was delivered?

67% of RPost User Survey Respondents Concerned About Prospect of Unfettered Government Access to Encryption

February 23, 2016 / in Blog / by Zafar Khan, RPost CEO

Should the US government require technology companies to provide a “master key” to unlock all encrypted files? What began as a hypothetical question in the US Presidential Primary Election debates has evolved into an interesting standoff between tech titans and the FBI around encrypted files stored on an Apple iPhone (used by one of the […]

Fake CEO Email Lures $480k Transfer, Cyber Insurance Policy Denies Coverage of Loss

February 18, 2016 / in Blog / by Zafar Khan, RPost CEO

Businesses cannot rely solely on cyber insurance policies to protect themselves and their clients from certain cybercrimes. In a recent case, Chubb Insurance refused to cover a cyber security loss of $480,000 despite the fact that Chubb had insured the victimized company for computer funds transfer fraud.

Supercharge Your Customers’ Email with RMail®

January 25, 2016 / in Blog / by Zafar Khan, RPost CEO

From small startups to global enterprises, email is the single most critical application used by businesses and their employees today. According to a report by technology research firm Radicati Group, Inc., the number of worldwide email users reached 2.6 billion in 2015 and is expected grow to over 2.9 billion users by the end of 2019. From […]

Email Encryption: Choosing the Right System

January 08, 2016 / in Blog / by Zafar Khan, RPost CEO

Email encryption systems often advertise identical benefits, but there are some critical differences that you should understand before choosing a system. Below we outline three different methods: True Direct Delivery, Secure Store and Forward and Public Key Exchange. The best method for security and ease of use is the “True Direct Delivery” method employed in […]