Quantcast
Channel: DataMotion » Best Practices
Browsing all 11 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Best Practices for Implementing Encrypted Email – Part 4 – What’s next?

Once an organization implements encrypted email, they typically want the system to also handle secure file transfers as well.  When choosing an encrypted email solution, make sure that it doesn’t paint...

View Article



Image may be NSFW.
Clik here to view.

Questions to Consider When Choosing a Secure Email Vendor

This article is a really nice description of ways to send emails or files securely and has some really good questions at the end of the article that should be considered when choosing a secure email...

View Article

Image may be NSFW.
Clik here to view.

Security Software vs Security Appliance

One question that comes up a lot of times is why we don't sell an appliance as opposed software the customer needs to install. The simple answer is that while a few customers have expressed interest in...

View Article

Image may be NSFW.
Clik here to view.

Security Should Work the Way You Do

I found an interesting article here about how the movie industry is so worried about their movies being copied that they have locked down their projectors to prevent access to them. The unintended...

View Article

Image may be NSFW.
Clik here to view.

A reason to implement Policy-based Email Security?

A recent survey by an email security vendor shows some scary responses regarding email compliance violations. According to the results, almost three quarters of respondents admit to violating...

View Article


Image may be NSFW.
Clik here to view.

Security Should be Hidden

An interesting survey reported last month shows that SMBs prefer their security tools to be hidden as much as possible from their end users as possible. This should not come as a surprise in my opinion...

View Article

Image may be NSFW.
Clik here to view.

Reasons to encrypt your email

Michael Osterman posted a great summary of reasons to encrypt the content of email here. The thing I find most interesting is the number of different laws he points out showing requirements to protect...

View Article

Image may be NSFW.
Clik here to view.

Does your filtering look for the right things?

I ran across this great cartoon about filtering. Setting email encryption content filters is always a difficult task; there are so many parameters, context and cases that it can seem impossible to...

View Article


Image may be NSFW.
Clik here to view.

3 Best Practices When Using Email On Mobile Devices

Here are a few quick tips to help you protect your personal information while using email on your mobile device. 1. Be careful what you click: Just as you have learned to be cautious when surfing the...

View Article


Image may be NSFW.
Clik here to view.

Best Practices for Implementing Email Encryption

The best way to implement an encryption tools is to start with a good company policy and a good software solution. Your staff should thoroughly understand what your compliance policy requires of them...

View Article

Image may be NSFW.
Clik here to view.

Are you ready for ALTA Best Practice #3?

The October deadline is drawing near. ALTA’s Best Practices for real estate settlement agents reflect new lender requirements. ALTA Best Practice guideline #3 specifies the use of “secure delivery...

View Article
Browsing all 11 articles
Browse latest View live




Latest Images