Best Practices for Implementing Encrypted Email – Part 4 – What’s next?
Once an organization implements encrypted email, they typically want the system to also handle secure file transfers as well. When choosing an encrypted email solution, make sure that it doesn’t paint...
View ArticleQuestions to Consider When Choosing a Secure Email Vendor
This article is a really nice description of ways to send emails or files securely and has some really good questions at the end of the article that should be considered when choosing a secure email...
View ArticleSecurity Software vs Security Appliance
One question that comes up a lot of times is why we don't sell an appliance as opposed software the customer needs to install. The simple answer is that while a few customers have expressed interest in...
View ArticleSecurity Should Work the Way You Do
I found an interesting article here about how the movie industry is so worried about their movies being copied that they have locked down their projectors to prevent access to them. The unintended...
View ArticleA reason to implement Policy-based Email Security?
A recent survey by an email security vendor shows some scary responses regarding email compliance violations. According to the results, almost three quarters of respondents admit to violating...
View ArticleSecurity Should be Hidden
An interesting survey reported last month shows that SMBs prefer their security tools to be hidden as much as possible from their end users as possible. This should not come as a surprise in my opinion...
View ArticleReasons to encrypt your email
Michael Osterman posted a great summary of reasons to encrypt the content of email here. The thing I find most interesting is the number of different laws he points out showing requirements to protect...
View ArticleDoes your filtering look for the right things?
I ran across this great cartoon about filtering. Setting email encryption content filters is always a difficult task; there are so many parameters, context and cases that it can seem impossible to...
View Article3 Best Practices When Using Email On Mobile Devices
Here are a few quick tips to help you protect your personal information while using email on your mobile device. 1. Be careful what you click: Just as you have learned to be cautious when surfing the...
View ArticleBest Practices for Implementing Email Encryption
The best way to implement an encryption tools is to start with a good company policy and a good software solution. Your staff should thoroughly understand what your compliance policy requires of them...
View ArticleAre you ready for ALTA Best Practice #3?
The October deadline is drawing near. ALTA’s Best Practices for real estate settlement agents reflect new lender requirements. ALTA Best Practice guideline #3 specifies the use of “secure delivery...
View Article
More Pages to Explore .....