Electronic Mail, invented in the last century, has still its place in today’s business and private world. But one thing is for sure – E-Mail urgently requires an update in terms of functionality, compliance and security.
A variety of “secure” messaging systems require the sender and recipient to share keys, to login to get access to information in an online account, or to sign up to the same service that the sender uses. Consider two levels of email encryption:
A group of German and Belgian security scientists discovered serious vulnerabilities in the widely used email encryption standards OpenPGP and S/MIME and informed the German Federal Office for Information Security (BSI) as well as developers.
According to one relieved RMail customer in the United States, “It’s worth at least million dollars”! While it’s very common to hear from attorneys and law firms who use RMail for their high-profile cases in district and circuit courts, here we share a story from one RMail user, where the […]
The rapid development and increasing interconnectedness of internal and external business processes and the challenges this poses places new demands on companies. In addition to the opportunities it provides to establish new digital business segments, the digitisation of formerly paper-based internal business processes is becoming increasingly vital.
As many know, email is not naturally well suited for sending large file attachments. Most email providers enforce file size limitations on attachments. One can never be sure if the recipient’s system will accept very large attachment transmissions.
The General Data Protection Regulation (GDPR), the most important change in data privacy in 20 years, will take effect on May 25, 2018. The impact for companies is serious: Unlike previous privacy legislation in Europe or elsewhere, the GDPR authorizes the government to impose severe fines up to 20 million […]
Part 3 of our series: “Done any tricks today?“ addresses solutions for ensuring verifiable and secure e-mail correspondence. In addition, we should not forget the EU General Data Protection Regulation. In particular, the reversal of the burden of proof in case of data protection violations (article 5, paragraph 2) should […]
The aim of this third and final article is to explain why the activation of TLS (Transport Layer Security) on in-house e-mail systems does not definitively resolve the issue of e-mail encryption. In addition, we describe a possible solution for the majority of companies.
In the first part of this series of articles, we dealt with the issues surrounding the procurement and targeted use of encryption solutions, particularly in the field of e-mail correspondence. The majority of companies would probably answer the questions raised here similarly.