Over the past year’s technology improved and helped us to make our daily life simpler. On the other hand, more laws have been introduced to protect data privacy. Therefore, data security is key for may companies. But how can you make security simpler? The answer is security automation.
When talking about phishing & whaling, many people think of fishing, sea, wind and adventure. Hardly anyone thinks in the other direction: fishing and catching. In the IT world, phishing & whaling have more to do with the last-named. In this article, we explain the difference between phishing and whaling […]
A hacker attack shuts down your entire IT infrastructure – a nightmare for every company. But how can you prevent such attacks? We have compiled the most important rules for IT security at the workplace for you.
You receive an e-mail from your alleged boss asking you to transfer a large sum of money to a specific account. The transaction should be carried out quickly and remain secret. You transfer the money and it is in the hands of criminals. That’s CEO fraud, triggered by human failure […]
Many, many software service sales professionals throw around security phrases to make cyber security sound simple. Today, as technologies advance and threats get ever more sophisticated, encrypting email for privacy compliance is not getting simpler.
Electronic Mail, invented in the last century, has still its place in today’s business and private world. But one thing is for sure – E-Mail urgently requires an update in terms of functionality, compliance and security.
The aim of this third and final article is to explain why the activation of TLS (Transport Layer Security) on in-house e-mail systems does not definitively resolve the issue of e-mail encryption. In addition, we describe a possible solution for the majority of companies.
In the first part of this series of articles, we dealt with the issues surrounding the procurement and targeted use of encryption solutions, particularly in the field of e-mail correspondence. The majority of companies would probably answer the questions raised here similarly.
As is generally the case when it comes to the topic of IT security, the perception of e-mail encryption is usually the same; the higher the security level, the worse the user experience becomes. The acquired products are either too restrictive or broad in scope and often approach the problem […]