08 Jan 2016

Email Encryption: Choosing the Right System

Screenshot (192)
Share:

Email encryption systems often advertise identical benefits, but there are some critical differences that you should understand before choosing a system. Below we outline three different methods: True Direct Delivery, Secure Store and Forward and Public Key Exchange. The best method for security and ease of use is the “True Direct Delivery” method employed in RMail services, a member benefit of The Florida Bar. 1. True Direct Delivery – This... Read more...

Screenshot (192)
Share:
05 Jan 2016

The Ultimate Security Dilemma

Screenshot (192)
Share:

In a society that embraces online shopping, GPS location tracking, mobile texting and email anytime and anywhere, it is no wonder that technology’s promise of convenience continues to overrule many peoples’ instincts to protect and secure their private information. The preference for convenience over security is present even at the highest levels of the US Government. With the news earlier this year about former Secretary of State Clinton succumbing... Read more...

Screenshot (192)
Share:
30 Dec 2015

2015: Year in Review

Share:

The RPost team thanks you, our community of users, customers, partners, shareholders, and advocates, for another exciting year at RPost. Your support enables the RPost team to continue innovating for our customers, and to maintain RPost as the global standard for secure and certified electronic communications. We believe the investments we have made over the course of the year will continue to advance the experience and maximize value for our users... Read more...

Share:
18 Dec 2015

Why are many lawyers now encrypting their emails?

Screenshot (192)
Share:

According to a study by Cybersecurity firm Mandient, 80 of the largest 100 law firms in the United States have been hacked over the last several years. For many lawyers, this is old news; it’s assumed that IT staff has already done everything it can to address any possible security vulnerabilities. However, increased hacker sophistication has brought the emergence of new risks. Hackers are now targeting individuals, exploiting potential weaknesses... Read more...

Screenshot (192)
Share:
02 Dec 2015

Follow Us

Author:
social-media-mosaic
Share:

Connect with us on LinkedIn Follow us on Twitter Like us on Facebook Follow us on Google+    More Info

social-media-mosaic
Share: