01 May 2017

EU’s GDPR: Bigger than Macron or Le Pen


The biggest unifying force in Europe may be cybersecurity regulation. Despite Brexit and the wavering EU support in France, all 28 EU member states are implementing the General Data Protection Regulation (GDPR) which goes into effect in May, 2018.  GDPR will standardize cybersecurity across all 28 member states, including the UK, Brexit or not. GDPR aims to protect the rights and data of any EU citizen or resident by requiring those companies who... Read more...

27 Apr 2017

RMail Empowers Real Estate Professionals to Speed Closing, Meet Compliance Requirements, and Prevent Cyberfraud

Author: Tags: ,

Los Angeles, CA – April 27, 2017 – RPost today announced that its RMail® service is now a core tool in the daily work flows of every segment of the real estate industry. With RMail, businesses gain access to easy-to-use email tracking, certified e-delivery proof, email encryption, e-signatures, secure large file transfers, and “anti-whaling” imposter email protection. RMail’s seamless integrations into Microsoft Outlook and Gmail – and... Read more...

27 Apr 2017

RPost’s RMail Gains Momentum in Legal Sector as Cyber Threat Grows

Los Angeles, CA – April 27, 2017 – RPost is gaining momentum in the legal services sector by meeting the needs of attorneys and other legal professionals who are eager to protect client communications. The threat of cyberattacks, cyberfraud, and identity theft have never been higher. Lawyers are hearing more client requests for encrypted email communications.  In some cases, clients are demanding it. Integrated into Microsoft Outlook, Gmail,... Read more...

27 Apr 2017

RPost Predicts European Regulators have Forever Transformed the Market for Email Encryption

Author: Tags: ,

London – April 27, 2017 – RPost, a leader in the email encryption market, predicts that The European General Data Protection Regulation (GDPR) will forever transform the email encryption market in Europe, in that businesses will be compelled not only to transmit information securely but also to retain auditable proof of compliant, secure email delivery. For many businesses, the latter driver will require them to change email encryption services... Read more...

20 Apr 2017

United Airlines and David Beckham — When Emails Leak

What do United Airlines and footballer David Beckham have in common? Disastrous leaked emails. In these recent cases, the leaked emails appear to be legitimate, though Beckham claims some of the leaked emails were “doctored.” But how do we know that leaked email messages discussed in news stories and tabloid columns are actually authentic?   United Airlines’ PR Nightmare   United Airlines’ CEO Oscar Munoz appears to have dug himself... Read more...

13 Apr 2017

Data Privacy Compliance Audits Target Small Businesses


As consumer awareness of data privacy issues increases, companies that don’t take their clients’ data privacy seriously are getting hit harder and harder. In healthcare, a Florida healthcare provider paid a $5.5 million fine (a HIPAA record) earlier this year for allowing more than 115,000 patient records to be improperly accessed and disclosed. Last year, Ashley Madison paid almost $1.6 million to settle charges related to Federal Trade Commission... Read more...

06 Apr 2017

AT&T and Comcast hit the Motherlode with Internet Privacy Repeal

This week, the President approved a measure that removes internet privacy restrictions for Internet Service Providers (ISPs) who connect millions of consumers and businesses to the Internet through wireline and wireless connections. Privacy advocates and late-night talk show hosts have voiced their outrage over this “internet privacy repeal”. But what is actually at stake? What do ISPs know about their users? ISPs like AT&T, Comcast and Verizon,... Read more...

11 May 2016

The Biggest Threat to Your Online Security Could be Your Password

Email security has been a hot topic as of late, with last week’s news of a supposed breach of 272 million email usernames and passwords and recent statements made by a hacker who claims to have accessed Hillary Clinton’s private email server two years before the private server’s existence was first reported by the New York Times. In the latter story, the hacker known as “Guccifer” claims he correctly guessed Clinton confidant Sidney Blumenthal’s... Read more...

14 Apr 2016

Business Email Compromise (BEC) – Industry Examples

Imposter emails targeting businesses today are far more sophisticated than traditional phishing emails or the “Nigerian prince” emails of yesteryear. These new Business Email Compromise (BEC) attacks use imposter emails that reflect a deep understanding of people’s roles and messaging patterns within a target organization. Here’s how BEC attacks often play out for several reference industries: Law Firms and their Clients An... Read more...

02 Dec 2015

Follow Us


Connect with us on LinkedIn Follow us on Twitter Like us on Facebook Subscribe to RPost News, Tech Essentials and Insights Newsletter  More Info