Blog & News

The FBI Wants You to Stop Inadvertently Giving Criminals Money

The FBI Elegantly Asks You to Stop Sending Money to Internet Criminals.

We are now in the 16th annual National Cybersecurity Awareness Month, a collaborative effort by the US Government and participating industry groups to educate all computer users enough so that they stop clicking those pesky links that download viruses and stop sending personal, health, employment, and tax information unencrypted.

What else do they suggest you stop doing? The FBI, DHS, industry groups, and Tech Essentials suggest you:

1. Stop paying fake invoices, mainly recommending that you and your team not use unencrypted and unauthenticated (a/k/a standard email) to approve invoices for payment.

Hint: Try setting up a business policy where you and your team know that all invoice approvals are only communicated by RMail encrypted email from certain sending addresses, in particular first-time vendor invoices and payment change requests.

2. Stop sending wire transfers with your money or client money to bad people, mainly recommending you and your team are not duped by very clever people posing as you or colleagues that lure the unsuspecting into sending money to the wrong people.

Hint: Try installing RMail Anti-Whaling email imposter detection not only on your computer, but importantly on the computers of your HR and finance staff.

3. Don’t automatically assume an email “From” name is an email from that named person, mainly recommending you look at the whole “from” email address and “from domain” to verify it is authentic and looking at the raw URL source of a link before clicking.

Hint: Try reminding your staff to most importantly examine the entire email address (not just the name, but the entire domain) to look for mismatches in names and domains, especially when using mobile devices. Hover a mouse over links before clicking to view the whole URL. And, try installing RMail Anti-Whaling email imposter detection.

4. Stop leaving breadcrumbs of your (or your HR, company, or client) private information all over the Internet, ready to be collected by bad people, mainly recommending you send important information RMail encrypted.

Hint: Try reminding your staff to encrypt all email that contains an attachment; assume any email important enough to have an attachment is an email that may contain sensitive information. Or even better, try automating this with a rule using RMail Gateway.

5. Avoid giving your important account log-in details to criminals, mainly recommending you not respond to unsolicited text message or email that asks you to update, check, or verify your account information.

Hint: While this seems obvious, consider if these unsolicited text message or email were not so successful as the entry point for Internet criminals, they would not bother sending them. They work; they trick many.

There are other recommendations that these government agencies and organizations have developed as part of National Cybersecurity Awareness Month to raise awareness about cybersecurity and stress the collective effort needed to stop cyber intrusions and online thefts and scams.

Try starting with the first five above. Share these with your staff, clients, and family and friends.

 

Try RMail free – click here.

——————————

To learn more about RPost products, visit www.rmail.com or www.rsign.com 

Beware of Hollywood Sim Swappers, the New Posers

Hollywood Sim Swappers are the New Posers.

Your mobile phone is often the second key to your life. When you forget your password at key accounts like your email or bank, you may be prompted to enter a code that appears by text message to your phone. Perfect security, multi-factor authentication.

But what if you are targeted and someone can access your phone?

As we have seen, today’s internet criminals are savvy enough to make some investments in research for the opportunity of a million dollar prize, exploiting your trusted relationship with family and business associates (via Whaling email imposter tactics), or your trust in your outsourced providers and consultants (as suspected in Panama Papers and Paradise Papers information leaks).

But what about the trust put in your mobile provider? These networks just work. People don’t even think much about them as long as they see four bars. Point to a telephone pole and ask a teen what it is. I did, their first response was “a tall wooden pole”. The concept that there are people behind the operations of these amorphous big brands is foreign to most.

It may matter when you are dealing in your most personal information.

An emerging threat — that is successfully siphoning out personal funds from bank accounts and prevalent today (soon to spread) is called Hollywood SIM Swapping. And it is alleged to have been facilitated at times by insiders in AT&T and Verizon.

In this latest scheme, an Internet criminal obtains enough information about you and walks into an AT&T, Verizon, or other carrier store posing as you asks for a new SIM card for a new phone. They provide a new SIM card with your telephone number. This can be done at the national or at the local level, in any AT&T, Verizon or phone company affiliate storefront.

The Internet criminal, armed with some basic information about you can often reset your email and financial account passwords with ease as these systems will send a text message to your phone with a one-time-code to verify your identity. Now, since the criminal has a SIM card with your phone number, that code goes to their phone, not yours. They verify, they look in your email account for your bank and other account information from past emails, and then use the phone verification to access these accounts; ultimately siphoning your money out and transferring to cryptocurrency. Gone.

As Fox news reported, the criminal can change passwords, lock the victim out of their own lives, and even empty out financial accounts, which is exactly what happened to Robert Ross on October 26, 2018. “I took a million dollar loss,” he said. “My heart was pumping a lot, fear, deer in the headlights.” (Read more).

This, and other newfound threats are at times assisted by insiders. In the Hollywood Sim Swap scam, allegedly phone company workers assisted for a fee. In Panama Papers and Paradise Papers leaks, it is suspected that a contractor to the law firms assisted.

What to do? Well, if you ever see your phone indicating no sim card, contact the phone company immediately, and watch your financial accounts (although it may be too late). If you are sending your personal or business financial information by email, certainly send it RMail encrypted so that you are not leaving breadcrumbs all over the Internet luring these Internet criminals to target you. You can do this most easily with RMail email encryption.

 

Try RMail free – click here.

——————————

To learn more about RPost products, visit www.rmail.com or www.rsign.com 

Now ‘Tis the Season for Security Autumnation

Autumn May Bring Digital Serenity with Security Autumnation.

Over the last year, while the user experience for technology has been progressively becoming simpler, the jobs of the business owner, IT director, and privacy and compliance officers have been progressively becoming more complex. Far more complex.

Europe recently introduced the most aggressive data privacy laws ever imagined. Data privacy treaties have been scrapped for new ones, the latest called “Privacy Shield”. California’s most aggressive consumer privacy protection law goes into effect in a few months. And this is on top of all the normal health and personal privacy information laws that have been in place for some time.

We have reached a tipping point. We need all this security stuff to be automated. Please.

RPost declares this autumn, the season for security autumnation (or automation if you are a digital literal). AT&T agrees; they declared the hottest tech trend of 2019 to be cybersecurity automation (see report). And Forrester Research concurs, putting security automation at #3 (see report).

What is security automation? It is simplicity with security.

RPost reports more customers are choosing to encrypt all outbound client-related email; they want simplicity with security. This is not what some call “opportunistic encryption” — totally inadequate considering today’s privacy regulations.

(Opportunistic encryption means, in short, if the sender’s system can encrypt based on the recipient system, it does. If it cannot, it does not. This generally leaves 10 to 25% of messages sent with the intention of encryption, to be sent without any or adequate encryption for privacy requirements, according to Google and Microsoft research of TLS 1.0 and TLS 1.2 reach).

But, when sending all email encrypted — or even more email encrypted than you did in the past, those cumbersome systems that require the recipient to click links and set up a user account simply for the privilege of reading your email, simply don’t work.

What is happening is there is a new shift to automate security based on who is sending what content to whom, and further, considering when it should be as simple as possible for the recipient yet secure enough for compliance, or when it should be top secret secured (for you wire transfer details, sensitive health information, business payroll and financial reports). And, making these distinctions and decisions automatically.

Modern systems, like RMail Gateway (click to request more information), do just this. RMail Gateway lets you set your systems so that, for example, if any sender in your company sends a message to a certain client, the message is encrypted. If they are sending an important notice like a disclosure, it may not need encryption but needs tracking and certified proof of e-delivery; and therefore, is sent as a Registered Email™ message. If the message contains information that is very sensitive like wire transfer instructions or a financial or payroll report, it is transmitted in a manner such that it remains encrypted even in the recipient inbox. If the subject line says “please sign” it is sent automatically converted so that the recipient can electronically signoff. RMail Gateway automates all these decisions. This is true security automation.

This autumn, we believe more people will enjoy the serenity of the leaves changing and the first snow falling, with peace of mind, knowing they have automated security (at least those that have opted for RMail Gateway). For those in Southern California or Florida, you can still enjoy peace of mind this autumn even though there is no snow expected and your palm tree leaves will not change (if you choose RMail Gateway).

‘Tis the season for autumnation. Enjoy your peace of mind with RMail security automation.

 

Try RMail free – click here.

——————————

To learn more about RPost products, visit www.rmail.com or www.rsign.com 

Big Brother has Built Geofences to Control Behavior, Tesla Drivers Beware

City Hall Can Now Control Your Location.

The Snowden revelations opened the general public’s eyes to the (alleged) eavesdropping by the NSA and other government organizations. The Hong Kong protests showed the world how today’s mass video surveillance uses facial recognition to identify the location of people (for example, who is protesting what and when). City traffic light cameras send you nice pictures of yourself in the intersection just as the yellow light turns red, along with a hefty fine.

These are examples of Big Brother using technology to gather information and perhaps control behavior with monetary disincentive.

Big Brother’s foray into Geofencing is different. This marks the first time governments are able to directly control citizen behavior. Geofencing puts city hall staffers in control of your behavior with a few keystrokes from their computers.

Today, if you are riding a Bird, Lime, Uber or other electric share scooter, Big Brother can choose where it wants to limit your speed or instantly shut the engine off. Geofences can be so accurate it can restrict your mobility or speed based on precisely where you are. Big Brother regulates these scooters and requires use of the geofencing technology and the rules it applies – with decisions made city to city.

Is this new or nothing new?

The technology is not new. If you are a golfer, you may have experienced private sector geofencing if driving your golf cart too close to the green. The cart slows, and then may shut off so you have to push it back into permitted areas to restart your riding.

What is new is this is the first time this technology is being used on a mass scale by governments imposing behavior restrictions on the general public.

So, what might be next?

Beverly Hills became the first city in California to repel anyone on a scooter (read Los Angeles County city-by-city debate).

Big Brother could easily use geofencing technology to restrict the speed of Tesla drivers (or any driver in a modern car with built-in GPS always-on technology) based on where they drive, who they are, or when they drive. Small towns could repel drivers trying to Waze shortcut through their areas.  They could restrict more than speed; they could restrict whether you are permitted to visit certain locations, beaches, shopping plazas, residential neighborhoods, based on your health profile, financial tax profile, age, driving record, citizenship, education, profession, political party, or any data profile purchased from Google or Facebook.

Seem far fetched? Not really. The technology is already in place and being used; with decisions on who to restrict from what done at a very local level; staffers in city hall. And, potentially with restrictions based on information you shared with Google by sending your tax or financial information to or from Gmail or Microsoft email accounts unencrypted.

We are in a new era where your behavior can be controlled by your information profile. Geofencing is just the start.

Think twice about sending your private information unencrypted – that information may soon be used soon to do more than price discriminate.

RMail email encryption is free to use in a base plan, so there are no barriers to getting started and installing RMail into your, and your staff’s, Microsoft Outlook or Gmail user interface.

 

Try RMail free – click here.

——————————

To learn more about RPost products, visit www.rmail.com or www.rsign.com 

End of Summer Phishing, Hooks Office 365 Users.

The phishermen are getting smarter, using better lures to catch ever smarter phish (in this case, you, as an Office 365, OneDrive, SharePoint, or Dropbox user).

Armed with better grammar and embedding your company name and email address within the email and images, and further, using authentic OneDrive or Dropbox URLs to link to, these latest scammers are luring users into providing their username and passwords to the scammers.

And, considering many users re-use usernames and passwords in lots of applications, capturing their OneDrive or Dropbox password then gives the scammer access to a trove of personal or company information, from which to profit from.

Like today’s most profitable scam — the “whaling” email impostor scam (a/k/a Business Email Compromise), these phisherman are patient, smart, and don’t make grammatical mistakes in their lure emails.

Here is how it works.

1. You receive an email from what appears to be from yourself or a familiar person, with a file to download; and the file name includes your company name and appears related to your business function. A real example is at this link (click here to view).

2. The message uses authentic Microsoft OneDrive, SharePoint, Dropbox or other logos and links.

3. The links to download the file directs to authentic Microsoft or Dropbox websites, for example attackers are using true-to-form Microsoft SharePoint Online-based URLs, which adds credibility and legitimacy to the email and link, since the user is being directed to a known-good hosting site. What makes this attack so evil is that even Microsoft didn’t see this one coming. While they scan emails for suspicious links and attachments, a link to their own SharePoint Online wouldn’t be considered malicious. And, since Microsoft isn’t scanning files hosted on SharePoint, they left attackers with an easy means to utilize the very platform on which they are trying to con users of their credentials.

4. When users click, they are shown a OneDrive prompt – the SharePoint file impersonates a request to access a OneDrive file (again, a known cloud entity), with an “Access Document” hyperlink that is actually a malicious URL.

5. Users are presented with an Office 365 logon screen. Here is where the scam takes place. Using a very authentic-looking logon page, the cybercriminals harvest the user’s credentials (username and password).

6. The cybercriminals are alerted they received a bite, they capture the user’s username and password, then start to access the user’s email and other accounts where they may have re-used this username and password. Chaos proceeds from there.

Tech Essentials strongly recommends:

a. Forwarding this article to your team, so they are aware. Ensure finance, accounting, HR, senior and junior staff that may be working on and sharing files are aware.

b. Create new policies; that files are sent shared using RMail “message level” encryption (RMail defaults to a one-time-password function). You can share files up to 1GB using RMail encryption.

Importantly, with RMail message level encryption, user’s default to one-time-passwords which makes it more secure — as these passwords will not provide access to any other corporate systems.

RMail is free to use in a base plan, so there are no barriers to getting started and installing RMail into your, and your staff’s, Microsoft Outlook or Gmail user interface.

Try RMail free – click here.

——————————

To learn more about RPost products, visit www.rmail.com or www.rsign.com 

Equifax’s $10 Billion Bet. You Really Don’t Care (Enough to Do Something)

With so many big-name data breaches in recent times, your eyes may have glossed over the recent Equifax consumer data breach settlement. The numbers were big, 147 million consumers had their sensitive information exposed. The penalty, $700 million (or about $5 per person). Source: New York Times, Krebs.

Factored into this amount are ways in which consumers can request extra perks, compensation for time spent dealing with the breach and worry about that might happen for the next ten years.

The price of the worry? $125. You can request $125 cash from Equifax or 10 years of free credit monitoring.

So what is this $10 billion bet Equifax is making? They are assuming almost no one (about 2%) of people pay attention to these things. If 2% claimed their $125, and the attorneys that fought for the consumer protection get their portion, the $700 million settlement target is hit.

What would happen if half claimed their $125 cash value of the credit monitoring? It seems Equifax would be on the hook for $10 billion in cash payments. That is substantial for any company (other than perhaps some of the FAANGs, Facebook, Apple, Amazon and Google).

Why should you care? If you are in business and work with clients, and have to communicate their sensitive information, there may be no need to worry. After all (assuming you believe the Equifax and consumer lawyers are savvy, and their assumption sound), only 2% of people will care and take action; not 50%.

But, if risking the wrath of 2% of your clients is too much — if every one of your clients is important, we recommend you install the free and easy RMail for Outlook or RMail for Gmail add-in that offers the simplest way to send encrypted email, share large files securely; and even send Registered Email certified e-delivery proof or e-sign; all with encryption.

RMail is free to use forever if you only want to protect the 2%. It’s only a few dollars a month if you want to use it a lot; to protect 100% of your clients and not worry about who the 2% are.

Try it free – click here.

——————————

To learn more about RPost products, visit www.rmail.com or www.rsign.com 

Independence Day – The Good Old Days When Only the NSA Read your Email

This time of year, we usually find ourselves reflecting on the great freedoms we enjoy as Americans, thanks to the bravery of our founding fathers and the militia men and women of that era.

Several years ago, we reported an analysis of the alleged revelations made public by NSA whistleblower Edward Snowden, as a foreshadow of a rising threat to the Constitution which was put in place to protect these freedoms, including 4th Amendment protection from unreasonable searches.

Today, the privacy revolution continues to evolve, with the face of “Big Brother” shifting to “Big Tech” and the whistleblower being the United States Congress. Technology can be used by some to search and seize your digital identity and private correspondence, but remember that you also have access to technology that you can easily use to protect yourself.

Take a peek back in time while you snack on your BBQ burgers, hot dogs, and grilled veggies, to our Tech Essentials article discussing the beginning of the digital privacy revolution.

Click to go back in time to the nostalgic days when only the government was eavesdropping on your email: Click to Read

——————————

If you are interested in following RPost from an investor perspective through its investor relations emails and briefings, click here; or follow us on social media, click here.

Join an RMail training session live or view a recorded video.

If you would like your IT consultant to purchase RMail through Ingram Micro, pass along this link.

SoftwareONE Adds RMail and RSign by RPost

Heightened Interest in Email Security, Compliance and Digital Transformation Fuels Demand for RMail Email Encryption Automation and RSign E-signature Services, Now Available through SoftwareONE 

With RPost®, SoftwareONE now provides its enterprise customers and service providers of all sizes software and service tools to enable them to digitally transform their organizations, and those of their clients, all with security and compliance in mind. SoftwareONE is a leading software and cloud portfolio management provider ranked #11 on CRN’s 2018 Solution Provider 500 list, with over 6,000 technology experts located across 88 countries.

SoftwareONE adds RMail security and compliance, and RSign e-signature services:

— RMail® adds more security simplified and automated; award winning email encryption, certified e-delivery proof, secure large file sending, and anti-whaling email impostor protection. RMail runs inside any Office 365 Outlook and other email user interfaces and/or may be automated from the RMail Security Gateway with content policies and advanced rules.

— RSign® adds feature-rich e-signature services that digitally transforms business processes.

Join a SoftwareONE and RPost webinar introducing this product alliance, July 18 at 11am PT, 2pm ET. Click Here to Register.

Powered by patented Registered Email™ technology, RMail automatically detects the simplest secure encrypted delivery method and returns a Registered Receipt™ record for every message sent, providing and proving important e-delivery details and data privacy compliance.

Users that install RMail are auto-enabled for RSign, a simple to use, full featured, web-based e-signature service that makes it easy for signers to complete and sign documents electronically using any web browser, in an intuitive, self-guided signing process. RSign includes reminders & notification automation and rules, real-time delivery and signoff audit trail and history, as well as encryption, templates, advanced form features, signer authentication, and more.

“RMail simply make email better for business; and is a logical cybersecurity and compliance extension in a simple user experience that lets users do more, faster,” adds Shelly Bodine, Chief of Staff at SoftwareONE. RMail does not require any special action, encryption keys or software at the recipient. “Add RSign and you now have so many ways to transform business processes with e-signatures and digital forms. Either RMail or RSign, or in combination, these are simple to use, powerful tools for all of our business customers and partners.”

RPost has been providing its award-winning security, compliance and e-signature services to customers of all sizes, worldwide, for more than a decade.

“Users that install RMail are also auto-enrolled with a free base service plan for RSign,” adds Sean Walsh, partner manager at RPost. “RMail and RSign together add a powerful set of tools needed in all businesses to help people do more in less time, with security in mind.”

Contact Sean Walsh to learn how to bring RMail and RSign into your operations (click here).

About SoftwareONE: SoftwareONE, a global leading Platform, Solutions and Services company, is modernizing the way organizations budget and optimize their global IT spend from on-premises to the cloud. SoftwareONE has the expertise to provide customers with the right advice on their technology roadmap towards the cloud or optimizing the business-outcome of a cloud-based landscape. The PyraCloud platform, applying machine learning, delivers the visibility, insight, automation and control customers demand to maximize their software investments. In tandem, our Software Lifecycle Management (SLM) services provide the methodology and framework to optimize the underlying IT infrastructure, accelerate cloud adoption and minimize compliance risk. Privately owned since 1985, with over 5,500 technology experts located across nearly 90 countries, SoftwareONE is one of the fastest growing technology solution providers in the world with elite partnerships with Microsoft, AWS, Adobe, IBM, VMware, Oracle, Citrix, Red Hat, Trend Micro and many more. To learn more about SoftwareONE, connect with the company on Twitter and LinkedIn.

About RPost: RPost is a leading cybersecurity company providing email security, compliance, and productivity services to more than 25 million users worldwide over more than a decade. RPost has set the global standard for secure and certified electronic communications, with more than 50 patents granted on its core Registered Email™ technologies, used worldwide to track and prove email delivery, encrypt email, protect from imposter email, secure large file transfers, and manage e-signature transactions. Recipient of the World Mail Award for Best in Security, Best Innovation in IT Award in Germany, and voted Top Choice for GDPR Email Data Privacy Compliance, RPost services are in use in nearly every country in the world, within Global Fortune 500 companies, and endorsed by the most influential industry associations. To learn more about RPost, connect with the company on Facebook, Twitter and LinkedIn.

————————————

Click here if you are interested in following RPost from an investor perspective through its investor relations emails and briefings.

Do Recommendation Engines Make us Simpler Minded?

Recommendation engines operate behind the scenes everywhere, to make life a little more enjoyable, simpler, and more relevant. But do these make us all narrower minded?

YouTube, Netflix, Google Search, Apple News, Facebook feeds, Pinterest posts; these services are all focused on increasing user engagement. More engagement means more reliance on their platforms and ultimately more profits.

How do they increase user engagement? They use advanced technologies to compare your behavior — your searches, movies watched, news articles scrolled, humorous video clips played — to millions of others who use their tools. They are looking for patterns and then forever narrowing the scope of what they display to you next; based on what they (their algorithms) believe you will like to see or read.

As the New York Times recently reported, YouTube’s recommendation algorithm is a set of rules followed by cold, hard computer logic. It was designed by human engineers, but is then programmed into and run automatically by computers, which return recommendations, telling viewers which videos they should watch. Google Brain, an artificial intelligence research team within the company, powers those recommendations, and bases them on user’s prior viewing. The system is highly intelligent, accounting for variations in the way people watch their videos.

What ends up happening is everything you read and see — what you think is important in the world — is a related subset of what is occurring, a subset of similar information that you have already seen. Over time, these recommendation algorithms get more and more focused, and serve you narrower and narrower fields of information.

If you click on an article about golf, you will see more articles about golf in the future. Soon you will think that golf is a hot topic. Maybe it is or maybe it isn’t; but since it is engulfing your field of view, you think it is. With each click, the recommendations get more specific, and your field of view becomes focused.

If you are an anthropologist, you will have realized that the ubiquity of the recommendation engine is making us simple minded humans more polarized, more narrow minded — precisely the opposite of what one might have expected with the world’s information a few keystrokes away from everyone at all times. (Read More, Wired: Creating Ethical Recommendation Engines)

Tech Essentials is intended to expand your field of view, at least when it comes to tech tips related to security, compliance and productivity. What does the Tech Essentials recommendation engine suggest?

If you are reading this, you are likely an adult professional that sends important information by email as part of your profession; as part of your daily routine. If you are reading from your work email, you are likely either reading this in your Microsoft Outlook or Gmail interface; and chances are you read these from time to time on a mobile device.

As such, the Tech Essentials recommendation engine suggest you view this fascinating video before you send sensitive information and this wonderfully engaging video before you send something that has consequence if there is a dispute about whether or when received, or who said what when. And, for those that just need to do more faster, Tech Essentials recommends this quite interesting video.

While these videos may not be as fun to watch as the bloopers your kids show you on YouTube, based on your profile, these videos may at least serve more purpose.

——————————

If you are interested in following RPost from an investor perspective through its investor relations emails and briefings, click here; or follow us on social media, click here.

Join an RMail training session live or view a recorded video.

If you would like your IT consultant to purchase RMail through Ingram Micro, pass along this link.


To learn more about RPost products, visit www.rmail.com or www.rsign.com 

More MSPs Can Now One-Click Access RPost Services

RPost Expansion Accelerates 

RPost continues to expand its global agreement with Ingram Micro, adding distribution of RMail security and RSign e-signature services across Canada. RPost is a leader in cyber security, compliance and digital transformation software services. Ingram Micro is world’s largest technology distributor.

Ingram Micro and RPost will showcase RMail and RSign at Ingram Micro’s June 12 Toronto partner event.

“RPost’s RMail and RSign filled gaps in our messaging and communication portfolio. We had struggled to find a cloud-based solution that provided the security and compliance features that our clients were demanding, and RMail more than met our requirements,” stated Wayne King, President of InfoMedia Systems Group.

“As a bonus, RMail and RSign are easy to deploy and use,” adds King. “So easy, that with minimal training and support, users have been RMail-ing and RSign-ing confidently and consistently!” InfoMedia Systems Group is a leading Canadian managed service provider that sourced RMail® and RSign® through the Ingram Micro Cloud Marketplace in Canada.

Users report the RMail Registered Email™ track and prove, email encryption privacy compliance, secure large file sharing, and RSign e-signature services simplify life.

“Easy and fast to use,” adds users at Ogilvy Assurance, a Canadian insurance customer of RPost. Ogilvy reports a variety of benefits, including simplifying daily work, protecting sensitive information, certifying e-delivery in case of a dispute, and complying with regulations; when sending insurance policies, end of mandate letters, payment notices and other important documents electronically. “Overall, Excellent.”

This Canadian market expansion follows recent RPost and Ingram Micro distribution initiatives in the United States, Australia, and United Kingdom markets.

RPost Canadian customers also include divisions of global companies. Koch Industries’ oil and gas division in Canada reports, “Email delivery confirmation was very hit and miss before we started using RPost, as read receipts were only received if the receiver of an email agreed. Now, with RMail Registered Email service, we don’t have to worry about whether someone has received our email; now we have verification through RPost.”

Koch Industries sends stakeholder engagement records and other important communications using RMail. Koch Industries also reports that overall, RPost customer service is extremely responsive.

“Business staff everywhere are today asked to do more with less time. Now through Ingram Micro, more IT consultants can bring RPost services to their client operations; to speed business with security and compliance and mind,” adds Zafar Khan, RPost CEO.

————————————

RPost partners: please contact Sean Walsh to get started with RMail or RSign. Contact RPost

————————————

Click here if you are interested in following RPost from an investor perspective through its investor relations emails and briefings.