Blog & News

More Insurers Move to RPost; European Expansion Accelerates

British insurance brokers face more regulation, whether it be new privacy regulations requiring auditable proof of private transmission (GDPR) or The Insurance Act’s requirement to maintain proof of fair presentation of risk in disclosures. With insurance broker customers large and small, including global companies Aon and Willis Towers Watson, RPost’s services have become a centerpiece in the sector.

Two leading insurance platforms, one of the largest in Europe, Acturis, and one of the largest worldwide, Applied Systems, have built RPost into their offerings, making it native for many users. “The Acturis RMail integration gives our users the power to legally prove email, get documents signed and encrypt private information on email all from within the Acturis system,” states Theo Duchen, CEO of Acturis.

To assist in complying with these requirements, the British Insurance Brokers’ Association(BIBA) has approved RMail® secure and certified electronic messaging services for use as a Member Facility for all of its members. “Registered Email™ and email encryption technologies by RPost are essential tools that are available to our members…to reduce the risk of cyber-crime,” comments Martin Bridges, FCII Chartered Insurance Practitioner, Technical Services Manager, British Insurance Brokers Association (BIBA). RPost is a sponsor at two important insurance events in May, BIBA’s annual conference in Manchester, England, and NetVu’s Accelerate annual conference in Cincinnati, Ohio.

Ingram Micro, the world’s largest technology distributor, is building on the RPost momentum, now bringing RPost technology to small businesses across the UK and Europe. “Cyber security is a massive focus for us in 2019, and having RPost onboard will only extend this focus to grow to new heights,” states Scott Murphy, Director of Cloud and Advanced Solutions for Ingram Micro UK&I. RPost’s RMail and RSign services are now available through the Ingram Micro Cloud in the United Kingdom, Europe/Netherlands and other markets (USA, Canada, Australia). RPost is a sponsor at the one of the largest tech distributor events in London, Ingram Micro’s May annual Cloud Summit UK, with Ingram Micro’s RMail and RSign offerings available to MSPs in the UK and Europe.

“RMail and RSign do not require sophisticated API programming to start, they integrate into simple Office products; easy to understand,” adds Volker Sommerfeld, Product Manager for Franking and eSolutions at Frama Communications AG. Frama has deployed RMail and RSign to more than 1000 corporate customers in Europe. “With RMail and RSign, we are helping customers master their digital transformation keeping in mind ease of use; a critical success factor for any digital transformation!”

RPost successes in Europe are due to the design of its RMail security and compliance, and RSign e-sign digital transformation products. “We see momentum in Europe due to an evolving trend. Operations staffs are looking more and more to digitally transform operations; but now with the clear understanding of the requirement to select transformational technologies that additionally check-the-box for security, privacy and compliance. RMail and RSign do just that,” adds Zafar Khan, RPost CEO.

————————————

RPost partners: please contact Sean Walsh to get started with RMail or RSign. Contact RPost

Vacationing in the Bahamas? Leave Your Laptop at Home

The constitution provide certain privacy rights. Attorneys and their clients generally enjoy extra protections on privacy with “privileged” correspondence. But what happens if the information is inadvertently exposed? There are all sorts of pitfalls that can expose your sensitive information. Here are some shocking ones.

File sharing services can cause waiver of attorney-client privilege if files are not send with an encrypted link. (Try RMail Largemail for encrypted file sharing – Click here)

Archive vendor staffers sometimes sell access to your data, which is what some believe to have caused the rich and famous exposé known as Panama Papers and Paradise Papers.

And now there is a new one. Customs and Border Protection officers that meet and greet you at the airport, are now receiving request from a variety of government agencies to meet, greet, and download all your data from your phone and laptop.

In exchange for letting you get home, airport border security may force you to give them all of your data; your phone data (locations visited, contacts, photos, social media posts, email, texts, and more!) and your laptop files (tax returns, attorney correspondence, love letters, browser history, saved photos, email and attachments, internet video views cached in your browser, and video and photo downloads, etc.).

The Electronic Frontier Foundation (EEF) and ACLU have filed a lawsuit against the U.S. Government to request the courts to end what they refer to as warrantless search and seizure. EEF reports government mandated device downloads at the border are up 400% in the last year. Considering the number of border patrol data seizures and number of annual international travelers returning home, more than 1 in 1,000 are likely to be welcomed with a device data seizure; that is about 1 person for every two jumbo jet flights returning to the USA.

Meet Jeremy Dupin, a journalist living in Massachusetts, Aaron Gach, an artist living in California, Diane Maye, a college professor and former captain in the U.S. Air Force living in Florida, Matthew Wright, a computer programmer in Colorado, parties mentioned in the EEF lawsuit; and 33,000 other American and US residents who were welcomed at the border with a friendly border security welcome home…we let you go home only if you let us download all of your data.

Your private photos exposed, video data cached in your browser cataloged, your attorney correspondence shared across government agency, what might be downloaded, saved, cross referenced, and shared across government department? For most, perhaps nothing of much interest. But if any agency feels they might want your information that they cannot easily get otherwise, this process makes it easy.

Getting Trump tax returns? Easier for the Democrats, perhaps, to simply notify Border Patrol to seize the data from Trump tax advisers’ laptops next time they head to the Bahamas on vacation. Maybe, leave your laptop at home.

RMail is your best choice for privacy and compliance. RMail Largemail makes it easy for you to send large files right from Microsoft Outlook with encrypted links, for extra protection. Install now, at no cost.


To learn more about RPost products, visit www.rmail.com or www.rsign.com 

Caution. What You Might Find When Posting Your DNA Online

More than one in twenty Americans have voluntarily submitted their genetic code – the map of who they are personally and physically – to an Internet company. Most people were lured by cute TV ads creating curiosity about heritage.

Your DNA is a genetic code defining your traits. Without boring you on the biological aspects of this, the DNA submission may unknowingly and irrefutably connect you to relatives (newfound siblings, parents, etc.) that you did not know were related. It can also reveal the presence of your genetic code that may make you a higher risk person to insure. It may reveal recessive gene or heterozygous genetic makeup that may make you a less desirable mate (or more desirable); a perfect addition to future online dating services.

The dark side of Internet DNA testing may be shocking to those that have not considered the consequence. The trust people put in an online privacy statement (that may be amended from time to time) is equally shocking, especially when it comes to posting a genetic map of themselves, with really no way to retract it once it is posted.

A revealing article in The Atlantic delves into the unexpected. “In conversations and correspondence with more than two dozen people for this story, I heard of DNA tests that unearthed affairs, secret pregnancies, quietly buried incidents of rape and incest, and fertility doctors using their own sperm to inseminate patients. These secrets otherwise would have—or even did—go the grave.” The article adds, “It’s getting harder and harder to keep secrets in our society. If people haven’t come to that realization, they probably should. This generation right now and maybe the next 15 years or so, there’s going to be a lot of shocking results coming out. I’d say in 20 years’ time it’s going to dissipate. By then, our expectations of privacy will have caught up with the new reality created by the rise of consumer DNA tests.”

There are Facebook groups now with thousands of online DNA tester members, discussing the emotions of their findings when they have been contacted by genetically matched, formerly unknown parents, children and siblings.

What will the new realities be of consumer DNA testing?

What if these Internet DNA companies are acquired? What happens to the data? Privacy statements make it clear that the information will be shared with an acquirer. Who might want the DNA makeup information of the world? Big insurance companies to price discriminate based on genetic makeup?

Maybe Google or Facebook. Why not own indisputable information about who you are, combine it with your email correspondence and Internet traffic analysis, perhaps associate it with your Amazon purchase data, and why not combine with your car GPS mapping history showing who you visit when? In the world of big databases, cross referencing all this data provides the perfect DNA map of your physical traits, biological relationships, personality traits, and habits. All owned by Silicon Valley.

Of course, Silicon Valley big tech can do no wrong. Companies with cute logos and friendly web services are trustworthy; with even your most personal secrets. They would never share this information (with advertisers or upon receipt of government subpoenas). Or would they?

It may be too late for many. Once you send your tax returns without email encryption to your tax adviser or spouse who may use Gmail (at the sender or receiver) or G Suite (you would never know if they used Gmail), email content is analyzed by Google and your tax data is mapped by Google and associated with your profile.

Your DNA, your personal correspondence, all of this sits in the cloud, churning through big tech servers, searching for insights and patterns to better business.

It may be too late to preserve any element of personal privacy if you have already submitted your DNA to Silicon Valley. But with each email containing sensitive information, you may wish to preserve some future privacy by encrypting certain messages.

RMail email encryption is the best choice, as the private information is delivered direct to the recipient and is not stored on a server for recipient retrieval, like many other cumbersome services. (Use RMail email encryption at no cost – Click to Get Started)


To learn more about RPost products, visit www.rmail.com or www.rsign.com 

RMail, RSign Thrive from Australia to Europe

RPost momentum continues through its global distribution channel; sales for RMail and RSign thrive.

“Ingram Micro Cloud is pleased to introduce RPost to the growing and expansive portfolio of cloud services and solutions we provision on Cloud Marketplace UK. Cyber security is a massive focus for us in 2019, and having RPost onboard will only extend this focus to grow to new heights,” states Scott Murphy, Director of Cloud and Advanced Solutions for Ingram Micro UK&I. RPost’s RMail and RSign services are now available through the Ingram Micro Cloud in the USA, Canada, United Kingdom, Netherlands, and Australian markets. Ingram Micro is world’s largest technology distributor.

RPost’s main service platforms are RMail®, with its award-winning Registered Email™ e-delivery proof and email encryption compliance services, and RSign® for simple, legal, and secure e-signatures.

“More and more, companies in Europe are realizing standard email is just not good enough for some important messages, considering heightened regulations, ever more sophisticated hackers, and business interest in more efficiencies. We have now deployed RMail and RSign with more than 1000 companies in 6 countries across Europe, with new customers signing on daily,” states Volker Sommerfeld, Frama Product Manager. “Companies like the SMI Social Medical Institute in Berlin are using RMail to process their clinical data lawfully and fully compliant toward GDPR in Germany.” The Frama group of companies have been managing sensitive data for more than 100,000 customers across Europe for two decades.

RMail® services make it easy to send email encrypted in a way that simplifies life for intended recipients to decrypt — perfect for compliance with privacy rules and to protect client info from eavesdroppers and Internet thieves.

“We see RMail and RSign as important enhancements to our customers’ messaging and document operations, contributing to better security and saving staff time and money. This is a perfect combination of user simplicity and security,” states Daniel Albertsson, Nordic Cloud Manager, Advania. “We are bringing these solutions to our customers across Sweden, and the Nordics.” Advania is a leading Nordic IT-provider serving thousands of multinational enterprises, governments and corporate clients of all sizes with a wide range of IT-services, cloud solutions and support.

RMail services also include certified e-delivery proof, e-signature, secure large file sharing, email imposter protection services and more, all-in-one. Users that install RMail inside their Microsoft Outlook interface can access RSign with one-click, or RSign can be purchased as a stand-alone web service.

RSign® services make e-signing simple and affordable with flexible monthly pricing plans, while including advanced features to transform business operations — sharable templates, custom workflows, real time reporting, and more.

“Customers in regulated industries, as well as businesses large and small, have relied on RPost technologies for more than a decade, for the highest levels of security and compliance with the simplest user experience,” states Lee Welch, Director Cloud Services, ANZ, Ingram Micro. “We are pleased to bring these services, to track, prove, e-sign and encrypt, to our channel partners worldwide, with a variety of service plans to fit any company need.”

RPost partners: please contact Sean Walsh to get started with RMail or RSign. Contact RPost

Not All Email Tracking is Created Equal

If you are sending a zillion newsletter or marketing emails, sure, email marketing platforms make it easy to manage your email list; and many do provide some basic tracking information.

But how reliable is this information? Should it be relied on important business email or important notifications?

No. Why not?

First, many of these email marketing platforms base their tracking on whether images in the email where displayed or not. If you are sending primarily to business readers who predominantly open email in Microsoft Outlook, image tracking is disabled at the recipient end by default.

And… if a recipient opted out to one of your prior emails, unless you take great care to manage opt-out options, they may be opted out of all of your future emails — even the important ones.

And… if there was a transient delivery failure at one point in time, that recipient may be permanently opted out of future email — again, even important ones.

And… if sending to recipients with large ISP email addresses (like Gmail, Yahoo, Outlook.com, etc.) you had better keep in mind, most of these systems are trained to de-prioritize email sent from known email marketing platforms (putting the messages in promotional sub folders of the inbox, likely never to be read).

And further… many advanced email platforms at the recipient are today more zealous in their email blocking, requiring sender domain registration and key systems (DKIM, SPF, DMARC). These may or may not be properly configured in the email marketing platform and if not, may reduce likelihood of delivery to the intended recipient.

Trend Alert: Heightened hacker sophistication has advanced email security, requiring smarter email delivery systems for important email. 

A county tax authority in Virginia recently switched from use of their email marketing platform, for sending tax notices, to RMail Registered Email services. They reported that 30% of recipients claimed non-receipt of the email sent from the email marketing platform and solved this problem by sending via the RMail Registered Email services (watch proof of delivery video).

Were the tax authority messages sent and received, and simply claimed not to have been? Maybe, since these were tax notices. Regardless, the email marketing platform did not provide a deep forensic record that could be shared with the recipient, proving email delivery, content of the message and attachments sent and received, and timestamped forensic metadata as evidence.

If there is consequence where the email can be claimed to not have been received, in any business, RPost recommends sending it as a Registered Email™ message.

Sending as a Registered Email message is simple and provides irrefutable proof (click for free Outlook or Gmail app). The messages are sent from dedicated business email IPs, improving deliver-ability and categorization as business email, and they return a self-contained digital forensic record, providing timestamped and verifiable proof of email delivery including timestamped message and attachment content; for any recipient.

Real estate and property management operators rely on this for irrefutable proof. This service has been identified by the insurance industry as top choice for proof of email delivery for more than a decade and identified as top choice by more than 20 bar / law associations.


To learn more about RPost products, visit www.rmail.com or www.rsign.com 

Today’s Hackers Target Executives with Simple Social Engineering

Today’s hackers are more innovative. Rather than just running up charges on your credit card, they are looking to extort money in exchange for return of your private information or to limit their use of it. For insurance executives, private information often includes emails related to customers and their policies. Data could include confidential information about assets, employees, vendor contracts and bank accounts.

These more innovative hackers hold the private information as ransom. They request a payment or disclose private client correspondence, irreparably lock certain personal photos and files on one’s computer, post private information online for all to see, or sell internet browsing behavior. After receipt of the “ransom” payment, the hacker usually follows through on the promise so as not to endanger the potential of future ransom payments.

Hackers identify profitable targets from online profiles, company websites, and public real estate records. Their research can include more intrusive tactics such as intercepting email correspondence, eavesdropping at public Internet locations, or accessing online accounts.

A main access point for hackers seems to be email. If they gather enough information about you from eavesdropping on your email correspondence, they will be able to, in many cases, gain access to your systems.

The more they learn about you, the more likely they will succeed in extorting a bigger and better “ransom”. In many instances, the FBI recommends paying the ransom because the alternative resolutions are more costly than the cost of the ransom. “The ransomware is that good,” said Joseph Bonavolonta, the Assistant Special Agent in Charge of the FBI’s CYBER and Counterintelligence Program in its Boston office.  “To be honest, we often advise people just to pay the ransom.”

How might you mitigate your risk?

1. The best way to avoid a ransomware attack is to encrypt email communications that contain sensitive information. This minimizes opportunities to intercept emails and glean valuable information.

2. Minimize clicking on links from incoming emails if you do not trust the source and recognize the context of the message. The source can easily be masked, so ensure you recognize both the source and the context.

3. Your email account is the gateway to your information – account statements, password reset processes, and more. Ensure you use email account passwords different from your e-commerce website passwords.

One of the simple actions you can take today to thwart these hackers is to ensure that when you send personal email with sensitive information, you send it with RMail®message-level encryption.

RPost’s RMail service provides email encryption that is radically simple for both senders and recipients. The encrypted message contents are delivered directly to the recipient’s inbox, and there is no need for the recipient to open a third-party webpage, create an account, or retrieve the files from another location. To learn more or get started, click here.

——————————–

To learn more about RPost products, visit www.rmail.com or www.rsign.com 

Google AMP Ends Email as a Record of Who Said What When

Wow! It is strange that one still trusts a printed or PDF’d email as a record of who said what when.

Microsoft did its best to make it clear that any email can be easily altered, with a few mouse clicks.

  • For those unaware, try this in Microsoft Outlook: open an email, click Actions, click Edit Message, change the message, save, close, open again, and magic – your email content has forever changed without detection! Watch video
  • You can also read our last blog on e-signatures revolution

But those using G-Suite, Gmail or Outlook Online, for example, often forget that email was meant to be a collaboration tool, editable, and easy to add notations into a received email for later thoughts and reference.

Those that send marketing emails are well aware of how easy it is to send a message where the SAME email displays entirely different message content depending on what email program the recipient has — if they are viewing the HTML (text/html) part of the message or the Plain Text (text/plain) part of the message. Easy to do; the same email says two different things.

And now, Google is introducing to the world a new part of the same email, called the AMP part (text/x-amp-html). (Techies can read more here.)

This alters a standard email as record forever.

This innovation should finally help people realize that unless you do something to preserve a snapshot of the entire message content, including metadata originally sent and received at a point in time, you may not be able to demonstrate that a later printed email (or printed to PDF) is the actual content displayed for a particular recipient at a point in time.

Why?

Google’s new AMP part of the email let’s remote third parties effectively enter your inbox. After you receive and view a message, they can change the content of the message parts so when you refresh, new content displays.

What you see now, is not what you may see next time you open the same email!

This may seem trivial, or very nice for marketers, but imagine you save an email for future reference, and when you revisit it later to remind yourself — or show someone else what the email said — you re-open the email and find the content to be different! Or, you print an email, and then are asked to compare to the original, and the printed version is different than the original you saved!

  • One example Google demonstrates is the sender of an email with special offer, can change the special offer price in the email, days later after you first view it. 

If you feel you might want, at sometime in the future, a record of who said what when by email, send your message using the Registered Email service.

Or, if you receive a message and want to preserve a snapshot of what you received, send a copy to yourself using the Registered Email™ service.

To try this easily at no cost from Microsoft Outlook, Gmail or other email, (click here).

By sending as a Registered Email™ message, you receive an RMail Registered Receipt™ email record that, at any time in the future, can authenticate and reconstruct the original message content, delivery and opening history, and all underlying timestamps and metadata.

Send Registered. Perfect proof, preserved.

Watch for Google’s AMP; which will forever change the perception of your inbox email as a record.

——————————–

To learn more about RPost products, visit www.rmail.com or www.rsign.com 

The E-Sign Revolution and its Evolution

Impressions of e-signatures today still depend on who you ask. Many users report e-signatures today as “a life saver”, but some still think of e-signature services as “scary to use” or “simply not trustworthy”.

What a contrast, depending on who you ask and what services people have been exposed to.

In RPost’s recent customer survey with more than 2,000 corporate respondents, the comment that seemed to sum up the overall e-sign experience in very few words was, “I love it!” Those politicians that passed the Federal ESIGN laws nearly two decades ago would certainly appreciate this favorable feedback attributed to their efforts to define e-signatures as legal.

Today, the data shows nearly half of e-sign users want e-signature services to go beyond simply recording recipient e-signoff, electronically – they look to e-signatures as a way to streamline and automate business processes. This marks the evolution of the e-signature revolution.

Here are three interesting insights from survey respondents:

1. An increasing number of people see e-signatures as a powerful business automation tool. Nearly half (42%) see e-signatures as an opportunity to automate a business processes.

  • – Tip: Try RSign templates (click for video), rules, and static link features; the simplest way to automate e-sign processes.
  • – How does a feature like templates work in practice? Companies send many of the same agreement forms for fill and sign. With an advanced e-signature service like RSign, a company can create reusable and shareable templates with these documents and forms, preparing signature and form fields just once for all future transactions. One can also designate signing roles and orders, reminder options, and more.

2. The most important e-sign features reported were (a) ease of configuring an agreement or form for e-signature using drag-and-drop tools (63%), and equally as important, (b) having timestamped sealed content after e-signature (63%). These were expected results. Interestingly, however, nearly half reported that they enjoy the ability to send for e-signoff **without** the need to configure the document in a web application (45%).

  • – Tip: If you would like to simply attach any document to your Microsoft Outlook or Gmail email message and one-click send for e-signoff, RMail offers the only way to do this. Simply attach your document to email, send via RMail, and your recipients e-sign with a few clicks. (Watch RMail e-sign video )
  • – Alternatively, if you like drag-and-drop e-sign setup for forms, try RSign (click for RSign product tour video).

3. The most important purchase driver for e-sign services was user simplicity, which trumped low cost by a factor of more than 2 to 1. After simplicity, users made purchase decisions based on the robustness of the e-sign record with a timestamped audit trail and visibility of the signoff process including time sent, delivered, opened, and signed. (Techies can read more in RPost patents)

Watch the Tech Essentials e-sign webinar (Click to watch  E-Sign Webinar Recording) to learn more about RMail and RSign e-signature user simplicity, templates, and patented timestamped e-sign audit trail and e-signoff process visibility.

——————————–

To learn more about RPost products, visit www.rmail.com or www.rsign.com 

Try RMail at no cost, with no credit card needed (click for your Gmail or Outlook RMail app).

Ingram Micro Expands its RPost Security and E-Sign Offerings Worldwide

Heightened Interest in Email Security, Compliance, and E-Signature Services Fuels Demand for RPost, Resulting in Ingram Micro Expanding its Global Partnership.

Ingram Micro, the world’s largest technology distributor, and RPost, a leader in email cybersecurity and e-signature software services, announce an expansion of RPost email security, compliance, and e-sign services now available to Ingram Micro channel partners in countries worldwide.

“RPost is unique in that, through one software provider, Ingram Micro is able to make market-leading e-signature and secure messaging services available for all of their partners worldwide,” states Zafar Khan, RPost CEO. RPost services are now available through the Ingram Micro Cloud Marketplaces in countries worldwide: United States, Canada, United Kingdom, Netherlands, and Australian markets.

“We are pleased that Ingram Micro selected RSign currently as its sole e-signature offering in its main European markets and Canada,” adds Khan.

RPost award winning services, RMail®, RSign®, and Registered Email™, are a logical extension for any Microsoft Outlook or Office 365 user as RPost services add simple to use email encryption, e-signatures, secure large file sharing, Registered Email certified e-delivery proof, email open tracking, auditable proof of data privacy compliance, and much more, into the Microsoft Outlook user interface. Customers also access these services with automation using RPost’s Gmail, security gateway, and API offerings.

RPost has worked closely with Ingram Micro over several years to incrementally build RPost’s complete software service portfolio into the Ingram Micro Cloud Marketplaces and into Ingram Micro’s Federated service provider offerings. Business customers have enjoyed these RPost services worldwide for more than a decade.

RPost’s two main product platforms now accessible for Ingram Micro channel partners are:

  • – RSign® services, making e-signing simple and affordable, while including advanced features to transform business operations — sharable templates, custom workflows, real time reporting, advanced document configuration, and more.
  • – RMail® service, making it easy to send email encrypted in a way that simplifies life for intended recipients to decrypt — perfect for compliance with privacy rules and to protect client info from eavesdroppers and Internet thieves. RMail services also include certified e-delivery proof, e-signature, secure large file sharing, email imposter protection services and more, all-in-one.

Users that install RMail inside their Microsoft Outlook interface can access RSign with one-click, or RSign can be purchased as a stand-alone web service.

“Customers in regulated industries, as well as businesses large and small, have relied on RPost technologies for more than a decade, for the highest levels of security and compliance with the simplest user experience,” states Lee Welch, Director Cloud Services, ANZ, Ingram Micro. “We are pleased to bring these services, to track, prove, e-sign and encrypt, to our channel partners worldwide, with a variety of service plans to fit any company need.”

Other RPost products now available through Ingram Micro include:

  • – Registered Email™ service makes it easy to certify e-delivery of time-sensitive notices. Registered Email messages return a Registered Receipt™ email for timestamped proof of delivery, to protect in case of a claim of non-receipt of required notices, disclosure documents, or to support any need to have audit-ready records of what staff transmitted to whom and when.
  • – RMail SG™ security gateway adds automatic encryption through data leak prevention DLP and policy-based content filtering. Automatic actions include sending with all main RMail Functions (send encrypted, send for electronic signoff, send with certified e-delivery proof) with anti-spam, anti-virus, anti-spyware, anti-ransomware, anti-abuse services, among other threat prevention scanning on in-and-outbound email traffic
  • – OTP Messaging™ quantum secure messaging for off-the-grid privacy. Creates a private messaging network using the one-time-pad theory of cryptography for perfect privacy, secrecy, and anonymity in messaging.

Together, Ingram Micro and RPost bring to their customers a complete set of business messaging and document services via the Cloud Marketplaces worldwide, now available in the US, UK, Netherlands, Canada, and Australian markets with additional countries to be deployed as demanded.

Click here if you are interested in following RPost from an investor perspective through its investor relations emails and briefings.

Fake Facebook and Email

Wow! What a beautiful vacation that friend of a friend posted in their Facebook account. It looks like the perfect family vacation; all smiles, all sun, some commentary about the perfect spot…

Is the perfect life of your friends’ friend depressing you? How could their experiences be so perfect, while when you go on vacation, you are hit with reality; some rain, crowded hotels, delayed flights, travel stress, kids complaining…

Well, what you should keep in mind (and should continuously remind yourself) is that what you see online quite possibly could be fake.

The New York Times recently reviewed Facebook’s “Transparency” data and concluded that Facebook took down 2.8 billion fake accounts in the last twelve months. According to the report, the accounts taken down each calendar quarter equate to approximately one third of all Facebook accounts. Could it really be that 1 in 3 Facebook accounts on average are posted by fake people?

It gets more interesting (or scary depending on your viewpoint).

If you tuned into news reports recently, you will see a surge of discussion about fake videos online, called “Deep Fakes”. Tech Essentials explored this in a recent article (read more about Deep Fakes here, “Today’s Fake News will be Quaint in 2020”). Political mis-information campaigns are soon to include videos of what look like famous people and well-known politicians saying things that they really are not saying. These fake videos are extremely authentic looking, easy to make by techy amateurs, and easy to disseminate to the masses.

And then there is fake email. The latest trend is the imposter email that comes to you posing as if it is from your boss or business colleague. This type of email, when sent using sophisticated imposter techniques, is called a “Whaling” email (read more, “$5 Billion Hacker Lottery”). Like Deep Fakes, if done right, these are extremely authentic looking, and often lure the recipient into engaging in a back-and-forth email exchange over a period of time, sometimes ending in a fake invoice being paid, or money being sent to the imposter.

Awareness and detection tools will need to continuously advance to counter these mis-information and hacker threats. Facebook fakes, Deep Fakes, Whaling imposter email and other threats are here to stay.

——————————–

To learn more about RPost products, visit www.rmail.com or www.rsign.com 

Try RMail at no cost, with no credit card needed (click for your Gmail or Outlook RMail app).