Blog & News

RMail Wins Top Rating for Email Privacy GDPR Compliance

Technologists, Compliance Experts and Service Providers Contribute to the First Practical Guide to GDPR Email Privacy Compliance

London, England – 20 June 2018 — Frama, a leader in technology enabled compliance and digital transformation, today announced release of its technology guide that identifies top criteria important for European General Data Protection Regulation (GDPR) email privacy compliance. The guide rates a selection of leading technologies and concludes the RMail service by RPost is top choice.

According to Frama Communications, there are many GDPR papers that speak at a high level about what GDPR is about. None, however, provide guidance on practical technology solutions that can be easily implemented to plug security and compliance gaps. Frama developed this report with contribution from the Association of Professional Compliance Consultants (APCC), to provide practical guidance that can be implemented by the smallest to the largest financial services firms as part of their GDPR compliance efforts; and can be implemented in minutes at very little cost. [Click to access the free GDPR Guide]

“This paper marks a significant contribution to the GDPR compliance debate, by providing a robust assessment of the concerns and a powerful methodology to guide practical compliance.  It also offers useful parameters that an organization should consider in its selection of an appropriate solution and a perspective on several of the leading offerings,” remarks Nick Hawke, Chief Executive Officer, Association of Professional Compliance Consultants, in the Foreward of the report.

“For the purposes of GDPR data privacy compliance related to e-mail, e-document delivery, and e-signing systems, RMail® and its related e-signature and digital forms services are an ideal solution,” states Volker Sommerfeld, Product Manager from Frama Communications. “RMail is the professional solution for secure email that everyone can use. Ticks all of the boxes, easy to manage, simple to deploy and very elegant.”

In the 40-page report, RMail® by RPost® scores more than double its closest technical alternative when considering criteria most important to regulated businesses dealing with consumer information. RMail is designed to not only make it easy to enhance data privacy compliance in case of compliance audits or accusations of a data breach, but also to provide an important tool to protect strategic business secrets. Other technologies considered include PKI, PGP, TLS, Link Retrieval, HTML Wrapper, File Sharing, and PDF systems, and providers and products using these technologies.

“RMail is simple to integrate, provides state-of-the-art technology, and it makes it easy to encrypt email; importantly encrypting email in a way that automatically provides audit-ready proof of GDPR compliance on a message-by-message basis for the transfer of personal data,” adds Kemal Webersohn, CEO of WS-Datenschutz GmbH, Berlin, Germany. “Recipients’ acceptance and the simplicity in communicating with third parties have convinced us to use RMail extensively in our company.”

The report states that GDPR defines what is to be achieved rather than how the requirements should be fulfilled. Consequently, it does not state a requirement to use a specific method of encrypting email, but it does require the handler of consumer non-public and personal information to maintain not only privacy of that information, but also the ability to demonstrate compliance with the privacy requirements. These requirements are discussed in detail in GDPR Article 5 Clause 1(f) and 2, and Article 32 Clause 1(a) and 1(d) which focus on the requirement to protect personal data during transmission with the ability to demonstrate fact of protection of personal data.

“RMail maps perfectly to the GDPR compliance points of protecting privacy plus maintaining the accountability processes to be able to demonstrate compliance,” adds Sommerfeld.

In addition to top rated email encryption and audit-ready proof of privacy compliance receipts, the report states that RMail is the only option that empowers users with important secure productivity solutions including the most advanced eIDAS services for legal e-signatures, Registered Email™ legal timestamped content and e-delivery proof, and secure file sharing for large file e-delivery with certified tracking. These empower users with more productivity all the while focusing on underlying security and privacy.

“Having customers that have deployed RMail for over a decade, we see RMail as an essential piece of any company’s data privacy and compliance plan. RMail takes a smart, different approach; and belongs even if other secure systems are already in place,” adds Zafar Khan, RPost’s CEO.

Click to access the report entitled, “Technology Guide to Meet GDPR Compliance for Data Privacy for Email”.

About Frama Communications: We provide solutions for security and compliance in digital communication. Having a 40-year history within the management of sensitive and financial data to more than 100,000 customers worldwide, Frama Communications supports organisations meeting the growing requirements for data protection and compliance. Encryption, verifiability, traceability of emails, electronic signatures, and automation of processes – we promise: integrity in communication.

About RPost: RPost is a leading cybersecurity company providing email security, compliance, and productivity services to more than 25 million users worldwide over more than a decade. RPost has set the global standard for secure and certified electronic communications, with more than 50 patents granted on its core Registered Email™ technologies, used worldwide to track and prove email delivery, encrypt email, protect from imposter email, secure large file transfers, and manage e-signature transactions. Recipient of the World Mail Award for Best in Security, Best Innovation in IT Award in Germany, and voted Top Choice for GDPR Email Data Privacy Compliance, RPost services are in use in nearly every country in the world, within Global Fortune 500 companies, and endorsed by the most influential industry associations. https://www.rpost.com

RMail Now Built into Leading Swiss ERP System, Abacus

Abacus, the leading Swiss ERP system, embedded RMail Registered Email encryption in its software to enable its 42,000 corporate customers to send payroll notices automated, encrypted, and certified.

Winterthur, Switzerland – 13 June 2018 – RPost, a leader in email cybersecurity software services, Frama Communications AG Switzerland, a leader in secure handling of sensitive data and Abacus Research, the provider of the dominant ERP system in Switzerland, have teamed to automate sending payroll notices as RMail Registered Email messages, encrypted. This combination creates a powerful incentive for thousands of Swiss companies to digitally transform parts of their payroll management functions with Abacus.

Companies can now send payroll slips as encrypted emails to their employees saving money on distribution and postage. Good news: The payroll information remains encrypted in the email inbox providing additional data protection. Each employee uses his/her own password to open the payroll email while the whole password management is done outside the sender’s environment and responsibility.

“RMail adds a powerful combination – simple to use email encryption with certified e-delivery proof. Together, these satisfy requirements to maintain privacy of employee payroll data and at the same time provide ease of use for the employees. RMail serves as a secure gateway within Abacus. There is no need for any additional appliances, or specific setups at the sender’s end,” adds Volker Sommerfeld, Product Manager at Frama AG Switzerland, “and more importantly, there is no need for any additional accounts, platform setups and or software downloads at the employee’s end. RMail focuses on ease of use while maintaining compliance. This is a key requirement for business to meet GDPR (EU) and DSG (CH) obligations.”

Frama is managing the market introduction of this Abacus RMail module to Abacus customers and their IT consultants. “Our customers reported very compelling benefits in using RMail over other methods of paper and e-delivery; top praise being the simple user experience for the recipient all-the-while providing audit-ready proof of e-delivery.”

RMail was first used by Abacus clients in 2017. After favorable client feedback Abacus chose to use RPost’s APIs to build RMail firmly into the Abacus G4 data flow. This is now available in the latest May 2018 Abacus Service Pack release. “The feedback from the market about the user experience of the RMail secure gateway so far had been very favorable,” adds Raphael Gruber, Product Manager ERP Systems of Abacus Research. “We foresee that the secure gateway of RMail will be used by a majority of our clients to support their efforts transforming their paper-based business workflow to digital.”

“RMail empowers users to do more better, while increasing cybersecurity,” remarks Zafar Khan, CEO of RPost. RMail is an RPost product. “RMail simply opens up digital transformation opportunities to businesses.”

About RPost: RPost is a leading cyber security company providing email security, compliance, and productivity services to more than 25 million users worldwide over more than a decade. RPost has set the global standard for secure and certified electronic communications, with more than 50 patents granted on its core Registered Email™ technologies, used to track and prove email delivery, encrypt email, protect from imposter email, secure large file transfers, and manage e-signature transactions. Recipient of the World Mail Award for Best in Security and voted Top Choice for GDPR Email Data Privacy Compliance in Europe, RPost services are in use in nearly every country in the world, within Global Fortune 500 companies, and endorsed by the most influential industry associations including The Florida Bar. https://www.rpost.com/

About Frama Communications: We support companies in meeting the growing requirements for data protection and compliance. Whether encryption, verifiability or traceability of emails or electronic signatures – we promise: Integrity in communication. Our service portfolio consists of individual advise as well as solutions for secure messaging, email services with additional functions (audit-proof record: compliance, content, delivery), track & trace solutions for email plus managed file transfer services (LargeMail) and cloud / automation services for eSign and digital transformation. Best Innovation in IT Award in Germany, Editor’s choice Business Info magazine and top choice of Softshell Vender Report. https://www.frama-rmail.com

About Abacus: Abacus is the largest and most successful business software provider in Switzerland. https://www.abacus.ch

Of Course, Alexa has Control of Your House

Recent reports of the amazing eavesdropping power and home control Amazon’s Alexa has (similar to other voice-assistances) should not surprise. Its inherent in how these virtual assistants work.

Alexa has to always be listening to be able to respond to a voice command that may come from you yelling across the kitchen. She has to be ready to respond to back-and-forth question-response to receive further clarifying instructions if needed, so she often may keep listening in case you may add a detail. She needs to record the conversations onto Amazon computers and transcribe the resulting instruction, in order to process the data and invoke the commands. She takes good notes of what you would like to have happen (i.e. keep logs that Amazon staff can see, in case there is a need to trouble shoot). She has access (or will soon) to your internet connected devices (think door locks, heating, lights, and much more as people upgrade utilities).

And, you have invited her into your house to hang around the main areas where you may need her assistance.

So, considering you know all of this, why then might you be shocked by the reports that are starting to come in; about how Alexa may not be perfect, or may be “spying” on you?

Here are two interesting reports that may open your eyes to what is to come in the near future.

    • Amazon is reported to have confirmed that Alexa, while listening in to a muffled background conversation, misinterpreted the discussion for commands to record the conversation and send to someone in the contact list. There was shock all around when a stranger received a recording of someone else’ living room banter. Alexa keeps recordings of your conversations. Alexa can share these. It seems from the reports that Amazon staff can listen to recordings or read transcripts (in the name of “troubleshooting” or “improving” service).
  • Researchers have identified ways to create hidden commands that humans cannot hear, but Alexa (and Siri and Google Assistant) can. They can embed these commands into normal music that you may ask Alexa to play. When Alexa plays the song, the embedded (human inaudible) commands could be asking Alexa to open the door, record a conversation and send it somewhere, or to do other things (based on what devices are connected to your home network). Perhaps ultrasonic commands could be sent through your windows to awake Alexa and task her with an activity.

These are early days of Artificial Intelligence, Internet of Things, and Digital Assistants. Alexa is just a few years old. She is like an old Motorola flip phone compared to the power and influence she will have when she becomes a teenager, in a few years to come.

Privacy may become a quaint concept for those that want to enjoy the latest technological innovations; for those that invite Amazon, Google, and Apple into their living rooms.

Today’s Fake News will be “Quaint” by 2020

Turning the power of connectivity against itself, fake Facebook and other social media accounts were able to spew propaganda to millions of targeted individuals who were specifically identified by the capturing of personal data from Facebook apps and Google analytics. Who was responsible? We won’t get involved in the debate here as you can easily form your own opinions.

However, brace yourselves for what’s to come especially as we near the 2020 presidential elections (and what you will see sooner on your Instagram and Facebook video feeds!).

Google has gathered so much information on people (by analyzing email content and other behavioral data) that they have created artificial intelligence code libraries that are made available to developers. With this data overlaid with one’s photos and home videos posted on Facebook, using free online software, one can easily make realistic fake videos of YOU (or politicians, Hollywood stars, your neighbors and friends) saying things you would never really say, and disseminate your fake message to your community of friends or the world.

College kids will be using this soon as their next form of prank!

Think about this for a minute. Realistic, impossible for the layperson to detect, fake videos of you posted on YouTube for the world to see (and likely beyond your control to remove).

This is the new world of technology called “Deep Fakes”, made easily accessible by tools like FakeApp and Lyrebird. “Deep Fake” is an artificial intelligence-based human image synthesis technique used to combine and superimpose existing images and videos onto source images or videos.

Sound complicated? It’s not. Watch this report investigating the growing use technology to create realistic “fake news.” And, remember, this is “early days” for this technology — just wait until more powerful tools are developed operating on more powerful computers.

What does all of this mean? What can you trust?

With video, it seems you will soon not be able to trust what you see. We have no easy advice for you here, other than be aware. Don’t simply trust what you see because it is an authentic looking video.

With email and important documents, however, we do have an easy solution. To be in a position to prove original email or document content, timestamped delivery, or who signed what when, you should simply add RMail to your email program. All it takes is a few clicks to install, and you can send your email and documents as Registered Email™ messages for when you feel it is important to have irrefutable proof of delivery, content, timestamp, e-signatures, or fact of encryption compliance.

RPost and Global Micro Make Email Security Ubiquitous in South Africa

Heightened Interest in Email Security Drives RMail Email Security Update for Tens of Thousands of Microsoft Business Email Users Across South Africa

Los Angeles, CA and Johannesburg, South Africa – 25 April 2018 –RPost, a leader in email cybersecurity software services, announces an expansion of its email security, compliance, and productivity services across South Africa, in partnership with Global Micro. Global Micro is one of the leading Microsoft hosted email providers globally, and the market leader in South Africa.

“RMail adds so many business essentials to the Microsoft Outlook email interface in a simple, elegant user experience,” states JJ Milner, Managing Director, Global Micro. “After initial introductions to our customers and partners, we received immediate requests to deploy and purchase. We are in the midst of turning on RMail for a few tens of thousands of business users initially over the forthcoming months.” RMail’s Anti-Whaling email imposter protection was an important feature for the business community considering recent heightened hacker sophistication in the South African market.

RMail® adds into Microsoft Outlook an all-in-one email extension for security, compliance and productivity, , providing senders with simple-to-use email open tracking, Registered Email™ certified e-delivery proof, compliant email encryption, electronic signatures, secure large file transfers, auditable proof of compliance, email imposter protection, and more. Powered by patented Registered Email™ technology, RMail returns a Registered Receipt™ record for every message sent, providing and proving important e-delivery details and data privacy compliance.

Users that install RMail are auto-enrolled with a base service plan for RSign.

RSign® is a simple to use, full featured, web-based e-signature service that makes it easy for signers to complete and sign documents electronically using any web browser, in an intuitive, self-guided signing process. RSign includes reminders & notification automation and rules, real-time delivery and signoff audit trail and history, as well as encryption, templates, advanced form features, signer authentication, and more.

“RMail adds more email privacy and cybersecurity to Microsoft Outlook, perhaps most importantly, with user simplicity in mind — simple for the sender and for the recipient. Then we delight users when they realize we have also packed RMail with tools like e-signatures and Registered Email™ certified open tracking and proof that let them do more, faster,” adds Zafar Khan, CEO of RPost. “RMail simply makes Microsoft email better.” Users install RMail to run inside their instance of Microsoft Outlook, Office 365, Gmail, or Zimbra, or send RMail messages automated from web, mobile or business systems. “With Global Micro’s aim to continuously innovate for its customers, RMail is a natural fit.”

About RPost: RPost is a leading cyber security company providing email security, compliance, and productivity services to more than 25 million users worldwide over more than a decade. RPost has set the global standard for secure and certified electronic communications, with more than 50 patents granted on its core Registered Email™ technologies, used to track and prove email delivery, encrypt email, protect from imposter email, secure large file transfers, and manage e-signature transactions. Recipient of the World Mail Award for Best in Security, Best Innovation in IT Award in Germany, and voted Top Choice for GDPR Email Data Privacy Compliance in Europe, RPost services are in use in nearly every country in the world, within Global Fortune 500 companies, and endorsed by the most influential industry associations. https://www.rpost.com/

About Global Micro: Operational excellence has been important since we started in 1994. As a multi-year winner of the Microsoft Hosting Partner-of-the-Year award, Global Micro is trusted by over 4,500 businesses to provide on-premises and cloud solutions. We have migrated more than 50,000 users to the cloud and have the largest Microsoft Exchange customer base in South Africa with over 80,000 users.  http://www.globalmicro.co.za

 

Is “Security by Obscurity” an Obsolete Concept?

The term “security by obscurity” has been around for a long time. Traditionally, this has referred to the idea that the best way to keep a system safe is to keep its design (and any potential vulnerabilities) a secret. To many, “security by obscurity” has also represented the idea that there is safety in numbers, such as on a social media network that has hundreds of millions of users. One might argue that the intersection of social media, online platforms that gather and sometimes sell (for legitimate purposes) personal data, and peoples’ addiction to electronic communication convenience, may call for a new way of thinking about one’s own (or a client’s) security by obscurity.

Consider how the most prominent targets are being hacked

Sure, there are news stories of hackers targeting large companies – a recent one is a report of a Russian hacker targeting 48 major law firms focused on mergers and acquisitions with the aim of gaining pre-public information to trade on in advance of news announcements. This hacker targeted hardened corporate IT departments, but there are certainly easier targets available.

For most hackers, the easiest target is you, the business user

Today, hackers can easily use sophisticated data mining techniques to target YOU, a business email user. Hackers sometimes purchase personal data from marketing companies, multiple listing services, real estate platforms, and LinkedIn business recruiting tools (“See full profile details on any LinkedIn member, zero in on the right person with 20+ Premium search filters…” — LinkedIn) for back-end access to study a target’s job title and relationships, Facebook or Google data, and more. One tactic for the more experienced hacker is to set up fake companies to subscribe to tools that title insurance companies and credit departments legitimately use to learn about your financial dealings.

Recently, hackers have been successful at this — to the tune of more than $1.2 billion reported stolen in average increments of $6,000 from individuals and $130,000 from businesses, according to the FBI, by spending some additional up-front research time to learn about their targets.

2018 may be the beginning of the “Hacker Goldrush”

Once a hacker identifies his list of targets, it is not hard for him to gather the information required to trick someone into sending money to the hacker’s imposter bank account. The target may be someone who saved their money for years to purchase a new house, a lawyer or other trusted client advisor, a realtor, an insurance broker, a registered investment advisor or an accountant. Click here to read about some of the recent scenarios uncovered through RPost interviews.

New targets and new tactics are identified every day

The latest scheme uncovered and reported by The Guardian, is based on a flaw in the underlying Signaling System No 7 (SS7) mobile communications protocols. With a little technical sophistication and the mobile phone number of the hacker’s target, the hacker can listen in on telephone calls, siphon off photos and other text messages sent and received, and track a target’s location.

To identify targets, the hackers often monitor the professional advisors as individuals (not even bothering a hack into their corporate networks like what was reported to happen with the Panama law firm Mossack Foncesa). The information gleaned may lead to other hacker opportunities, in terms of selling (or exposing) the data to regulators, adverse parties in litigation, or threatening to expose it and asking for ransom. All of this has consequences that attorney-client privilege arguments do not protect against. The US government, for example, has announced it will use the hacker-leaked data from the firm Mossack Foncesa, to initiate investigations against certain people.

What can you do about all of this?

There is not one single solution. One major recommendation is to use email encryption when sending sensitive personal or business information. However, the most important defense may be to simply take the time to learn a little about what is happening in Internet security and to use those tools that make it easy to maintain privacy and security when using the Internet and email.

We also recommend that you invite your colleagues to subscribe to this Tech Essentials Cyber-security Email Series, offered in partnership with bar, law, real estate, insurance, and other leading industry associations. Click here to subscribe to Tech Essentials.

What is Your Mood Worth?

Why all of the hype around Facebook privacy revelations? After all, the purpose of Facebook is to share your information (albeit, among your closest friends).

Perhaps one of the most alarming insights from the Cambridge Analytica findings is that with many Facebook apps or online surveys, when installed or taken by **anyone** in your Facebook network of “Friends,” **your** detailed data is siphoned off and sent to the app/survey company — your connections, what you liked, disliked, clicked on, whereabouts when accessing, and much more. Again, this data was culled even if you did nothing other than “friend” someone who likes to take Facebook surveys.

Why should you care? After all, there are far more invasive systems out there that are compiling data on you without your control. You can somewhat control what you do on Facebook.

An example of the future of data analytics is in real-time facial recognition and mood analysis. What the heck is this?

If you have been to a sporting event lately, many stadiums have added FanCam or a similar product. These systems take ultra-high resolution photos continuously of the stadium audience (not the players or game) and let fans find themselves by zooming in out their seat location, and order photos of them at the game — action shots of them cheering after a goal or win! (To see a sample, you can browse fans doing their thing at various stadium events here.)

But wait; this seems like an expensive way to take and share selfies! There must me something more…

With ultra-high resolution photos of your face, these systems can identify who you are by comparing your face and location with other databases, and can read your expression at various points in time during the event. They can detect a thrill, joy, anger, satisfaction, boredom and disappointment. These can even detect your attentiveness when you are viewing a pre-game advertisement on the large screen. Detecting your reaction to a product placement advertisement can be quite useful and valuable for marketers.

Of course, this is all “opt-in” meaning, you opt-in by walking into the stadium (often there is a sign posted outside saying that you agree to have your image shared by entering…after you paid for tickets and parking).

This all seems fun and harmless. But where is this technology going? Alexa, Siri, they are listening to your mood whenever you have your phone or home device on. Or consider perhaps TV and video game cams watching your emotions when you see various advertisements or are in game play mode, to hone in on improving your experience?

Our Tech Essentials prediction is that in the near future, one will look back at Google’s scanning of email to profile users and sell ads, or Facebook’s breach of user data to app makers as nostalgic — old limited technology, sort of like thinking about those days when people sent letters by fax. Watch out for the future of facial recognition and always-on cameras. In the meantime, you can still protect what privacy you have left by remembering to email your private information with RMail’s simple-to-use email encryption.

MindCentric Turns On RPost Email Security for Thousands of its Businesses Customers

MindCentric Deploys Award Winning RMail Email Security, Compliance, and E-Signature Services as an Update for Tens of Thousands of Business Email Users Across its Microsoft and Zimbra Platforms

Las Vegas, NV – 18 April 2018 –RPost, a leader in email cybersecurity software services, and MindCentric, one of the largest Zimbra and Microsoft business email hosting providers in the United States, announce one of the largest instant business email encryption deployments at Channel Partners Conference (Learn more at RPost booth #3079).

“RPost made it easy to turn on its RMail secure messaging services for all of our business customers. Simple and elegant; as RMail provides users one uniform experience across all of the main email platforms, whether our customers are using Zimbra, Microsoft Outlook, Microsoft Exchange/Office365, or some combination,” states John Ewart, Partner of MindCentric. “Our customers enjoy all of the new security benefits as well as all of the RMail productivity tools, all-in-one, one click away.” In phase one, MindCentric deployed RMail to more than 50,000 users with a free-to-premium service arrangement permitting all users a cost-effective way to use RMail services at their desired level.

RMail® adds a suite of security, compliance and productivity tools into the Microsoft Outlook and Zimbra user interface, providing senders with simple-to-use email open tracking, Registered Email™ certified e-delivery proof, compliant email encryption, electronic signatures, secure large file transfers, auditable proof of compliance, email imposter protection, and more. Powered by patented Registered Email™ technology, RMail returns a Registered Receipt™ record for every message sent, providing and proving important e-delivery details and data privacy compliance.

Users that install RMail are auto-enrolled with a base service plan for RSign.

“We are excited to provide both RMail and RSign to our customers. RMail secures, tracks and certifies proof of delivery of email content and attachments. RSign is a document management and e-signature platform,” adds John Ewart at MindCentric. “Both are so simple to use and provide more advanced features than their competitors which we evaluated. And, it’s a lower cost. It’s a real win, win for everyone.”

RSign® is a simple to use, full featured, web-based e-signature service that makes it easy for signers to complete and sign documents electronically using any web browser, in an intuitive, self-guided signing process. RSign includes reminders & notification automation and rules, real-time delivery and signoff audit trail and history, as well as encryption, templates, advanced form features, signer authentication, and more.

“MindCentric took the right approach. Make RMail available for all users. Once users ‘Send RMail’ for the first time, they are thrilled to see all of the new business tools MindCentric has brought to them, helping them do more, faster, from inside their current email interface,” adds Zafar Khan, CEO of RPost. “RMail simply makes Microsoft and Zimbra email better for business.”

About RPost: RPost is a leading cyber security company providing email security, compliance, and productivity services to more than 25 million users worldwide over more than a decade. RPost has set the global standard for secure and certified electronic communications, with more than 50 patents granted on its core Registered Email™ technologies, used to track and prove email delivery, encrypt email, protect from imposter email, secure large file transfers, and manage e-signature transactions. Recipient of the World Mail Award for Best in Security, Best Innovation in IT Award in Germany, and voted Top Choice for GDPR Email Data Privacy Compliance in Europe, RPost services are in use in nearly every country in the world, within Global Fortune 500 companies, and endorsed by the most influential industry associations including The Florida Bar. https://www.rpost.com/

About MindCentric: MindCentric has partnered with businesses that require sophisticated, high-touch managed hosting since 1999. With thousands of clients in production today, MindCentric clients enjoy many cloud-based services such as: Cloud Hosting, Managed Services, Managed Security, Compliance, Disaster Recovery, Virtual Desktop, Hosted Email, Cloud Storage/Drive, Cloud Consulting, and Hybrid Services and Support with AWS and Azure.  http://www.mindcentric.com

 

RMail Awarded “Best IT Innovation in Germany 2018”

RPost’s RMail® product has been awarded the prestigious Initiative Mittelstand “Best Innovation in IT 2018” award. Initiative Mittelstand identifies the top IT solutions best suited for small and mid-sized companies in the German market. Initiative Mittelstand announces its winners specifically to educate attendees at CEBIT, the largest worldwide technology trade show held annually in Hannover, Germany.

The RMail product won this “Best of 2018” IT innovation award through its German partner, Frama Deutschland GmbH, a subsidiary of Frama AG, one of RPost’s premier pan-European technology distributors. Frama Deutschland GmbH offers RMail services in the German market. Review award certificate.

It’s a World of Soundbites. Will email adapt? The NFL has.

Today’s NFL coaches are concerned that the new players being drafted are millennials and they will need to be treated differently – they report that football playmaking classroom training sessions need to be limited to 30 minutes, with breaks for the athletes to check their phones, text messages, and social media feeds.

In the elevator, at lunch, or even crossing busy streets, people today scroll the headlines on their phone news feeds (whether it is Apple News, their Twitter, Facebook, Instagram, text messages, email headlines, or other messaging feeds).

“There is so much short content, constantly changing throughout the day, people either don’t have the time to get into the details, the substance, or don’t have the interest in knowing the details,” adds Jake Finnell, vice president at RPost.

Fake News is an offshoot of “soundbite” analysis. “Soundbite” analysis is one’s read of the headlines and at best, first couple sentences, considering themselves an expert on the topic, and re-posting in some manner with their short commentary or passionate remarks of like or dislike. Today, thoughtful “news” articles are often politicized or opinionated essays put forth with a “newsy” look aimed to get more clicks/reads (to increase advertising revenue potential).

PR has evolved. In the past, one would nurture relationships with reporters at large publications in an attempt to get coverage of a story. It could take a month to formulate the positioning, outreach, telephone pitches; that at best might result in coverage in one publication. Great, if this is the Wall Street Journal perhaps, but a lot of work for a short article lifespan if it is one online blog headline that will be forever forgotten in the mass of online messaging and news flashes, within hours. How does one get their message to stand out? Today, it is soundbites among a nurtured micro-network of parties via social media posts, and perhaps email news feeds.

Email has evolved. What happened to the emailed newsletter? They are still being sent… but you are not reading them.

Emailed newsletters just don’t get read. First, when people peruse their email on their mobile device, often the first lines they see if the newsletters are not well constructed are indications that the message is a marketing email template. Second, people need to be hooked with interesting content to want to read further. They are looking for the “sound bite”. And if not opened right away; if saved to read later, the sheer volume of daily inbound email will bury the newsletter into a morass of other messages.

Smart companies have adapted. No longer are they sending out offers in fancy HTML graphically enhanced templates (well, some do but you probably don’t notice as you skip these after seeing indicators that they are marketing messages in your preview pane or they may get put right into separate marketing folders), they send out what look like personalized email from what look like real people, with short lures to get you to read and engage.

You most likely have been flooded with these. They are arguably not “spam” as they are positioned as one-to-one emails… but they really are spam (disguised). Email marketing automation systems (when used to the fullest) send email from the same sender name, with subject and email body content that appear to be personalized messages. These are sent in sequence over time so the recipient starts to recognize the sender name and believe they know the person and should open the message. The content seems to be personal with different short pleading messages asking you for the courtesy of your feedback. But don’t feel bad not responding. These are not painstakingly written by the sender with you specifically in mind… these are written by professionals in a series all at once and loaded into a system to drip out to you (and thousands of others that have a similar professional profile) over time, automatically. How did they find you? They purchase huge lists of contacts to “personally” reach out to you “unsolicited”. This is today’s version of spam.

It works. Email with soundbites; from recognizable senders. Emails sent in a series, written to engage.

When you are considering promotion of your company or products, consider evolving from traditional PR newswires and template email newsletters. Consider how your audience will see your material, where they will read it and when, and how short it will remain in their view.

We have written “Tech Essentials” as an email in plain text, big font, without any fancy graphical banners. We trust you find this a more useful way to read insightful information on tech trends and tips.

RPost, a leading cybersecurity company, has opted to evolve its traditional periodic newsletter into a one-topic news feed sent by email to its followers; sort of like a “tweet” but sent by email; targeting all of those pre-millennials that don’t use Twitter. (Of course, for the millennials and newly drafted NFL players, they replicate and send additionally by Twitter, Facebook and LinkedIn).

If you would like to follow RPost news feeds, (or if you are a millennial and want to follow us on social media), click here to follow and opt-in.