20 May 2019

Folklore of Opportunistic Privacy

There is a wide body of people that believe they are sending information private because they are sending using Microsoft Office 365, Gmail, or using a third-party service that sends all messages using transmission layer security. And they may be right; if secure sometimes is good enough. There is the notion of “opportunistic privacy” also referred to as “opportunistic TLS”, which sounds pretty cool. It certainly sounds secure. But... Read more...

13 May 2019

Pig Latin, Russian Spies and Email Encryption

With the recent media focus on cybersecurity, whether it is talk of Russian hackers scheming to influence US presidential elections, or the pervasive pressure to comply with GDPR or HIPAA (healthcare privacy regulations) or other consumer data privacy requirements, “encryption” is one of the solutions that is often introduced. When sending email, email encryption can indeed protect your strategic dialog from potential exposure, and its mere use... Read more...

06 May 2019

Vacationing in the Bahamas? Leave Your Laptop at Home

The constitution provide certain privacy rights. Attorneys and their clients generally enjoy extra protections on privacy with “privileged” correspondence. But what happens if the information is inadvertently exposed? There are all sorts of pitfalls that can expose your sensitive information. Here are some shocking ones. File sharing services can cause waiver of attorney-client privilege if files are not send with an encrypted link.... Read more...

29 Apr 2019

Caution. What You Might Find When Posting Your DNA Online

More than one in twenty Americans have voluntarily submitted their genetic code – the map of who they are personally and physically – to an Internet company. Most people were lured by cute TV ads creating curiosity about heritage. Your DNA is a genetic code defining your traits. Without boring you on the biological aspects of this, the DNA submission may unknowingly and irrefutably connect you to relatives (newfound siblings, parents, etc.) that... Read more...

15 Apr 2019

Today’s Hackers Target Executives with Simple Social Engineering

Today’s hackers are more innovative. Rather than just running up charges on your credit card, they are looking to extort money in exchange for return of your private information or to limit their use of it. For insurance executives, private information often includes emails related to customers and their policies. Data could include confidential information about assets, employees, vendor contracts and bank accounts. These more innovative hackers... Read more...

08 Apr 2019

Google AMP Ends Email as a Record of Who Said What When

Wow! It is strange that one still trusts a printed or PDF’d email as a record of who said what when. Microsoft did its best to make it clear that any email can be easily altered, with a few mouse clicks. For those unaware, try this in Microsoft Outlook: open an email, click Actions, click Edit Message, change the message, save, close, open again, and magic – your email content has forever changed without detection! Watch video You can also... Read more...

20 Mar 2019

Fake Facebook and Email

Wow! What a beautiful vacation that friend of a friend posted in their Facebook account. It looks like the perfect family vacation; all smiles, all sun, some commentary about the perfect spot… Is the perfect life of your friends’ friend depressing you? How could their experiences be so perfect, while when you go on vacation, you are hit with reality; some rain, crowded hotels, delayed flights, travel stress, kids complaining… Well,... Read more...

07 Dec 2018

Not All TLS is Created Equal

Security Image

Many, many software service sales professionals throw around security phrases to make cyber security sound simple. Today, as technologies advance and threats get ever more sophisticated, encrypting email for privacy compliance is not getting simpler. The devil (hacker) is in the details. Here, we will try to (in a simple manner) decipher a commonly referred to catch all for security, TLS, and explain why the details are important. “Not all TLS is... Read more...

Security Image
30 Nov 2018

Your Spit is Your Real Government ID

DNA Card

The DHS is using Congress’ “Real ID” Act of 2005 to require all US states to issue new, more robust IDs for air travel originating in the United States (source). Has the DHS missed the real opportunity, to consider today’s state of technology? There are already millions upon millions of dollars being spent to upgrade every citizen’s driver’s license to a “Real ID”. Why not, in the same process, associate each one’s retina scan, fingerprint,... Read more...

DNA Card
16 Nov 2018

Email Security Beyond the Soundbite

The ubiquity of smart phones and their apps have reduced the attention span for the masses. People now expect their information in big fonts, nice colors, and pretty pictures. In the tech world, while many services have features that are now described in simple sound bites, it is often the details that make one product work for a customer need; or work better than similar sounding alternatives. And, with heightened awareness of email security needs,... Read more...