Category Archive for "Secure communications"

roles_legal_icon

Cirius Aids Those Who Protect and Serve

Consider these scenarios: A drug dealer escapes with evidence while police wait for a paper warrant. To make a swift arrest, detectives need crime scene images from forensics experts in the field.  Military troops document critical intelligence but cannot securely

Read More
alt=""

Google Apps For Work and Secure Messaging – A Great Match for (Regulated) Businesses

As more and more businesses move to Google Apps for Work to support their business communications, email security is playing an increasingly important role. According to a recent Bitglass report, Google’s enterprise base is up to 22.8 percent from 16.3

Read More
alt=""

The Importance of a Holistic Approach to Secure Messaging

When it comes to business email security, human error is one of the chief causes of data loss. The reality is that people make mistakes. In some cases human error happens when employees don’t effectively use the company’s security tools

Read More
alt=""

5 Ways Secure Messaging is Different than Standard Email Encryption

Email encryption will likely always be part of any secure messaging tool, but email security technology for businesses has come a long way in the past decade. With all of its advancements, encryption alone is where the similarities between the

Read More
alt=""

Email Security Still the Achilles Heel of Business

If the recent Facebook privacy policy hoax – which filled news feeds everywhere with self-proclaimed privacy-protection notices – achieved anything, it was a message loud and clear that organizations need to take privacy and security extremely seriously. The loss of

Read More
alt=""

Email Encryption: What if You’re on the Receiving Side?

From a usability perspective, email security providers often spend a lot of time talking about the end-user experience as it relates to employee adoption. This makes sense because the employees of the organization that is purchasing the security product are

Read More
alt=""

Secure Health Information Exchange (HIE) Doesn’t Have to be Complicated

What are the options for individual physicians and doctors’ offices when it comes to securely sharing information electronically with other healthcare providers? It seems for many it’s not entirely clear what standards and technologies can be used to support and

Read More
Perception vs Reality

The Perceptions Versus the Reality of IT Security Threats

When it comes to IT security, perceptions don’t always match reality. Many businesses believe that the biggest IT security threats to data are those caused by malicious outside forces attacking the organization. While there’s no question that external threats are

Read More
encryption_and_DLP

Encryption and DLP’s Role in the Battle Against Business Email Fraud

While fraud and other scams are nothing new to businesses or consumers, the types and sophistication level of the scammers continue to evolve. In Tracy Kitten’s recent article on BankInfoSecurity.com, she discusses the upsurge in fraud connected to “business email

Read More
alt=""

Keeping Patient Information Secure in the IoT Era

About 26 billion devices are expected to make up the Internet of Things (IoT) by 2020 and 40% of the IoT market will be related to healthcare according to Gartner Research. This shouldn’t come as a surprise given that healthcare is as

Read More