Today, we’re starting a three-part blog series on the rising adoption of secure messaging (i.e. email encryption) by SMBs in healthcare. It’s an important topic for many of our customers that operate private medical and dental practices. Over the three
Have we finally reached the tipping point for encryption? High profile data breaches, sophisticated identity theft and the ongoing Snowden revelations has moved information security as a niche topic for some to a business priority for all. Earlier in the
AppRiver, one of our valued partners and an expert in security for SMB’s, got a fantastic mention in Tony Redmond’s recent Exchange Unwashed blog post: http://windowsitpro.com/blog/office-365-transitions-microsofts-own-message-encryption-technology. Redmond explores the uncertainty surrounding Microsoft’s encryption strategy for Office 365 and says this
In the past few weeks both the EU Commission and White House have come out with commentary and rules in response to the rise of cyber-attacks. There is growing awareness that cyber security is becoming a political and business necessity.
SMB Adoption of Secure Messaging in Healthcare Part 1: Why is the risk so high?
Today, we’re starting a three-part blog series on the rising adoption of secure messaging (i.e. email encryption) by SMBs in healthcare. It’s an important topic for many of our customers that operate private medical and dental practices. Over the three
2014: The Year of Encryption for SMB
Have we finally reached the tipping point for encryption? High profile data breaches, sophisticated identity theft and the ongoing Snowden revelations has moved information security as a niche topic for some to a business priority for all. Earlier in the
AppRiver’s Office 365 Encryption (powered by Cirius) Touted by Industry Expert
AppRiver, one of our valued partners and an expert in security for SMB’s, got a fantastic mention in Tony Redmond’s recent Exchange Unwashed blog post: http://windowsitpro.com/blog/office-365-transitions-microsofts-own-message-encryption-technology. Redmond explores the uncertainty surrounding Microsoft’s encryption strategy for Office 365 and says this
New Cyber Defense rules and policies ignore the reality: End users are lazy
In the past few weeks both the EU Commission and White House have come out with commentary and rules in response to the rise of cyber-attacks. There is growing awareness that cyber security is becoming a political and business necessity.