All service providers (such as lawyers, doctors, accountants, financial advisors, etc.) who believe their communications with clients are private — and in some situations, privileged — should take note. Conversely, all clients who believe their communications with trusted service providers are private should also take note.
Email encryption systems often advertise identical benefits, but there are some critical differences that you should understand before choosing a system. Below we outline three different methods: True Direct Delivery, Secure Store and Forward and Public Key Exchange. The best method for security and ease of use is the “True Direct Delivery” method employed in […]
From small startups to global enterprises, email is the single most critical application used by businesses and their employees today. According to a report by technology research firm Radicati Group, Inc., the number of worldwide email users reached 2.6 billion in 2015 and is expected grow to over 2.9 billion users by the end of 2019. From […]
Businesses cannot rely solely on cyber insurance policies to protect themselves and their clients from certain cybercrimes. In a recent case, Chubb Insurance refused to cover a cyber security loss of $480,000 despite the fact that Chubb had insured the victimized company for computer funds transfer fraud.
Have you, your staff, or a client ever sent an important email that the recipient claimed he or she did not receive? Over the next three weeks, Tech Essentials will explore common misconceptions about email delivery that will prepare you in case delivery of your (or a client’s) time-dependent email is disputed. Let’s get started […]
Most would agree that “who said what when” is at the centre of most disputes. In today’s email-centric world, many turn to their “Sent Folder” or “Inbox” to demonstrate who said what when. They may forward these emails to the people with whom they are in dispute, or may print the email to serve as […]
Most disputes center on who said what to whom and when. When an email gets lost without the sender being aware, the entire conversation or negotiation can derail, and there can be serious financial and/or reputational damage as a consequence.
In the final part of our three part series on common misconceptions about email delivery, we’ll discuss a type of system that many attorneys use and believe can prove fact of e-delivery.
In the past, for individuals and small businesses, cyber security was important to mitigate the inconvenience of spam, viruses that required restoring back-ups of corrupt files, and letters to credit bureaus to clear up identity theft issues.
Email security has been a hot topic as of late, with last week’s news of a supposed breach of 272 million email usernames and passwords and recent statements made by a hacker who claims to have accessed Hillary Clinton’s private email server two years before the private server’s existence was first reported by the New York Times. In the […]
May 30, 2025
May 23, 2025
May 16, 2025
May 09, 2025
May 01, 2025