Encryption Security

Understanding HIPAA: Enforcement, Encryption, and Documentation

May 16, 2016 / in Blog / by Zafar Khan, RPost CEO

Email encryption is one of the strongest defenses that an organization can implement against data breaches brought on by the improper disclosure or distribution of medical records or protected health information (PHI). But without written policies and procedures governing the use of encryption services, these efforts mean next to nothing in the eyes of HIPAA […]

Hashed but Not Salted

May 20, 2016 / in Blog / by Zafar Khan, RPost CEO

You may remember the 2012 LinkedIn data breach, in which 6.5 million LinkedIn user accounts were believed to have been compromised. According to BBC and LinkedIn itself, the number of affected LinkedIn users from that 2012 data breach could actually be upwards of 100 million, or the majority of the 165 million users LinkedIn had in 2012.

RMail Equips RIAs with Tools to Manage Email Security and Compliance

June 13, 2016 / in Blog / by Zafar Khan, RPost CEO

RPost has launched an educational campaign to ensure that registered investment advisors (RIA’s) can securely communicate with clients and comply with rules enforced by auditors and regulatory organizations.

Online Ads Provide Hacker Entry Point

June 23, 2016 / in Blog / by Zafar Khan, RPost CEO

In the recent Tech Essentials article “Changing Trends in Cyber Security,” we highlighted how hackers are becoming more innovative in their ability to use generally available social media (i.e. LinkedIn recruiter tools) and other business applications to target email recipients with imposter email and lure them into wiring money to hackers.

How to Send Large Files by Email

June 30, 2016 / in Blog / by Zafar Khan, RPost CEO

You may have noticed that when you send a large file attachment by email, it sometimes gets kicked back to you undelivered with an error message that says something like: “The attachment size exceeds the allowable limit.” But what are these limits? And how can you securely send a large file attachment when it’s too […]

Will Biometric Data Replace Passwords?

July 07, 2016 / in Blog / by Zafar Khan, RPost CEO

Many companies are continually struggling to protect customer data from hackers, thieves and other cybersecurity threats. Some firms have begun using biometric data in place of passwords. For example, many banks now allow customers to use fingerprint or iris identification to access bank accounts from mobile devices. This includes Bank of America, JP Morgan Chase […]

Millions Give Up Personal Privacy and Even Safety To “Catch Them All”

July 14, 2016 / in Blog / by Zafar Khan, RPost CEO

If you see grown men and women staring at their phones as they walk into police stations, churches or the backyards of strangers, you could be witness to the latest video gaming phenomenon to take the world by storm.

DNC Leak: Russian Hackers or Inside Job?

July 26, 2016 / in Blog / by Zafar Khan, RPost CEO

…and does it change the result? Who is responsible for the recent Democratic National Committee (“DNC”) hack and resulting emails published on WikiLeaks? Russian hackers are suspected and the FBI is investigating, but Russia adamantly denies involvement. The hackers could be from the same group who stole DNC’s oppositional research about Republican Presidential nominee Donald Trump in […]

Preventing An “Assange October Surprise”

August 11, 2016 / in Blog / by Zafar Khan, RPost CEO

Does your news feed closely resemble the plot of a Russian spy novel? It certainly might if you’ve been following the recent drama and mudslinging between the Democrats, the Russian government, the FBI, and the CIA, following the public release of private DNC emails. And that’s before the warnings of an “October Surprise” promised by […]

Shadow Brokers Release NSA Hacking Tools to The Public

August 18, 2016 / in Blog / by Zafar Khan, RPost CEO

A hacking group called Shadow Brokers has reportedly stolen powerful hacking tools from the Equation Group, a hacking group believed to be NSA-backed and responsible for many of the largest state-level hacks in history. On Saturday, Shadow Brokers released a subset of these tools to the public, which several former employees of the NSA’s hacking division, known as […]