Encryption Security

Modernize and Move From Fax to Encrypted Email

November 02, 2017 / in Blog / by Zafar Khan, RPost CEO

Should You Trust Your Fax? Habits are often hard to break. Some professional offices, particularly in the health care sector, when there is a need to send something private, send by fax. Their belief is, if they send by fax, the transmission is secure and private (HIPAA compliant).

The Best Way to Encrypt Your Email Which has Information Sensitive to the Highest Degree

November 30, 2017 / in Blog / by Zafar Khan, RPost CEO

Foreign Journalists Discover Treasure in Bermuda As enchanting as the Bermuda sea is, during rough weather, Bermuda’s beguiling reefs have been the source of many lost ships over the past hundreds of years during trans-Atlantic journeys shipping treasures and taxes from the Americas to Europe. However, no one could have anticipated the rough waves that […]

Install the Simplest to Use Security Tool, RMail, with its Email Encryption

January 08, 2018 / in Blog / by Zafar Khan, RPost CEO

James Bond Enters Cyber Security Enter 2018. A new generation of cyber security risks bear names that make it sound like they were implanted by James Bond villains (“Spectre”), with worldwide doomsday impact (“Meltdown”), coupled with anti-virus programs used for international espionage (Kapersky Labs allegations).

Anti-Whaling Detection Service, That Runs Inside Microsoft Outlook

November 12, 2018 / in Blog / by Zafar Khan, RPost CEO

Whaling is Flourishing, A $5 Billion Hacker Lottery Harpooning whales is (in most of the world) a thing of the past. This is good for the kind-hearted. But in the cyber world, harpooning “whales” is a thriving and fantastically profitable criminal profession.

Email Encryption with Proof of Encrypted Delivery

November 16, 2018 / in Blog / by Zafar Khan, RPost CEO

Email Security Beyond the Soundbite The ubiquity of smart phones and their apps have reduced the attention span for the masses. People now expect their information in big fonts, nice colors, and pretty pictures.

Email Encryption that Suits your Content Needs

November 30, 2018 / in Blog / by Zafar Khan, RPost CEO

Your Spit Is Your Real Government ID The DHS is using Congress’ “Real ID” Act of 2005 to require all US states to issue new, more robust IDs for air travel originating in the United States.

How to Make Email Life Easier for Business People

December 07, 2018 / in Blog / by Zafar Khan, RPost CEO

Not All TLS is Created Equal Many, many software service sales professionals throw around security phrases to make cyber security sound simple. Today, as technologies advance and threats get ever more sophisticated, encrypting email for privacy compliance is not getting simpler. The devil (hacker) is in the details.

Best Way to Avoid Ransomware Attack on Your Email Communication

April 15, 2019 / in Blog / by Zafar Khan, RPost CEO

Today’s Hackers Target Executives with Simple Social Engineering Today’s hackers are more innovative. Rather than just running up charges on your credit card, they are looking to extort money in exchange for return of your private information or to limit their use of it. For insurance executives, private information often includes emails related to customers […]

Protect Personal Privacy Through Email Encryption

April 29, 2019 / in Blog / by Zafar Khan, RPost CEO

Caution. What You Might Find When Posting Your DNA Online More than one in twenty Americans have voluntarily submitted their genetic code – the map of who they are personally and physically – to an Internet company. Most people were lured by cute TV ads creating curiosity about heritage.

How to Send Large Files Right From Microsoft Outlook With Encrypted Links, for Extra Protection

May 06, 2019 / in Blog / by Zafar Khan, RPost CEO

Vacationing in The Bahamas? Leave Your Laptop at Home The constitution provides certain privacy rights. Attorneys and their clients generally enjoy extra protections on privacy with “privileged” correspondence. But what happens if the information is inadvertently exposed? There are all sorts of pitfalls that can expose your sensitive information. Here are some shocking ones.