How to Encrypt Your Email
And Send Secure End-to-End Encrypted Messages
Every day, we are creating and sharing data at an astounding rate. With each email, text, tweet, tap and stream, more data is available for companies to collect and use, and without sufficient protections, for hackers to exploit. The collective sum of global data is predicted to grow from 33 zettabytes (33 trillion gigabytes) in …. Read More
Every incident response plan should be written and approved at the highest level in the organization. Incident response planning is not strictly an IT issue; a business’s data is as important to the capital value and revenue potential of the company as its physical offices or manufacturing facilities, and often more so. Categorize stakeholders as …. Read More
After weeks of criticism over its inflated encryption claims, videoconferencing platform Zoom announced in early April that it would develop full end-to-end encryption for video and audio calls made through the service. At the end of May, though, the company said that this protection would only be available to paying customers—free accounts would be out …. Read More