Virtru Blog

Insider Threat Detection in Government Cyber Security

Insider threats are one of the biggest data security challenges faced by government agencies. The sheer complexity of government IT infrastructure and the value of the information governments process make it easy for a clumsy (or malicious) insider to compromise security (and increase the damage that insider can do). Insider threat detection in government cyber […]

August 26, 2016 | Security
Virtru Just Got Easier for Recipients – Add Encrypted Attachments to Your Replies

We created Virtru to make it easy to keep your private information private.  When it comes to email, that means making it easy and convenient for both senders and recipients. And now, we’ve made Virtru even easier for recipients. Virtru recipients can now reply back to senders with their own encrypted attachments – without having […]

August 19, 2016 | Virtru
Google Apps Security for the Mobile Workforce

Mobile devices are at risk of theft, hacking, snooping and insider cyber security threats. All it takes is one worker misplacing an unsecured phone or clicking on the wrong link to give hackers the power to leak or sabotage your data, send out fraudulent messages to partners and clients or even hold mission-critical information hostage. […]

August 18, 2016 | Business, Google Apps Security
How to Watermark a PDF

A PDF watermark is an image or line of text digitally “stamped” on a PDF — usually on top (or behind) the primary content. Once added, PDF watermarks traditionally remain part of future copies of the file, unless they’re removed. Virtru’s PDF Watermark works differently, and serves a different purpose: the watermark contains the recipient’s […]

August 11, 2016 | Business, Security
What is the Most Secure Google Drive Encryption Service?

Using any cloud app that stores sensitive information has certain inherent risks. Google has native encryption and an excellent security record, but adding additional encryption layers to prevent a single point of failure is a good idea with any cloud service. Fortunately, there are third-party encrypted cloud storage apps that will enhance Google Drive encryption […]

How to Protect Intellectual Property With a PDF Watermark

Standard PDF watermarks can be used to signify ownership, caution users against disclosure, certify document reviews and revisions and provide an easy way to brand company materials for external use. By clicking Tools > Edit PDF > Watermark > Add in Adobe Acrobat, you can put a watermark on a PDF, and configure size, orientation […]

August 3, 2016 | Email Encryption
Your New Virtru Features

Easy-to-use data security is our mission at Virtru, which is why we’re excited to share some of our new capabilities to help you protect and control your information more effectively: Coming Soon: Encrypted Search Coming next month, Virtru users will be able to search and find their encrypted content without weakening data protections or exposing […]

July 29, 2016 | Email Encryption, Virtru
Why Email Encryption is a Realtor’s Best Friend

From the largest real estate firms to private owner/sellers, realtors face a range of cyber security threats. Data breaches in the United States cost an average of $213 per record — the highest in the world — and that doesn’t count customer churn, reputation damage, notification and other ancillary costs (and other types of security […]

July 27, 2016 | CFPB
How to Get the Most Out of Your Encrypted Email Service

Email encryption keeps private messages private. Third parties can intercept and read unencrypted emails as they travel from sender to recipient. An encrypted email service scrambles them using a special password called the key, making them unreadable to hackers and cyber spies. But just as locking your door won’t stop a thief from getting in […]

July 25, 2016 | Email Encryption
The Encrypted Cloud: A Guide to Government Cyber Security

The government is subject to strict security standards that should keep data safe. Health departments must abide by HIPAA best practices, and criminal justice departments are subject to even stricter CJIS compliance and data encryption rules requiring weekly audits and precisely defined controls, down to the required length for passwords. And yet, government cyber security […]

July 21, 2016 | Security