<img src="https://ad.doubleclick.net/ddm/activity/src=11631230;type=pagevw0;cat=pw_allpg;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ord=1;num=1?" width="1" height="1" alt="">
Encrypted Email - Why More People Aren't Encrypting

Why Aren’t More People Using Encrypted Email?

Between the growing threats of email hacking and government surveillance, people are growing more concerned about the privacy of their inboxes, and the use of

Private Email: 5 Tips for Keeping Your Email Secure

Private Email: 5 Tips for Keeping Your Email Secure

Despite the fact that many of us can’t function without checking our email on a regular basis, we often take the privacy and security of our inboxes for granted. But if there’s one thing we learned from the Sony Pictures hack, it’s that email is a prime target for hackers and data thieves — and ...

Encryption 101: How it Works & Who Gets Your Data

Encryption 101: How it Works & Who Gets Your Data

At one time, encryption was used only by governments, militaries and others who trade in highly secret materials. But as Dylan says, the times, they are changing. Encryption is rapidly becoming a standard feature of the tools you use every ...

Going Dark: Why Encryption Shouldn’t Require a Back Door - Virtru

Going Dark: Why Encryption Shouldn’t Require a Back Door

In October, FBI Director James Comey gave a speech arguing that “going dark” — that is, implementing encryption on platforms like Android and iOS — is a ...

Healthcare Data Security - The 5 Biggest Challenges Today

The 5 Biggest Challenges Facing Healthcare Data Security Today

Healthcare has changed tremendously in the past few years, and the progress that’s being made seems straight from the pages of a sci-fi novel. For instance, the Human Genome Project finished mapping out human DNA just over a decade ago, and now individuals can perform affordable

What is CJIS Compliance? Here's What You Need to Know

CJIS Compliance and Data Encryption — Here’s What You Need to Know

Each day, criminal justice and law enforcement agencies on the local, state and federal levels access the Criminal Justice Information Services (CJIS) databases for information necessary to catch lawbreakers, perform background checks and track criminal activity. Obviously, it’s important that ...

Think Before You Send: 5 Steps to Secure Email

Think Before You Send: 5 Steps to Secure Email

Your information is valuable. The messages, attachments, and pictures you send over email contain information you wouldn’t want shared with the general public. You might not be hiding diabolical secrets, but everyone has a private life.

[Infographic] Who Cares About Email Privacy?

Infographic: Who cares about email privacy? Everyone.