Echoworx Blog

X-Archived

Insider Cyber Threats? Closer to Home than You Think!

Insider Cyber Threats? Closer to Home than You Think!

For enterprise-level organizations, it’s no longer enough to protect data and systems from nefarious external agents. Organizations must also implement defensive measures to protect themselves from something much closer to…

Read More

Got Danish Data? Email Encryption is Now Mandatory in Denmark

Got Danish Data? Email Encryption is Now Mandatory in Denmark

To encrypt or not to encrypt: that is no longer the question in Denmark – where new interpretations of the General Data Protection Regulation (GDPR) are making encryption history. As…

Read More

Can Cybersecurity Be a Competitive Edge?

Can Cybersecurity Be a Competitive Edge?

In the old days, before organizations became customer-obsessed and held off-site leadership events to drill down on their value proposition, information security was simple. There was the CIO and a…

Read More

Inbound Encryption: The Why and How

Inbound Encryption: The Why and How

While your organization has systems in place to encrypt outgoing emails, what happens when you receive an email that contains sensitive information? If it’s not already encrypted, do you refuse…

Read More

How do I choose the right encryption method?

How do I choose the right encryption method?

Encryption is an important part of any serious proactive cybersecurity plan. You need it. Your customers demand it. And regulators applaud it. But one does not simply ‘encrypt.’ In fact,…

Read More

Generation Z, Personal Data and Digital Trust: Unlike Any Before

Generation Z, Personal Data and Digital Trust: Unlike Any Before

Solve this riddle: I am always connected – but avoid social situations. I demonstrate a firm attention to detail – but have the attention span of a goldfish. I freely…

Read More

New Year? New Information Security Challenges!

New Year? New Information Security Challenges!

The unfortunate reality of the world of information security is that new threats, new scams and new malicious actors to worry about seem to pop up every day. As we…

Read More

Accelerating Your Customer Onboarding Through Digital Adoption

Accelerating Your Customer Onboarding Through Digital Adoption

With so many digital choices to choose from, traditional client onboarding, which can take weeks, even months to complete is certainly a poor customer experience. Many processes are still manual,…

Read More

Trouble in Oz: Australia’s New Controversial Data Backdoors

Trouble in Oz: Australia’s New Controversial Data Backdoors

Dangerous privacy precedents are now being set in Australia – a nation traditionally known for its dedication to Commonwealth democratic stability. As of December 2018, Australia has newly-minted legislature under…

Read More

Stay Updated With the Latest Encryption & Security Trends

Sign up to get our latest articles sent directly to your inbox.

Your email will not be shared with any 3rd party. See our Privacy Policy.