Echoworx Blog

Customer Experience

Is TLS good enough for secure email?

Is TLS good enough for secure email?

When it comes to collecting sensitive customer data, you simply cannot afford to take any chances. But, while protecting your digital perimeter is important, your organization also needs to ensure…

Read More

Encryption Shouldn’t Be Cryptic!

Encryption Shouldn’t Be Cryptic!

Encryption, encryption and more encryption – the security buzz word on the tip of everyone’s tongue. The more interesting topic is what’s sitting on top of that core technology. Making…

Read More

Moving Your PGP to the Cloud? Here’s What You Need to Know

Moving Your PGP to the Cloud? Here’s What You Need to Know

Moving your PGP email encryption to the cloud may sound daunting, but, with the right tools and services, it is an investment to consider for your business and your customers.…

Read More

One Hot Mess: Encryption, Dating and the Betterment of Privacy Protection

One Hot Mess: Encryption, Dating and the Betterment of Privacy Protection

Would you feel comfortable sending personal information over email without encryption? Feel shy answering ‘Yes?’ You’re not alone. In fact, nearly 50 per cent of people choose to share sensitive…

Read More

Method-Agnostic Encryption Delivery

Method-Agnostic Encryption Delivery

Encryption until very recently was considered as a niche market with an inconsequential prospect to emerge as a global industry. There was a time when small and medium-sized data security…

Read More

If You’re Not the Customer, You’re the Product

If You’re Not the Customer, You’re the Product

We had the chance to speak with security and privacy expert Bruce Schneier on mass surveillance and the hidden battles happening behind the scenes to collect our data  …  all…

Read More

Healthcare Security in Critical Condition

Healthcare Security in Critical Condition

Are healthcare organizations more vulnerable to data breaches than other industries? Healthcare organizations (69 percent) and their third-party business associate (BA) partners (63 percent) certainly seem to feel they have…

Read More

What Role Does Privacy Play in Your Digital Transformation Strategy?

What Role Does Privacy Play in Your Digital Transformation Strategy?

As customer interaction with organizations becomes more digital, the risk of sensitive information ending up in the wrong hands has dramatically increased. If you are a senior leader in an…

Read More

How to Protect Company Email From Attacks

How to Protect Company Email From Attacks

Email is one of the most common ways attackers use to infiltrate an organization’s systems and gain access to sensitive data. Email is built into smart phones, tablets, gaming devices…

Read More

Stay Updated With the Latest Encryption & Security Trends

Sign up to get our latest articles sent directly to your inbox.

Your email will not be shared with any 3rd party. See our Privacy Policy.