Echoworx Blog

Compliance

New Streamlined Ways of Authenticating People Quickly Proving Their Value

New Streamlined Ways of Authenticating People Quickly Proving Their Value

There is no one-size-fits-all approach to authenticating an individual’s identity. Today, the user is driving what authentication solutions should look like.  How do you confirm that people requesting access to…

Read More

Who Controls Your Encryption?

Who Controls Your Encryption?

Security controls how our property is used, who has access to it and what keeps it safe. But what happens to this secure sense of control when property and data…

Read More

Shadow IT: The Danger of Open Tech Stacks in Banking

Shadow IT: The Danger of Open Tech Stacks in Banking

Banking, financial services and insurance companies are in danger—and this danger is lurking at employees’ fingertips. Employees, clients and vendors are wooed daily by unvetted third-party apps that promise to…

Read More

CCPA vs GDPR: What’s the Difference?

CCPA vs GDPR: What’s the Difference?

In 2018, the business world shuddered as the General Data Protection Regulation (GDPR) came into full force. More shuddering is expected shortly with the California Consumer Privacy Act (CCPA) going…

Read More

Uniform or Patchwork Privacy Laws? How Your Bank Can Mitigate Cyber Risk

Uniform or Patchwork Privacy Laws? How Your Bank Can Mitigate Cyber Risk

As more state privacy laws come into effect in the US, navigating privacy, data residency and jurisdictional requirements is more complicated than ever for banks and financial institutions with national…

Read More

California’s CCPA – What Banks Need to Know

California’s CCPA – What Banks Need to Know

The California Consumer Privacy Act (CCPA) goes into effect on January 1, 2020 and enforcement measures are scheduled to start six months later. Banks that do business with the state…

Read More

Secure Message Encryption for Large Healthcare Networks

Secure Message Encryption for Large Healthcare Networks

18 per cent of all cybersecurity breaches happen in healthcare. And internal actors—including employees, former employees, contractors and business associates—are the cause for 59 per cent of the breaches in…

Read More

Facing the Fax: Why Healthcare is Still Offline

Facing the Fax: Why Healthcare is Still Offline

Since the business world entered Industry 4.0, organizations have scrambled to digitize physical assets and integrate them into digital ecosystems. Even though electronic healthcare records are becoming increasingly common, there…

Read More

Keeping Electronic Health Records Safe in Transit

Keeping Electronic Health Records Safe in Transit

Electronic health records aren’t stationary documents that remain protected behind a single wall of defence. They travel between healthcare organizations and third-party business associates frequently and each journey carries the…

Read More

Stay Updated With the Latest Encryption & Security Trends

Sign up to get our latest articles sent directly to your inbox.

Your email will not be shared with any 3rd party. See our Privacy Policy.