Echoworx Blog

Data Security: Boon or Bane?

Data Security: Boon or Bane?

Businesses today are increasingly, if not totally, dependent on digital communications.  But our race to embrace technology has a price: increased exposure to security threats. Viewing personal documents without permission…

Read More

Making it Easier to Secure Office 365, From Anywhere

Making it Easier to Secure Office 365, From Anywhere

We’re excited to announce the full integration of Echoworx Encryption for Office 365 Users! For years, Echoworx customers have been trusting the Echoworx Encrypt button in Microsoft Outlook on the desktop…

Read More

A Welcome Reset for Citizen Privacy

A Welcome Reset for Citizen Privacy

Canada’s Public Consultation on National Security The notion that we are being watched digitally has, seemingly overnight, become something many people now accept as a fact of life in the modern,…

Read More

Quantum Computers, End of Cybersecurity?

Quantum Computers, End of Cybersecurity?

Quantum computers have been making news over the last few years, particularly around how they can break encryption, but how serious is the threat and what is going to happen…

Read More

A Single Vulnerability is all a Cyber Criminal Needs

A Single Vulnerability is all a Cyber Criminal Needs

Millions of online transactions are done every day; billions of emails are sent every year. With the massive use of the internet, there is a significant amount of breach risk too.…

Read More

Ahead of the Market, Ahead of the Competition

Ahead of the Market, Ahead of the Competition

Echoworx has achieved its third consecutive year of more than 30 per cent growth, outperforming market predictions. “As a privately owned innovator at the forefront of the encryption industry we’re proud that Echoworx continues…

Read More

First the IP Bill, Then What?

First the IP Bill, Then What?

What is clear is that across the globe there is fast becoming a divide – governments vs. technology companies. In the face of democratic debate, against all the clamoring voices…

Read More

Unlocking Encryption Key Management

Unlocking Encryption Key Management

Any encrypted communication is only as secure as the keys used by the system that locked them. If the keys are compromised by hackers, negligence or other means, then any…

Read More

The Apple Hack: A Problem Engineered to Protect Us

The Apple Hack: A Problem Engineered to Protect Us

The FBI got around ordering Apple to cooperate in breaking its own security, but when the next case arises, and it will, should the company refuse to help, the outcome…

Read More

Stay Updated With the Latest Encryption & Security Trends

Sign up to get our latest articles sent directly to your inbox.

Your email will not be shared with any 3rd party. See our Privacy Policy.