Echoworx Blog

California’s CCPA – What Banks Need to Know

California’s CCPA – What Banks Need to Know

The California Consumer Privacy Act (CCPA) goes into effect on January 1, 2020 and enforcement measures are scheduled to start six months later. Banks that do business with the state…

Read More

How to Expand Your Tech Stack Responsibly

How to Expand Your Tech Stack Responsibly

While the benefits of moving to the cloud are real, it’s essential to expand your tech stack responsibly—and that starts with security. Contemporary security considerations for enterprise-level organizations: Sensitive data…

Read More

Secure Message Encryption for Large Healthcare Networks

Secure Message Encryption for Large Healthcare Networks

18 per cent of all cybersecurity breaches happen in healthcare. And internal actors—including employees, former employees, contractors and business associates—are the cause for 59 per cent of the breaches in…

Read More

Maintaining Control Over Sensitive Communications in Healthcare

Maintaining Control Over Sensitive Communications in Healthcare

The healthcare industry is becoming increasingly digital – from its adoption of Electronic Health Record (EHR) technology to various online medical appointment booking and prescription systems. And, since healthcare organizations…

Read More

Mum’s the Word: Encryption for Group Collaboration

Mum’s the Word: Encryption for Group Collaboration

The digital world has opened the seas of technology and revolutionized the way in which we conduct business and serve customers. At the click of a mouse we may apply…

Read More

The Risks of Cloud Computing

The Risks of Cloud Computing

Cloud computing brings many benefits to enterprise-level organizations but it’s not risk-free. Here’s a quick primer of what cloud computing is, the risks involved and how organizations can minimize the…

Read More

A Lesson in Cybersecurity Simplicity from the Capital One Breach

A Lesson in Cybersecurity Simplicity from the Capital One Breach

The lesson from the recent Capital One data breach can be summed up with the KISS principle. Simplicity is hard to beat, even in cybersecurity. Let’s look at why this…

Read More

Integrating Cybersecurity with Business Strategy

Integrating Cybersecurity with Business Strategy

A common problem faced by a growing number of organizations is how to seamlessly integrate cybersecurity into their overall business strategy. As industry and commerce prepare for the next level…

Read More

Is Your Company Board of Directors On-Board with Cybersecurity?

Is Your Company Board of Directors On-Board with Cybersecurity?

Cybersecurity is no longer just an IT issue. Cybersecurity is no longer measured by who has a taller firewall. Cybersecurity is no longer an out-of-the-box one-size-fits-all installable solution. Instead, cybersecurity…

Read More

Stay Updated With the Latest Encryption & Security Trends

Sign up to get our latest articles sent directly to your inbox.

Your email will not be shared with any 3rd party. See our Privacy Policy.