Echoworx Blog

Still Selling ‘Risk Acceptance’ to Your Customers?

Still Selling ‘Risk Acceptance’ to Your Customers?

As organizations continue their digital migrations, the list of cyber-threats, risks and vulnerabilities grows exponentially. From a more connected workplace to new laws and regulations governing privacy and data protection,…

Read More

How to Ensure Only Intended Recipients Can Read Your Secure Message

How to Ensure Only Intended Recipients Can Read Your Secure Message

We’ve all done it: You hit ‘send’ on a message only to notice a mistyped email address. But what if the email contained sensitive information, like a bank statement? What if…

Read More

California’s CCPA – What Banks Need to Know

California’s CCPA – What Banks Need to Know

The California Consumer Privacy Act (CCPA) goes into effect on January 1, 2020 and enforcement measures are scheduled to start six months later. Banks that do business with the state…

Read More

How to Expand Your Tech Stack Responsibly

How to Expand Your Tech Stack Responsibly

While the benefits of moving to the cloud are real, it’s essential to expand your tech stack responsibly—and that starts with security. Contemporary security considerations for enterprise-level organizations: Sensitive data…

Read More

Secure Message Encryption for Large Healthcare Networks

Secure Message Encryption for Large Healthcare Networks

18 per cent of all cybersecurity breaches happen in healthcare. And internal actors—including employees, former employees, contractors and business associates—are the cause for 59 per cent of the breaches in…

Read More

Maintaining Control Over Sensitive Communications in Healthcare

Maintaining Control Over Sensitive Communications in Healthcare

The healthcare industry is becoming increasingly digital – from its adoption of Electronic Health Record (EHR) technology to various online medical appointment booking and prescription systems. And, since healthcare organizations…

Read More

Mum’s the Word: Encryption for Group Collaboration

Mum’s the Word: Encryption for Group Collaboration

The digital world has opened the seas of technology and revolutionized the way in which we conduct business and serve customers. At the click of a mouse we may apply…

Read More

The Risks of Cloud Computing

The Risks of Cloud Computing

Cloud computing brings many benefits to enterprise-level organizations but it’s not risk-free. Here’s a quick primer of what cloud computing is, the risks involved and how organizations can minimize the…

Read More

A Lesson in Cybersecurity Simplicity from the Capital One Breach

A Lesson in Cybersecurity Simplicity from the Capital One Breach

The lesson from the recent Capital One data breach can be summed up with the KISS principle. Simplicity is hard to beat, even in cybersecurity. Let’s look at why this…

Read More

Stay Updated With the Latest Encryption & Security Trends

Sign up to get our latest articles sent directly to your inbox.

Your email will not be shared with any 3rd party. See our Privacy Policy.