Echoworx Blog

How do I choose the right encryption method?

How do I choose the right encryption method?

Encryption is an important part of any serious proactive cybersecurity plan. You need it. Your customers demand it. And regulators applaud it. But one does not simply ‘encrypt.’ In fact,…

Read More

Generation Z, Personal Data and Digital Trust: Unlike Any Before

Generation Z, Personal Data and Digital Trust: Unlike Any Before

Solve this riddle: I am always connected – but avoid social situations. I demonstrate a firm attention to detail – but have the attention span of a goldfish. I freely…

Read More

New Year? New Information Security Challenges!

New Year? New Information Security Challenges!

The unfortunate reality of the world of information security is that new threats, new scams and new malicious actors to worry about seem to pop up every day. As we…

Read More

Accelerating Your Customer Onboarding Through Digital Adoption

Accelerating Your Customer Onboarding Through Digital Adoption

With so many digital choices to choose from, traditional client onboarding, which can take weeks, even months to complete is certainly a poor customer experience. Many processes are still manual,…

Read More

Trouble in Oz: Australia’s New Controversial Data Backdoors

Trouble in Oz: Australia’s New Controversial Data Backdoors

Dangerous privacy precedents are now being set in Australia – a nation traditionally known for its dedication to Commonwealth democratic stability. As of December 2018, Australia has newly-minted legislature under…

Read More

Security 101: A 2018 Thesaurus for InfoSec

Security 101: A 2018 Thesaurus for InfoSec

There is much emphasis being given to information security in today’s digitally connected ecosystem, and it truly is the need of the hour – below you can find answers to some…

Read More

Is TLS good enough for secure email?

Is TLS good enough for secure email?

When it comes to collecting sensitive customer data, you simply cannot afford to take any chances. But, while protecting your digital perimeter is important, your organization also needs to ensure…

Read More

Gaining Digital Trust in a World Turned Upside Down

Gaining Digital Trust in a World Turned Upside Down

When it comes to gaining digital trust, traditional approaches can go topsy-turvy in a hurry. Gaining a customer’s trust is a reward earned only after many years of careful branding,…

Read More

Are You Prepared for Canada’s Mandatory Breach Reporting Law?

Are You Prepared for Canada’s Mandatory Breach Reporting Law?

With the introduction of new rules under Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA), saying sorry for a data breach is no longer good enough. As of November…

Read More

Stay Updated With the Latest Encryption & Security Trends

Sign up to get our latest articles sent directly to your inbox.

Your email will not be shared with any 3rd party. See our Privacy Policy.