Echoworx Blog

Trouble in Oz: Australia’s New Controversial Data Backdoors

Trouble in Oz: Australia’s New Controversial Data Backdoors

Dangerous privacy precedents are now being set in Australia – a nation traditionally known for its dedication to Commonwealth democratic stability. As of December 2018, Australia has newly-minted legislature under…

Read More

Security 101: A 2018 Thesaurus for InfoSec

Security 101: A 2018 Thesaurus for InfoSec

There is much emphasis being given to information security in today’s digitally connected ecosystem, and it truly is the need of the hour – below you can find answers to some…

Read More

Is TLS good enough for secure email?

Is TLS good enough for secure email?

When it comes to collecting sensitive customer data, you simply cannot afford to take any chances. But, while protecting your digital perimeter is important, your organization also needs to ensure…

Read More

Gaining Digital Trust in a World Turned Upside Down

Gaining Digital Trust in a World Turned Upside Down

When it comes to gaining digital trust, traditional approaches can go topsy-turvy in a hurry. Gaining a customer’s trust is a reward earned only after many years of careful branding,…

Read More

Are You Prepared for Canada’s Mandatory Breach Reporting Law?

Are You Prepared for Canada’s Mandatory Breach Reporting Law?

With the introduction of new rules under Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA), saying sorry for a data breach is no longer good enough. As of November…

Read More

Encryption Shouldn’t Be Cryptic!

Encryption Shouldn’t Be Cryptic!

Encryption, encryption and more encryption – the security buzz word on the tip of everyone’s tongue. The more interesting topic is what’s sitting on top of that core technology. Making…

Read More

A Match Made in the Cloud: The Data Controller and the Data Processor

A Match Made in the Cloud: The Data Controller and the Data Processor

Under the GDPR, corporations that access customer information are defined as a controller and/or processor. Any corporation that does business within the EU or with EU citizens or residents must comply…

Read More

How is trust the new currency in banking?

How is trust the new currency in banking?

Nearly half of customers send personal information using email and trust the safety of an email in 30 seconds or less. But is this trust warranted? When questioned, only 40…

Read More

Why Are Cybersecurity Audits Important?

Why Are Cybersecurity Audits Important?

Rates of malicious email and malware continue to rise, and new threats are emerging. Meanwhile, ransomware attacks have become so common that targeted attack groups are now using them as…

Read More

Stay Updated With the Latest Encryption & Security Trends

Sign up to get our latest articles sent directly to your inbox.

Your email will not be shared with any 3rd party. See our Privacy Policy.