Echoworx Blog

Can Cybersecurity Be a Competitive Edge?

Can Cybersecurity Be a Competitive Edge?

In the old days, before organizations became customer-obsessed and held off-site leadership events to drill down on their value proposition, information security was simple. There was the CIO and a…

Read More

Inbound Encryption: The Why and How

Inbound Encryption: The Why and How

While your organization has systems in place to encrypt outgoing emails, what happens when you receive an email that contains sensitive information? If it’s not already encrypted, do you refuse…

Read More

How do I choose the right encryption method?

How do I choose the right encryption method?

Encryption is an important part of any serious proactive cybersecurity plan. You need it. Your customers demand it. And regulators applaud it. But one does not simply ‘encrypt.’ In fact,…

Read More

Generation Z, Personal Data and Digital Trust: Unlike Any Before

Generation Z, Personal Data and Digital Trust: Unlike Any Before

Solve this riddle: I am always connected – but avoid social situations. I demonstrate a firm attention to detail – but have the attention span of a goldfish. I freely…

Read More

New Year? New Information Security Challenges!

New Year? New Information Security Challenges!

The unfortunate reality of the world of information security is that new threats, new scams and new malicious actors to worry about seem to pop up every day. As we…

Read More

Accelerating Your Customer Onboarding Through Digital Adoption

Accelerating Your Customer Onboarding Through Digital Adoption

With so many digital choices to choose from, traditional client onboarding, which can take weeks, even months to complete is certainly a poor customer experience. Many processes are still manual,…

Read More

Trouble in Oz: Australia’s New Controversial Data Backdoors

Trouble in Oz: Australia’s New Controversial Data Backdoors

Dangerous privacy precedents are now being set in Australia – a nation traditionally known for its dedication to Commonwealth democratic stability. As of December 2018, Australia has newly-minted legislature under…

Read More

Security 101: A 2018 Thesaurus for InfoSec

Security 101: A 2018 Thesaurus for InfoSec

There is much emphasis being given to information security in today’s digitally connected ecosystem, and it truly is the need of the hour – below you can find answers to some…

Read More

Is TLS good enough for secure email?

Is TLS good enough for secure email?

When it comes to collecting sensitive customer data, you simply cannot afford to take any chances. But, while protecting your digital perimeter is important, your organization also needs to ensure…

Read More