Echoworx Blog

Encryption Shouldn’t Be Cryptic!

Encryption Shouldn’t Be Cryptic!

Encryption, encryption and more encryption – the security buzz word on the tip of everyone’s tongue. The more interesting topic is what’s sitting on top of that core technology. Making…

Read More

A Match Made in the Cloud: The Data Controller and the Data Processor

A Match Made in the Cloud: The Data Controller and the Data Processor

Under the GDPR, corporations that access customer information are defined as a controller and/or processor. Any corporation that does business within the EU or with EU citizens or residents must comply…

Read More

How is trust the new currency in banking?

How is trust the new currency in banking?

Nearly half of customers send personal information using email and trust the safety of an email in 30 seconds or less. But is this trust warranted? When questioned, only 40…

Read More

Why Are Cybersecurity Audits Important?

Why Are Cybersecurity Audits Important?

Rates of malicious email and malware continue to rise, and new threats are emerging. Meanwhile, ransomware attacks have become so common that targeted attack groups are now using them as…

Read More

Is Your Business Vulnerable to Cybersecurity Threats?

Is Your Business Vulnerable to Cybersecurity Threats?

Any enterprise is vulnerable to cyberattack. The bigger the company, the bigger the target. For most companies it’s only a matter of time. In 2017, Deloitte was ranked the best…

Read More

What is a Chief Data Officer?

What is a Chief Data Officer?

The Chief Data Officer role was born during the 2008-09 financial crisis. The CDO’s chief value today is as the point-person for optimizing the vast amounts of data generated by…

Read More

California’s Data Privacy Law, AB 375: It’s Personal

California’s Data Privacy Law, AB 375: It’s Personal

In June 2018, California passed one of the most advanced privacy laws in the US – The California Consumer Privacy Act of 2018 (AB 375). The act is hailed as…

Read More

One Hot Mess: Encryption, Dating and the Betterment of Privacy Protection

One Hot Mess: Encryption, Dating and the Betterment of Privacy Protection

Would you feel comfortable sending personal information over email without encryption? Feel shy answering ‘Yes?’ You’re not alone. In fact, nearly 50 per cent of people choose to share sensitive…

Read More

Quiet before the storm: CLOUD act

Quiet before the storm: CLOUD act

Recent developments in the court case between the US Government and Microsoft have impacts to companies offering services globally.   The Clarifying Lawful Overseas Use of Data Act (CLOUD Act) aims…

Read More

Stay Updated With the Latest Encryption & Security Trends

Sign up to get our latest articles sent directly to your inbox.

Your email will not be shared with any 3rd party. See our Privacy Policy.