Echoworx Talking Security

24 Apr 2019

Insider Cyber Threats? Closer to Home than You Think!

For enterprise-level organizations, it’s no longer enough to protect data and systems from nefarious external agents. Organizations must also implement defensive measures to protect themselves from something much closer to home: insider threats. Internal cyber attacks happen inadvertently or on purpose. We want to share the four types of insider threats and some defensive measures […]

Read more
21 Apr 2019

Encryption in Healthcare? Improving the Prognosis of Data Security

Healthcare organizations collect, manage and distribute an enormous amount of medical and personal information and they’re constantly at the mercy of budget constraints and cuts, which leaves them vulnerable. On top of that, healthcare is the only industry where more breaches happen because of insider threats than outside malicious agents[i] and it’s tied for first […]

Read more
03 Apr 2019

Why Customer-Centric Encryption Matters in Financial Services

Before message encryption became mainstream with its incorporation into popular messaging platforms, like WhatsApp, and into deep-reaching, headline-grabbing international privacy regulations, like the EU’s General Data Protection Regulation (GDPR), the financial services industry could usually get away with using overly-complex data security options which were not user friendly. Customers simply didn’t know protecting their data […]

Read more
26 Feb 2019

A Perfect 10? Why Flexible Encryption Matters for Your Business

According to Forrester, “consumers use technologies that support convenience and put a higher value on CX (Customer Experience).[i]” And as banking, financial service, government, healthcare, legal and compliance professionals know, customers expect that experience to include encrypted communications and data protection. If your organization uses an out-of-the-box email security product with built-in email encryption, you’re […]

Read more
24 Feb 2019

Privacy in a Post-GDPR Britain: What’s Your Brexit Plan?

Deal or no deal – Britain is heading for a Brexit. And, while some Britons stockpile everything from pasta to clothing to cat food, British companies are bracing themselves for a digital void of uncertainty. But with the right proactive cybersecurity measures in-place and a little planning, there is no reason for a UK business […]

Read more
22 Feb 2019

Who Controls Your Encryption Experience?

At its core, security is an exercise of control. Security controls how our property is used, who has access to it and keeps it safe. In cybersecurity, this notion generally refers to the protection of an organization’s digital assets– keeping data safe and sound. But what happens to this secure sense of control when data […]

Read more
21 Feb 2019

The End of Fax Britannica! Is a New Paperless Age Coming to Britain’s Public Sector?

On January 1, 2019, Britain’s National Health Service (NHS) made a big digital move – no new fax machines. While this might seem insignificant, the underpinning message is deep: a full commitment to digital message channels. And, as the largest public service employer in the UK, with 1.2 million souls, the implications of such a […]

Read more
15 Feb 2019

Can cybersecurity be a competitive edge?

In the old days, before organizations became customer-obsessed and held off-site leadership events to drill down on their value proposition, information security was simple. There was the CIO and a few stewards of the air-conditioned server room which was invisible to the non-IT eye. Back then, cybersecurity operated in the shadows and it worked just […]

Read more
07 Feb 2019

How Secure is Your Encryption Process?

Encryption – sounds secure doesn’t it? It is. But, like any locked door, chest or vault, some things can be even more secure than others, right? Correct. While out-of-the-box email security products may offer email encryption as a built-in feature as part of a larger bundle, there are natural extensions you might consider to further […]

Read more
18 Jan 2019

Inbound Encryption: The Why and How

While your organization has systems in place to encrypt outgoing emails, what happens when you receive an email that contains sensitive information? If it’s not already encrypted, do you refuse to accept it? Does it get caught in your compliance filters? If so, what message are you sending by not receiving? What is inbound encryption? […]

Read more
10 Jan 2019

How do I choose the right encryption method?

Encryption is an important part of any serious proactive cybersecurity plan. You need it. Your customers demand it. And regulators applaud it. But one does not simply ‘encrypt.’ In fact, algorithms aside, there are multiple ways to successfully encrypt, package and send sensitive information securely online. Each method has unique benefits and choosing a correct […]

Read more