Echoworx Talking Security

19 Oct 2018

A Match Made in the Cloud: The Data Controller and the Data Processor

The EU’s General Data Protection Regulation (GDPR) came into effect on May 25, 2018. Most notably, the GDPR gives individuals more control over their personal information, and it requires that companies be clear about why they are collecting information. Under the GDPR, corporations that access customer information are defined as a controller and/or processor. Any corporation that [...]
Read more
11 Oct 2018

How is trust the new currency in banking?

A recent Echoworx survey indicates that nearly half of customers send personal information using email and trust the safety of an email in 30 seconds or less. But is this trust warranted? When questioned, only 40 per cent of organizations who have encryption capabilities use the technology extensively to protect sensitive data – with a [...]
Read more
01 Oct 2018

Security 101: A 2018 Thesaurus for InfoSec

There is much emphasis being given to information security in today’s digitally connected ecosystem, and it truly is the need of the hour – below you can find answers to some of the most pertinent topics in information security. Slava Ivanov, Distinguished Software Engineer at Echoworx with his years of progressive experience in delivering security solutions to […]

Read more
27 Sep 2018

Why Are Cybersecurity Audits Important?

The cybersecurity environment is changing. Rates of malicious email and malware continue to rise, and new threats are emerging. Meanwhile, ransomware attacks have become so common that targeted attack groups are now using them as decoys to provide cover for more serious forms of attack. In a sea of constantly-evolving cyber threats, can your company […]

Read more
14 Sep 2018

Is Your Business Vulnerable to Cybersecurity Threats?

In 2017, Deloitte was ranked the best cybersecurity consultant in the world for the fifth year in a row. But later that year, news emerged that Deloitte itself was the victim of an ongoing hack that had lasted nearly a full year.[1] How could this dramatic reversal have happened so quickly? Any enterprise is vulnerable […]

Read more
13 Sep 2018

What is a Chief Data Officer?

We live in a post-privacy age. Our location can be pinpointed with GPS. Our photos and itineraries are known to the world, through our smartphones connected to the internet. We post our most intimate thoughts and opinions to social media for all to see. We browse targeted advertising based on our Google searches and online […]

Read more
12 Jun 2018

One Hot Mess: Encryption, Dating and the Betterment of Privacy Protection

Would you feel comfortable sending personal information over email without encryption? Feel shy answering ‘Yes?’ You’re not alone. In fact, nearly 50 per cent of people choose to share sensitive personal information online. And our trust on the people and companies we send them to is often taken for granted. You might be surprised to […]

Read more
10 Apr 2018

Quiet before the storm: CLOUD act

Recent developments in the court case between the US Government and Microsoft have impacts to companies offering services globally.   The Clarifying Lawful Overseas Use of Data Act (CLOUD Act) aims to simplify the way enforcement groups obtain personal data stored by U.S.- based technology companies. What Has Happened: In December 2013, a United States Magistrate […]

Read more
07 Mar 2018

Encryption, helping address GDPR compliance

As of May 25, 2018, all companies dealing with personal data in the European Union (EU) must be employing a high level of security to safeguard EU citizens’ information. Under the General Data Protection Regulation (GDPR), companies that aren’t taking adequate measures in protecting the data of those residing in the 28 EU countries (prior […]

Read more
26 Feb 2018

Is there a certainty to security?

The choice between Protection + Prevention vs Detection + Response is an illusion. As security practitioners, we all learnt that defence in depth was key. Yet we focused too much on defence as just a wall or line that would protect us. This type of thinking has been proven to be insufficient time and time […]

Read more
25 Jan 2018

How bad is bad? Mexico’s threat landscape

Mexico is one of the fastest growing economies in the world, focused in employing technology to spur businesses forward. But this dependency on technology comes with a dark side – businesses are significantly more vulnerable to cyber threats and data breaches. Mexico has been attracting the attention of malicious cyber threat performers. The attraction is largely thanks to […]

Read more
05 Jan 2018

Spectre and Meltdown attacks, think the sky is falling?

Like most companies, Echoworx is aware of the recently announced vulnerabilities impacting most modern microprocessors.  We wanted to take a minute to provide the following guidance on the Spectre and Meltdown attacks to ensure awareness of the issues and to inform you on the steps that Echoworx is taking to address them. What are these attacks? Spectre is […]

Read more
15 Nov 2017

Indecent Exposure and Robotic Hacking

Would you send a naked selfie by email? A lot of us would say ‘no’, because we’re well aware of what could go wrong. What if the person you send the message to accidentally (or deliberately) shares it with someone else? What if your email account or theirs gets hacked? We’ve seen too many public […]

Read more