Echoworx Talking Security

06 Jan 2017

A Welcome Reset for Citizen Privacy

Canada’s Public Consultation on National Security The notion that we are being watched digitally has, seemingly overnight, become something many people now accept as a fact of life in the modern, post-Snowden world. Much of the news around citizen privacy, as always, has been focused on the US, but are we on the sidelines? Canada is an […]

Read more
27 Dec 2016

Quantum Computers, End of Cybersecurity?

Quantum computers have been making news over the last few years, particularly around how they can break encryption, but how serious is the threat and what is going to happen once a quantum computer is built? What is a quantum computer? In physics, quantum mechanics is a branch that investigates subatomic particles and the laws of nature that […]

Read more
14 Sep 2016

How Can We Convert More Customers to Paperless Billing?

Ask anyone on the street, and they’ll probably tell you that using electronic, or paperless, billing and statements is a good thing. When introduced more than a decade ago, paperless billing was touted as an environmental savior; by driving more customers online to receive and pay their bills, fewer natural resources are used and less […]

Read more
07 Sep 2016

A Single Vulnerability is all a Cyber Criminal Needs

We have been in a war against cyber criminals and data breaches since the 1900s when magician and inventor Nevil Maskelyne disrupted a public demonstration of Guglielmo Marconi’s purportedly secure wireless telegraphy technology, sending insulting Morse code messages through the auditorium’s projector. The situation has only gotten worse today. Millions of online transactions are done every day; […]

Read more
09 Aug 2016

Fraudsters Hackers & Thieves!

It’s official: Most consumers do not feel like their private data is indeed being kept private. Looking around at the headlines, where high-profile breach after high-profile breach is documented, the lack of trust in data security is no surprise. Whether it be through a corporate breach, where consumers’ confidential information is revealed as part of thousands […]

Read more
22 Jul 2016

Ahead of the Market, Ahead of the Competition

Echoworx has achieved its third consecutive year of more than 30 per cent growth, outperforming market predictions. “As a privately owned innovator at the forefront of the encryption industry we’re proud that Echoworx continues to outperform market expectations,” says Echoworx COO Harry Enchin. “We are uniquely positioned and this has contributed to our company’s exceptional performance.” The global market […]

Read more
27 May 2016

First the IP Bill, Then What?

In the face of democratic debate, against all the clamoring voices of human rights organizations, global tech firms such as Facebook and Google, lawyers, journalists, and a host of academics; it seems that with regrettable flippancy, the Investigatory Powers Bill will be passed later this year. The UK government’s plan for mass surveillance opens the door […]

Read more
13 Apr 2016

Unlocking Encryption Key Management

Any encrypted communication is only as secure as the keys used by the system that locked them. If the keys are compromised by hackers, negligence or other means, then any communication using those keys can be decrypted. So how can these keys be protected? According to a recent Ponemon 2016 Global Encryption Trend Study, 67 per […]

Read more
07 Apr 2016

The Apple Hack: A Problem Engineered to Protect Us

The FBI got around ordering Apple to cooperate in breaking its own security, but when the next case arises, and it will, should the company refuse to help, the outcome will have far reaching implications. Regardless of the fact that the FBI found a way around ordering Apple to assist the FBI in cracking the […]

Read more
08 Feb 2016

Security and the Path of Least Resistance

Physics says that the path of least resistance is generally the one that most people take. If we contextualize this by looking at how humans have evolved, adapted and figured out how to survive, it’s easy to understand why. Like any other living creature, we had to conserve energy when we could in order to […]

Read more
13 Jan 2016

Looking for a Secure Email Solution?

Here are five of the most important factors to consider when looking for a secure email solution: 1. Usability Can the sender easily send secure email without any extra steps? Sending an email is a behaviour all of us do automatically; introducing encryption shouldn’t hinder this process. Likewise, the recipient should easily be able to open the […]

Read more
04 Dec 2015

Cryptography from the Afterglow of the Big Bang

Physicists have proposed the use of cosmic microwave background, or CMB, radiation power spectrum as a random bit generator for symmetric and asymmetric key cryptography. The CMB is thermal radiation created shortly after the universe came into being during the Big Bang. The CMB, also known as relic radiation, is the earliest radiation detected. The security […]

Read more
02 Dec 2015

Reliance on Data Residency Is Not Enough

As organizations move their operations to the cloud, they face the complexities and increasing pressures of protecting sensitive data belonging to them and their customers. Not to mention taking into account local regulatory requirements which often limit where data can be located in order to keep it out of the hands and eyes of prying […]

Read more