27.11.2017 | CATEGORY: GENERAL
As many know, email is not naturally well suited for sending large file attachments. Most email providers enforce file size limitations on email attachments. One can never be sure if the recipient’s system will accept very large attachment transmissions.
17.10.2017 | CATEGORY: GDPR
The General Data Protection Regulation (GDPR), the most important change in data privacy in 20 years, will take effect on May 25, 2018. The impact for companies is serious: Unlike previous privacy legislation in Europe or elsewhere, the GDPR authorizes the government to impose severe fines up to 20 million Euros or 4% of the annual global revenue.
20.09.2017 | CATEGORY: GENERAL
Part 3 of our series: "Done any tricks today?“ addresses solutions for ensuring verifiable and secure e-mail correspondence. In addition, we should not forget the EU General Data Protection Regulation. In particular, the reversal of the burden of proof in case of data protection violations (article 5, paragraph 2) should be kept in mind.
The aim of this third and final article is to explain why the activation of TLS (Transport Layer Security) on in-house e-mail systems does not definitively resolve the issue of e-mail encryption. In addition, we describe a possible solution for the majority of companies.
In the first part of this series of articles, we dealt with the issues surrounding the procurement and targeted use of encryption solutions, particularly in the field of e-mail correspondence. The majority of companies would probably answer the questions raised here similarly.
As is generally the case when it comes to the topic of IT security, the perception of e-mail encryption is usually the same; the higher the security level, the worse the user experience becomes. The acquired products are either too restrictive or broad in scope and often approach the problem from the wrong angle.
When it comes to the delivery of standard e-mails, employees have little faith in the technology. How often is the phone grabbed simply to ask "has my e-mail arrived?". And for good reason, because even if no error message is received, the e-mail may still not have been delivered. Some e-mail servers simply remain “mute”. But why is this?
In this series, which will be published at irregular intervals, we will take a closer look at the subject of "e-mails", in particular which effects the one or other half-truth might have and, most recently, which facts could put employees and possibly also companies in a difficult position.
Cyber criminality and identity theft have now become one of the strongest growing forms of crime on the Internet. The hackers attack on the recently elected French President Emmanuel Macron demonstrates that attempts are being made to steal confidential, intimate and strategic information in order to compromise individuals, parties or governments.
While eBay, JP Morgan Chase, Yahoo and many others suffered from attacks directly on their servers containing millions of personal data records, it also happens daily to unprotected and insecure email correspondence.
The regulation was adopted on 27 April 2016. It enters into application 25 May 2018 after a two-year transition period. Important to know: UK’s Government has confirmed that the United Kingdom’s decision to leave the European Union will not affect the commencement of GDPR.
When the 2017 Oscar for “Best Picture” was mistakenly awarded to “La La Land” in front of 33 million live viewers, you could practically feel the embarrassment radiating from all parties involved. For the executives of PricewaterhouseCooper (PwC), the company in charge of tallying votes and assuring the utmost secrecy and accuracy of the results, there was a simple explanation for the fiasco.
Most would agree that “who said what when” is at the center of most disputes. In today’s email-centric world, many turn to their “Sent Folder” or “Inbox” to demonstrate who said what when. They may forward these emails to the people with whom they are in dispute, or may print the email to serve as their record.