How are the sender-controlled private email features used? EPRIVO includes special privacy features that can be associated with each EPRIVO email we send. These features enable pioneering sender-control for private emails in both cloud and recipient devices. The sender retains ability to manage emails everywhere, even after they are sent.
Emails are extremely vulnerable to privacy violations during their lifetime. Firstly, emails are often archived for many years as users accumulate a large number of emails that are spread in the cloud. Also, security breaches, service provider insiders, deliberate data mining, implementation vulnerabilities, and weak user passwords, are among the factors that lead to most people’s emails being compromised at some point in time. In addition to the vulnerabilities related to senders and related providers, the privacy of an email, as soon as it is sent, depends on the recipient’s providers in the cloud, and on the recipient’s devices and security habits. The recent vulnerability discovered on SSL, the digital security layer of web servers, called HeartBleed, further highlights the challenges faced.
First what is Privacy and what factors affect Email Privacy? Wikipedia defines it as “Privacy (from Latin: privatus) is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively”. Privacy has a technical aspect as well as a socio-economic one, and threats to privacy can come from either of these factors. Email privacy is vulnerable to both kinds of threat.
I am super excited to introduce EPRIVO, finally. EPRIVO is a BlueRISC brand and is the company’s first product in the consumer space that we worked on for several years. It brings user-friendly solutions to meet consumers’ privacy needs in the cloud. Private email account service is our top priority at this point but we have efforts ongoing that are complementary.
Read this article to learn some of the crucial tips that you can try to ensure the security and privacy of your email. Read on!
Are you one those individuals who are taking their security and privacy of their email inboxes for granted? Though you keep on checking your email, you cannot deny the fact that both the email privacy and security is often neglected. Well, that shouldn’t be the case!Read more
The world is rapidly evolving; most organizations are moving towards digitizing their processes. The advantages of a digital world cannot be overemphasized. This is exactly where cybersecurity comes in; valuable data and information need to be protected. Cybersecurity is one of the top-ranked digital industries along with Artificial Intelligence, Internet of things, Mobility, and Big Data.Read more
Hackers often target the email and social media accounts of the rich and famous. Why? Because they’re easy targets and a quick way to get a lot of fame. The public and private lives of celebrities and politicians are often open books. Even the most private ones share a lot of their personal lives with the world.Read more
More than ever our emails are being monitored by messaging providers. You may have noticed that messaging services are getting incredibly good at suggesting responses to emails/messages. In the race for creating a human level artificial intelligence, or at least the world’s best chatbot, we often see that providers are constantly training their autofill messaging options by reading our conversations.Read more
Women represent 14% of the workspace in cyber security in the US and under 10% in Europe. This low representation is a fairly well-known statistic. Some countries have this better like Australia that has around 25% cyber-security professionals being women. There is a lot of ongoing debate as to why that is, but this is not the question we are asking here. We want to know what this ratio is for using digital security or privacy products. Is this low representation only in a cyber-security career choice, or would women similarly not be pursuing products in digital security and privacy even though they can make these decisions in anonymity?Read more
On the Internet Free Ain’t Free. Many people got used to free during the last two decades. Internet’s business model from search, browsing, social media, messaging, to emailing is that you get a free service for yielding your information. Information is Internet’s main currency or indirect currency – its bitcoin (i.e., virtual money).Read more
Healthcare organizations are required to protect electronic protected health information (ePHI), such as electronic health records, from various internal and external risks . Safeguards must be in place even when emailing ePHI. One challenge is that conventional emails and services do not have what it takes to meet HIPAA compliance. Also, it is not as simple as encrypting email content. There is much more to it.Read more
It is simply hard to judge what is sensitive. You can lose your digital content anytime and your content may even become more sensitive over time. There are multiple points of vulnerabilities, most of which are outside your control. Your emails remain in the cloud and in the recipients’ devices, potentially forever, after being sent. Your content may be leaked anytime and anywhere along the paths an email takes, even in the future or even at your recipients. That can happen because of weak passwords on email accounts or because of a break-in at one of the servers that store your content, or a compromise can occur at any of your recipients’ providers or their devices get hacked, to name a few reasons.
Social engineering is a commonly used attack vector against unassuming users that does not require any sophisticated technology. It is worth knowing how to recognize these attack attempts, and avoid falling victim to criminals aiming to gain access to one’s computer or device, and/or online accounts. Typical phishing attacks are malicious emails masquerading as something important/useful. Such emails can be in the form of a request from someone important at work, from your bank, school, doctor, lawyer, friend or relative, etc. In these emails attackers typically ask for passwords, for sensitive information to update accounts online, or ask you to pay some fees after accessing a fake website that looks similar to the actual one they imitate. In summary, these kinds of attackers may use one or more of the following tactics.