20 May 2016

Hashed but not Salted

You may remember the 2012 LinkedIn data breach, in which 6.5 million LinkedIn user accounts were believed to have been compromised. According to BBC and LinkedIn itself, the number of affected LinkedIn users from that 2012 data breach could actually be upwards of 100 million, or the majority of the 165 million users LinkedIn had in 2012. The shocking enormity of this data breach is attracting many security analysts to scrutinize the breach itself.... Read more...

09 May 2016

ABA Model Rule Supports Email Encryption

Author:

Lawyers have always had a duty to be competent in technology, but the ABA Model Rule put this duty in writing, impacting cybersecurity practices. Twenty states have followed the ABA’s lead and adopted a duty of technological competence, all but requiring encryption. In 2012, the American Bar Association approved a number of changes to the Model Rules of Professional Conduct. Of particular interest is the comment to Model Rule 1.1: To maintain the... Read more...

05 May 2016

Changing Trends in Cyber Security

In the past, for individuals and small businesses, cyber security was important to mitigate the inconvenience of spam, viruses that required restoring back-ups of corrupt files, and letters to credit bureaus to clear up identity theft issues. While painful, the cost of these was generally in the hundreds of dollars and perhaps a few hours of inconvenience. Today, we see a convergence of trends that is changing the dynamics of cyber security for individuals... Read more...

28 Apr 2016

RPost adds Anti-Whaling Security Feature to RMail

Author:

New Anti-Whaling Security Feature Prevents Business Email Compromise (BEC) Attacks Los Angeles, CA – April 28, 2016 – RMail’s new Anti-Whaling™ security feature adds imposter protection for email and prevents email conversation hijacking, putting a stop to one of the most sophisticated and financially-damaging cyber-crimes targeting businesses today. Referred to by the FBI as Business Email Compromise (BEC) crimes or by technologists as “spear... Read more...

14 Apr 2016

Business Email Compromise (BEC) – Industry Examples

Imposter emails targeting businesses today are far more sophisticated than traditional phishing emails or the “Nigerian prince” emails of yesteryear. These new Business Email Compromise (BEC) attacks use imposter emails that reflect a deep understanding of people’s roles and messaging patterns within a target organization. Here’s how BEC attacks often play out for several reference industries: Law Firms and their Clients An... Read more...

12 Apr 2016

RMail Security Bundle for Office 365 Now Available on the Ingram Micro Cloud Marketplace

Strategic Partnership to Create Immediate Opportunities for Office 365 Resellers and Their Customers LOS ANGELES, CA–(Marketwired – Apr 12, 2016) – RPost today announced the availability of its RMail® service on the Ingram Micro Cloud Marketplace in the United States. Winner of the World Mail Award for Security, RMail is an all-in-one service that extends Microsoft Outlook, Office 365, Gmail and other platforms with the sending... Read more...

24 Mar 2016

Understanding Common Misconceptions about Email Delivery (Part 3)

In the final part of our three part series on common misconceptions about email delivery, we’ll discuss a type of system that many attorneys use and believe can prove fact of e-delivery. Some attorneys send (or advise clients to send) disclosure documents using a link-retrieval system. The recipient receives a link to download the document. A record of the delivery of the disclosure document generally would protect the sender in certain future disputes... Read more...

15 Mar 2016

Understanding Common Misconceptions about Email Delivery (Part 2)

Author:

Most disputes center on who said what to whom and when. When an email gets lost without the sender being aware, the entire conversation or negotiation can derail, and there can be serious financial and/or reputational damage as a consequence. Have you ever been in a situation where an email vanishes? Part 2 of “Common Misconceptions about Email Delivery” prepares you in case delivery of your (or a client’s) time-dependent email is disputed.... Read more...

10 Mar 2016

“Who Said What When” is at the Centre of Most Disputes

Most would agree that “who said what when” is at the centre of most disputes. In today’s email-centric world, many turn to their “Sent Folder” or “Inbox” to demonstrate who said what when. They may forward these emails to the people with whom they are in dispute, or may print the email to serve as their record. Before relying on this simple text record, it is essential to consider how it will stand up to scrutiny if its content authenticity,... Read more...

29 Feb 2016

QUIZ: How do you Know Your Email Was Delivered?

We all send emails — some trivial and others that are incredibly important or time sensitive. For the important email messages, how do you know – and prove – that your email was delivered? Take this short quiz to see whether you truly understand how email delivery works. Take the Quiz! Question 1: I did not get a bounce notice, so I know my email got there. True/False Question 2: I copied (cc’d or bcc’d) myself and got the copy... Read more...