Bob Janacek's Archive

August 28, 2018

Bob Janacek

Major Email Compliance Regulations That You Need to Know

Keeping up with industry and government email compliance regulations impacting the exchange of sensitive information can be exhausting. So, we’ve put together a list of four big ones you need to know about. Payment Card Industry Data Security Standard (PCI DSS) Health Information Portability and Accountability Act / Health Information Technology for Economic and Clinical… Read More »

June 6, 2018

Bob Janacek

Best Practice Tips for Outbound Email Security Policy

An outbound email security policy protects your company, your clients, your data and your staff from noncompliance nightmares. With so much at stake, you want to implement best-in-class practices when developing, defining and implementing your security policies. In this blog post we will outline the best practice steps that will keep the information you transfer internally and… Read More »

December 1, 2015

Bob Janacek

Best Practices: Securing Data at Rest, in Use, and in Motion

Sensitive business data is more vulnerable today than ever before. Corporate trade secrets, national security information, personal medical records, Social Security and credit card numbers are all stored, used, and transmitted online and through connected devices. This proliferation of valuable data presents criminals with an increasingly wide range of opportunities to monetize stolen information and… Read More »

June 2, 2015

Bob Janacek

How safe are HTTPS connections? Not as safe as you think.

One of the pillars of internet security has fallen, and until it’s universally fixed, hackers will have the upper hand. When making an online purchase, any reputable website will require a secure HTTPS connection before requesting payment information and completing the transaction.  HTTPS is the ubiquitous method used by browsers and websites to securely exchange… Read More »

January 6, 2015

Bob Janacek

Want to ensure secure and compliant data exchange? Integrate security!

If security is transparent and easy to use, it will be adopted. A wide range of business processes handle sensitive data, and need to transmit this data in a secure, compliant and auditable manner.  They may involve employees, customers, applications and portals, along with desktops, servers and mobile devices.  Sometimes, these processes originate from within… Read More »

May 28, 2014

Bob Janacek

Encrypted Email – Push or Pull?

Typically, when you receive an encrypted email, its contents will either be delivered as a message attachment or stored in a secure webmail portal for retrieval. In the email encryption industry, these two methods are known as “push” and “pull” delivery. In either case, to decrypt the message, you’ll need to open the attachment or… Read More »

April 30, 2014

Bob Janacek

Opportunistic TLS – Two Good Ways to Put Your Email at Risk

Email encryption allows organizations to protect sensitive messages and increase their compliance with privacy regulations.  One common encryption method, known as opportunistic TLS, automatically tries to secure the path that messages take when they travel to recipient email systems.  Since this type of encryption is completely transparent to users, organizations often utilize opportunistic TLS to… Read More »

March 19, 2014

Bob Janacek

Why You Should Encrypt Your Email

In this digital age, we often hear about “other people” that have had their emails hacked or intercepted and we always think it won’t happen to us. Until it does. Unless we are sending a credit card or other personal information we never really give a thought to what would happen if our email were… Read More »

March 17, 2014

Bob Janacek

3 Best Practices When Using Email On Mobile Devices

Here are a few quick tips to help you protect your personal information while using email on your mobile device. 1. Be careful what you click: Just as you have learned to be cautious when surfing the web or opening an email on your computer, what you click on while using email on your mobile… Read More »

March 12, 2014

Bob Janacek

Top Ten Ways Your Users Misuse Email and Make Life Difficult

10. They post email in a forum. 9. Signing up for promotions with untrusted or unknown sources. 8. Not unchecking a ‘subscribe me to your newsletter’ field on a form. 7. Opening a link in a phishing email. 6. Having the same set of characters for their email password and their email account name. 5.… Read More »

Featured Customers and Partners