09/04/2018

Can you put a monetary value on proof?

11/01/2018

Digitising business processes

The rapid development and increasing interconnectedness of internal and external business processes and the challenges this poses places new demands on companies. In addition to the […]
27/11/2017

The Large File Dilemma

As many know, email is not naturally well suited for sending large file attachments. Most email providers enforce file size limitations on email attachments. One can […]
17/10/2017

Avoiding fines for data breaches

The General Data Protection Regulation (GDPR), the most important change in data privacy in 20 years, will take effect on May 25, 2018. The impact for […]
10/10/2017

Done any tricks today? About Email missunderstandings and half-truths (part 3)

Part 3 of our series: “Done any tricks today?“ addresses solutions for ensuring verifiable and secure e-mail correspondence. In addition, we should not forget the EU […]
22/08/2017

Striking a balance between cost and benefit for e-mail encryption (Part 3)

The aim of this third and final article is to explain why the activation of TLS (Transport Layer Security) on in-house e-mail systems does not definitively […]
08/08/2017

Striking a balance between cost and benefit for e-mail encryption (Part 2)

In the first part of this series of articles, we dealt with the issues surrounding the procurement and targeted use of encryption solutions, particularly in the […]
27/07/2017

Striking a balance between cost and benefit for e-mail encryption (Part 1)

As is generally the case when it comes to the topic of IT security, the perception of e-mail encryption is usually the same; the higher the […]
19/07/2017

Done any tricks today? About Email missunderstandings and half-truths (part 2)

When it comes to the delivery of standard e-mails, employees have little faith in the technology. How often is the phone grabbed simply to ask “has […]