6 Cybersecurity Predictions for 2020
One of the major cyber security predictions for 2020 is that there will be a rise in ransomware attacks; not just your average ransomware...
How to Keep from Getting Phished in 2020
Phishing scams are rapidly evolving both in terms of the tools being used and the cleverness with which they are being designed. But there...
Why Businesses Need Secure Messaging That Goes Beyond Encryption
Digital communications are essential to everyday business operations, but unfortunately, the most commonly used mediums – email and SMS...
The Programming Languages That Built Email
Email has changed a lot over the years, and so have the programming languages behind it. Here we take a look at which languages are used...
Whaling: Phishers Look to Land a Big Catch
Spear phishers are baiting their hooks for 'big phish' with access to highly valuable corporate information, a strategy known as whaling.
How Will We Type in the Virtual Reality Environment?
Keyboards have been the main form of data input for personal computers since their inception, but what about virtual reality? An...
Ditch Your Inbox? No-Email Initiatives and What They're For
For many in the business world, email equals stress. Some are trying to reduce dependence on email in order to help employees de-stress,...
Google's End-to-End Encryption Isn't What It Seems
Google tries to make end-to-end email encryption simple to use. It will be, but there are caveats. Learn more about it here.
Too Much Spam? 5 Technologies Designed to Block It
Unsolicited emails account for as much as 95 percent of all email. Fortunately, the technology industry is coming to the rescue. Find out...
INFOGRAPHIC: 9 Tips for Keeping Your Internet Use Private
Worried about your privacy online? Here are some tips on how to keep your private life from becoming a public matter.