Content Hub
cybersecurity
Protecting Customer Data: Is Your DSAR Process Compliant?
Are your processes compliant when it comes to DSAR requests? Learn how to authenticate requests, securely transmit data, and reduce costs.
Outbound Email Security: Is It Becoming The Norm?
I turned the mic on CEO Paul this week to ask where outbound email security is going, the risks, and the opportunities it can...
How To Encrypt An Email In Outlook
Encrypting your emails can help to protect your privacy and security by reducing the chance of interception. Here's how to...
Quantum Computing & Encryption: Risks, Opportunities, and Implications
In this article, I explore the implications of quantum computing on encryption and cover some best...
How To Send A Truly Private Email (Can It Be Done?)
Yes, it is possible to send a truly private email (with some caveats!). You need to use encryption...
What Is a Secure Email Gateway (SEG)?
Learn how secure email gateways (SEGs) protect inbound and outbound emails, the key features, and...
What Is Email Authentication?
Email authentication verifies the identity of an email sender or recipient. It...
Are UK Consumers Not Taking Email Security Seriously? (2023 Research)
This 2023 report analyses UK consumer email security awareness and practices....
Maintaining Privacy, Transparency and Security Within Your Business
In this article, we explore what data ethics is, why it’s so important, and how...