Zix Blog

A Voice of Reason from the Encryption Working Group

Tue, 01/03/2017 - 17:52 by Dena Bauckman
In 2016, the House Judiciary Committee and the House Energy and Commerce Committee created the Encryption Working Group to look at the challenges law enforcement faces prosecuting crimes with the increasing use of encryption by criminals. Law enforcement organizations refer to the challenges c aused by encrypted data as “going dark,” as it limits their ability to obtain the information and evidence they need. The need for such a working group was emphasized by the standoff between the FBI and Apple over the encrypted iPhone used by one of the San Bernardino shooters. The...
Read More

2016 – The Year of the Email Pwn

Thu, 12/08/2016 - 12:20 by ZixCorp
To say that email hacks rocked the presidential election would be an understatement. We have never seen such widespread, high-profile email hacking on this scale before. Over the past six months alone, we have witnessed the DNC , John Podesta and Colin Powell all fall victim to email hacks, and what’s worse, the contents of their conversations exposed for the world to see via WikiLeaks. By the overall scale and scope of these hacks, we wouldn’t be out of line to look at 2016 as THE year of the email hack. With such public hacks, many in business are probably wondering if something...
Read More

Office for Civil Rights Comments on Strong Authentication for HIPAA

Thu, 11/17/2016 - 01:15 by Dena Bauckman
On November 7, 2016, the Office for Civil Rights (OCR), the Health and Human Services (HHS) office responsible for enforcing the Health Insurance Portability and Accountability Act (HIPAA), issued its latest newsletter titled “What Type of Authentication is Right for You?” In the newsletter, the OCR focuses on the risk of weak authentication as a cause of recent healthcare-related cybercrimes. The OCR suggests that covered entities and business associates conduct an enterprise-wide risk assessment and consider implementing stronger authentication to protect electronic personal...
Read More

Email Data Loss Prevention with ZixQuarantine

Tue, 11/15/2016 - 11:00 by Cathy Kingeter
The average number of business emails sent per user, per day rose to 34 in 2015*. With each “Send” comes potential risk of sensitive and confidential information leaving your organization. All it takes is a quick tap. An employee sends an email, but to the wrong person or accidently attaches a file containing confidential information that should not be sent. It is easy to see how it happens, and once an email leaves your secure network, there are few options to fix the issue. Unfortunately there are also situations where an employee sends email for malicious reasons. Whether...
Read More

Tap into the Zix Encryption Network to Increase Ease of Use and Archiving Capabilities

Thu, 10/27/2016 - 08:45 by Dena Bauckman
If you ask most people to describe their experience when receiving an encrypted email, they will probably describe a disruptive process that requires clicking on a link or attachment and then having to register or enter a password to read the message. Even the best email encryption solutions, such as Zix, require the user to take extra steps to read a message. It’s simply the way the world’s email infrastructure works. BUT if you are a Zix customer communicating with another Zix customer, there are no extra steps. Zix provides automatic transparent email encryption between all...
Read More

How to Protect Against FERPA Violations in Email Communications

Mon, 10/24/2016 - 09:50 by Cathy Kingeter
It happens. A staff member accidently sends sensitive student information in an email or attachment. Despite awareness training and best intentions, people often forget to protect sensitive information in emails they send or are simply not aware of protection requirements. The Family Educational Rights and Privacy Act (FERPA) , reinforced by state regulations, necessitate educational institutions and agencies to protect student education records, as well as student sensitive information. Non-compliance puts organizations at risk for legal liabilities, financial loss, and other negative...
Read More

Zix’s Strength in Community Shines for Blue Cross Blue Shield Customers and Their Members

Wed, 10/19/2016 - 10:53 by ZixCorp
Blue Cross Blue Shield (BCBS) organizations have an influential and prominent presence in healthcare, serving one in every three Americans who rely on their coverage for quality care. With such a profound responsibility to people and communities across the U.S., we are incredibly proud that more than 30 BCBS organizations rely on Zix and the strength of our community. How does Zix help BCBS organizations and their members? Email is as secure as a postcard traveling through the postal service. And just as healthcare companies and business associates can’t exchange protected health...
Read More

Email Encryption Needs to Be a Seamless Part of Our Lives

Mon, 10/03/2016 - 13:31 by Dave Wagner
Today, a Wall Street Journal article highlighted recent email breaches and featured the perspectives of a number of business executives who are rightfully concerned. Some are limiting their use of email, while another considers the insecurity of email a cost of doing business. The article continued by weaving in a summary of the risks of email from security consultant Ryan Lackey who described email as “a 35-to-40-year-old system that does not have security built in from day one. You’re basically putting the most secure data into a system that was never designed for it.”...
Read More

Clinton Email Investigation Reinforces the Need for Automation

Thu, 09/08/2016 - 16:02 by ZixCorp
On September 2, the FBI released a summary of its July 2 interview with Hillary Clinton regarding her use of a personal email server while she held the position of U.S. Secretary of State. In covering the news, many media published highlights , timelines and lessons learned, including PBS correspondent Lisa Desjardins. In her article “ 10 things we learned about Clinton’s emails from the new FBI documents ,” one lesson stuck out for us at Zix: Clinton repeatedly said she was not trained in how to handle sensitive email information, including the president’s email...
Read More

If You Don't Want to See Your Email in the News, Encrypt It

Thu, 08/25/2016 - 08:31 by Dena Bauckman
Over the past few weeks, many news stories and much of the public’s attention has been focused on the email breaches at the DNC. It is believed hackers accessed DNC email servers by using a technique called spear phishing. Spear phishing is when you receive an email that looks like it is from someone you know with the intention of getting you to click on a link, so the hacker can download malicious code. The malicious code then allows hackers to access vulnerable systems and information, such as emails. The DNC is not the only organization to have an email breach. In 2014, Sony had a...
Read More

Pages

Switching to Zix Just Got Better

50 percent or more off your first year when you switch to Zix Email Encryption by Feb. 28, 2017, from an eligible competing solution.

Learn More