, ,

Encryption — It’s more than just a cipher

Posted on August 16, 2016

In our third issue of our blog series on HIPAA compliance, we look deeper into the level of encryption security required by HIPAA. You can read the second installment about the OCR’s […]

, ,

Get Set for the Upgraded Version of Advanced Email Security!

Posted on August 16, 2016

In the next month or so, we’ll be requesting that our partners who have customer accounts with McAfee® Advanced Email Protection migrate to an upgraded version of Advanced Email Security […]

, ,

Get ready for Advanced Email Security!

Posted on July 1, 2016

Over the past few months, we’ve been listening to your feedback and working hard to improve the functionality, features, and granularity of control within our Advanced Email Security […]

, , ,

Introducing Advanced Email Security

Posted on April 27, 2016

Earlier this year, Intel® Security announced end of life for a large number of McAfee® SaaS security services, including email protection and continuity services sold by Intermedia within […]

, , , , ,

Does your email solution meet the New Standard?

Posted on March 28, 2016

Business email has come a long way. I remember when we all used on-premises Exchange servers, when that was the height of high tech for corporate email. Now, of course, we’re told that […]

, , , ,

New email encryption templates make it easier to protect sensitive information

Posted on February 2, 2016

Now healthcare, financial services and legal services customers can more easily encrypt sensitive data Regulations such as HIPAA, GLBA and TILA-RESPA identify specific types of information […]

, , , ,

Make sure your users are educated about cybersecurity risks

Posted on January 4, 2016

I read about it all the time in the news…another company falls victim to cybercrime. Whether it’s a phishing attack or a hacked password, your company can be vulnerable if you […]

, , , , , ,

5 Ways Your Email Could Be At Risk

Posted on December 15, 2015

Nearly all businesses rely on email to assist with day-to-day activities. But many businesses haven’t addressed new and seemingly unavoidable vulnerabilities.  If you are running an […]

, , , , , ,

The Business World’s Riskiest User Will Surprise You

Posted on December 14, 2015

And your customers need to know. Educate them on how to combat risky user security practices and manage access to IT services during employment – and after employment ends. In our 2015 […]

, , , , ,

Ryan Barrett talks IT risk management and compliance with Michael Heller at TechTarget

Posted on December 8, 2015

As we start planning for 2016, I’m sure a lot of us will be focused on “doing more with less”. That includes streamlining processes and finding ways to speed up […]