Category: New Feature Announcements

Preventing Email Forgery Part One: SPF

December 19, 2023

Some of the most dangerous cybersecurity threats originate with email, costing businesses millions of dollars annually. How can you increase your email security and prevent email fraud? In this series, we will look at how to use DNS records to prevent email forgery. The first and simplest method is SPF – Sender Policy Framework. Below, […]

New Email Authentication Requirements from Google and Yahoo: What You Need to Know

December 12, 2023

Google and Yahoo have recently announced their latest updates aimed at reducing spam and spoofed emails. These updates affect everyone sending emails to Google or Yahoo users. They apply fundamental authentication requirements to regular email, and further requirements apply to those sending higher volumes of bulk emails. These new requirements apply to all email platforms […]

Overcoming Barriers to Successful Digital Health Patient Engagement

October 31, 2023

Effective patient engagement is a goal for many healthcare organizations because of the benefits. When patients are engaged in their healthcare, illnesses are diagnosed sooner, bills are paid faster, and patient satisfaction is increased, leading to better business outcomes for the healthcare organization. Advances in technology have made it easier to achieve successful digital health […]

AI Threats to Email Security

October 17, 2023

Artificial intelligence is a buzzy topic in the tech industry right now. Many experts are looking to AI to help solve some of the complex challenges of our times. However, besides this technology’s helpful and practical applications, there are some concerns that AI can be used for malicious purposes. In this article, we review some […]

Is TLS Email Encryption Suitable for Compliance?

September 19, 2023

This article discusses what types of email encryption are sufficient to comply with government regulations. TLS email encryption is a good option for many organizations that manage sensitive data. However, it does not protect data at rest. Each organization must perform a risk assessment to determine which encryption methods suit their legal requirements.