Zix in the News.

Our experts provide leading insight into email security challenges, solutions and trends.

homepage

 

The Zix team of experts regularly offers commentary and contributes thought-leading articles to technology, industry and business media. Check out all of our insightful contributions below.

In addition, our CEO David Wagner is a member of the Forbes Technology Counsel. To read his latest article, visit this:

Forbes Page

Five Ways to Improve Compliance—And Not Feel Overwhelmed

WealthManagement.com | 07/02/2018

Compliance is a constant struggle in the financial services sector. As soon as one audit is done another arises, locking brokers into an endless effort with hefty consequences for failure. And that effort evolves and expands with new communication tools.

Regulators Signal That New Data Archiving Rules Are Coming

ThinkAdvisor | 06/29/2018

Cybersecurity concerns are driving an evolution of financial regulations. Financial Industry Regulatory Authority CEO Robert Cook recently elaborated on what that evolution might look like. He believes self-regulators will need to be more vigilant about maintaining the client’s best interests, abiding by fiduciary requirements, and articulating customer relationships. To a certain extent, each of those issues is tied to cybersecurity.

5 ways smaller healthcare organizations can bolster security

Health Data Management | 06/28/2018

The mergers and acquisition market is heating up in healthcare, both in the number and size of deals. As of late September 2017, there had been at least 561 hospital mergers since 2010, and four of the biggest last year involved entities with revenue of more than $1 billion. As the healthcare landscape continues to transform, M&A is likely to become a common occurrence and a ubiquitous strategy for smaller organizations.

Why Investors (and You) Need to Care About Cybersecurity

StartupNation | 06/27/2018

It makes sense that startups tend to underestimate cybersecurity. After all, they are small targets with limited amounts of data to steal. Many entrepreneurs believe that they are not even on hackers’ radar. That attitude is understandable, but unfortunately, it’s also inaccurate.

Protecting patients and providers from rising rates of healthcare fraud

Becker's Hospital Review | 06/27/2018

Cybercriminals are overcoming their ethical aversions to targeting healthcare and instead are making the industry their primary target — largely because it’s a massive repository of protected health information or personally identifiable information. Regulations enacted in the Health Insurance Portability and Accountability Act are designed to protect this data, but today’s hackers are highly motivated.

Kick suspicious email attachments to the sandbox

ITProPortal | 05/22/2018

Cybersecurity must simultaneously address two major challenges: identify, deflect, and mitigate every type of cyberattack that does (and will) exist; and provide ironclad security without slowing down operations or interrupting workflows. These priorities are in opposition and conspire to further complicate users' understanding of cybersecurity.

How to Feel Secure With Your Data in 2018

readwrite | 04/20/2018

Implementing multiple layers of security is the common thread for today’s data security strategies. The layered approach has worked in some cases. However, other companies have still become vulnerable to hackers. In fact, numerous large global enterprises with significant technology budgets have fallen victim to hackers. It may make you wonder just how realistic it is to feel secure that your data is truly protected.

What new email security standards mean for federal agencies

Federal Times | 03/28/2018

As of Jan. 15, all government agency domains are required to have Sender Policy Framework (SPF) and Domain-based Message Authentication, Reporting and Conformance (DMARC) records in place, according to an October 2017 order issued by the U.S. Department of Homeland Security — a major step in governmentwide cybersecurity.

What the SEC Has Signaled to Public Companies About Cybersecurity

Innovation Enterprise | 03/23/2018

Historically, cyberattack consequences have ranged from reputation damage to strained partner relationships to heightened investments in IT and security. Increasingly, however, companies must also consider legal and regulatory consequences.

How to Weed the Bad Links Out of Your Inboxes

Security Today | 03/12/2018

While malicious links are not a new cyberthreat, this tactic remains a pervasive and effective hacking technique. For instance, with the Meltdown and Spectre vulnerabilities recently threatening billions of computers, many people, urgent to find information and solutions, clicked a link that arrived unsolicited in their inboxes, purportedly from the German Federal Office for Information Security. The link appeared legitimate and promised to provide a defense strategy. Instead, the very malware that those users were trying to avoid was installed on their computers.

Displaying results 31-40 (of 113)
 |<  <  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10  >  >|