Zix in the News.

Our experts provide leading insight into email security challenges, solutions and trends.



The Zix team of experts regularly offers commentary and contributes thought-leading articles to technology, industry and business media. Check out all of our insightful contributions below.

In addition, our CEO David Wagner is a member of the Forbes Technology Counsel. To read his latest article, visit this:

Forbes Page

Could Your LinkedIn Account Threaten Your Compliance Strategy?

Forbes | 10/22/2018

As the president of an email security company that's focused on archiving and compliance needs, I know it’s also critical for companies to understand LinkedIn's potential risks and looming obligations. Ever larger amounts of information are funneling into LinkedIn, and at least some falls under current or forthcoming regulations. Companies should begin managing it as such. Otherwise, something that is widely seen as an asset could unnecessarily become a liability.

Do You Know Your Risk of Cyberattack?

Entrepreneur | 09/04/2018

Business email compromise is the bane of small businesses, because these phishing scams target companies with minimal processes, protocols and protections in place -- like those too small to have extensive cybersecurity budgets. According to the FBI’s Internet Crime Complaint Center, business email compromise costs more than $675 million in damage in 2017, so the June arrests of 74 cyber criminals in the United States and abroad was a triumph for both large and small companies.

Compliance costs, in competitive context

Banking Strategies | 08/02/2018

There’s plenty of room for financial services firms to spend more on data protection and cybersecurity. Looking at the dollars and cents reveals that the expense really represents an investment with a tremendous return. Firms need to understand this because the amount they pump into compliance is about to skyrocket.

How Fake Emails Have Become A Real Threat

Health IT Outcomes | 08/01/2018

Today’s impersonation-based attacks are highly sophisticated and extremely convincing. The emails come from what appear to be real people (or companies) you know and trust. The details are stunning, and the messages seem legitimate, largely because hackers have scoured the internet to learn specific details about you, the people in your circle, your job, and so much more. Scraps of personal information gleaned from online company bios, Twitter pages, and LinkedIn profiles are all a hacker really needs in order to spoof you.

Keys to Sound Investment for Financial Compliance Needs

International Banker | 07/17/2018

Financial data is highly vulnerable and subject to sweeping data protections as a result. As more business tools become available, the costs rise. Rather than increasing investment in compliance, some companies forgo using new business tools. While that may ease costs and save time, it jeopardizes opportunities to grow the business and opens a competitive edge to other firms in the market. It also leaves the business exposed if employees take risks and work around restrictions. Users might be happier in the short term, but data and compliance are vulnerable in the long term.

Five Ways to Improve Compliance—And Not Feel Overwhelmed

WealthManagement.com | 07/02/2018

Compliance is a constant struggle in the financial services sector. As soon as one audit is done another arises, locking brokers into an endless effort with hefty consequences for failure. And that effort evolves and expands with new communication tools.

Regulators Signal That New Data Archiving Rules Are Coming

ThinkAdvisor | 06/29/2018

Cybersecurity concerns are driving an evolution of financial regulations. Financial Industry Regulatory Authority CEO Robert Cook recently elaborated on what that evolution might look like. He believes self-regulators will need to be more vigilant about maintaining the client’s best interests, abiding by fiduciary requirements, and articulating customer relationships. To a certain extent, each of those issues is tied to cybersecurity.

5 ways smaller healthcare organizations can bolster security

Health Data Management | 06/28/2018

The mergers and acquisition market is heating up in healthcare, both in the number and size of deals. As of late September 2017, there had been at least 561 hospital mergers since 2010, and four of the biggest last year involved entities with revenue of more than $1 billion. As the healthcare landscape continues to transform, M&A is likely to become a common occurrence and a ubiquitous strategy for smaller organizations.

Why Investors (and You) Need to Care About Cybersecurity

StartupNation | 06/27/2018

It makes sense that startups tend to underestimate cybersecurity. After all, they are small targets with limited amounts of data to steal. Many entrepreneurs believe that they are not even on hackers’ radar. That attitude is understandable, but unfortunately, it’s also inaccurate.

Protecting patients and providers from rising rates of healthcare fraud

Becker's Hospital Review | 06/27/2018

Cybercriminals are overcoming their ethical aversions to targeting healthcare and instead are making the industry their primary target — largely because it’s a massive repository of protected health information or personally identifiable information. Regulations enacted in the Health Insurance Portability and Accountability Act are designed to protect this data, but today’s hackers are highly motivated.

Displaying results 31-40 (of 118)
 |<  <  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10  >  >|