Login
LinkedIn1.png
VeilMail-Cloured_line.jpg
  • VeilMail Secure email Messaging

     UNDER THE VEIL 

    Privacy Matters!

     

VeilMail_No_Leaks_No_Trail_No_Fail_Communications_1.png
VeilMail_No_Leaks_No_Trail_No_Fail_Communications.png
VeilMail_No_Leaks_No_Trail_No_Fail_Communications_2.png

The Information Security Check List for the Board or CEO

Posted by Greg Roake

03/03/15 06:52

Warning: ignoring data security can seriously undermine your financial position

Information security issues are a Board's responsibility

The average number of days a hacker has access to your network before being discovered is estimated at 267 days (A1). As a senior officer of the company you need to appreciate that the hacker is generally not there to disrupt, but rather is fishing for key information going in and out that could be financially rewarding to them.

Any financial reward they gain will be a loss to your shareholders, customers and business partners. The Sony attack is still very fresh in everyone’s mind, but seriously there are so many instances of hackers profiting from poorly protected corporate systems one wonders just what is discussed around the board table on "how are we placed when it comes to the risk of being hacked?".

Read More

Topics: information security issues, Cyber threats are a board responsibility

The internet privacy horse has bolted

Posted by Greg Roake

18/12/14 09:07

The horse has bolted as far as Internet Privacy goes

You are delusional in believing that encryption on its own is THE answer to internet privacy?

Call me naive but I think that the horse seemed to have bolted some time ago and all of this encryption activity we are seeing is just window dressing and feel good fluff!.

The Wiki Leaks put paid to the belief that the internet was private.  Slowly since those early revelations we have seen a growing move to utilise encryption technology to protect our data and email communications from prying eyes on both sides of the fence. 

Read More

Topics: Privacy Issues, Privacy Opinions, Secure email

Looking for solutions for overcoming internet intervention in China?

Posted by Greg Roake

01/10/14 11:11

Is your business with China being effected by unreliable internet connection?

The New York Times reports that “China’s Communist government has tightened its control over the Internet so much recently that businesses, researchers and ordinary people are finding it hard to complete basic and innocuous tasks, like placing ads on websites, sharing documents and reading technical documents. (Read the complete article here)

Official Beijing Internet Intervention Not Unusual

As the New York Times reports “government censorship has been a fact of life in China for many years

Read More

Topics: Privacy Issues, Business WISE

Irony - Search engines looking for spy-free email solution

Posted by Greg Roake

24/09/14 13:25

WSJ reported recently that Yahoo are to join Google to create spy-free email systems

(Reuters) - Yahoo Inc said it will join Google Inc to create a secure email system by next year that could make it nearly impossible for hackers or government officials to read users' messages, The Wall Street Journal reported. Read the full story here 

Nearly, in our view, is not enough! It's either secure or it's not.

The irony is that a simple search using their own technology will reveal that New Zealand based Turner Technologies has recently released a totally secure communications email system - VeilMail, designed for users who have email privacy issues - read more here 

Try these searching these key words:

Read More

Topics: Privacy Issues, Privacy Opinions, Business WISE

Secure, Business to Business Email

Posted by Greg Roake

23/07/14 12:24

Destruct means destruct - right?

You take a picture on SnapChat and send to a friend or two.  After a preset period the recipient/friend cannot view any more. Gone, deleted or self destructed is the claim.

WELL – not able to be accessed by the recipient is closer to the truth.  How are all these kids going to cope in 20 years time when all the risqué pictures they sent to their mates get released in image libraries for the rest of the world to use.

What goes into cyberspace is encapsulated there, and could turn up anywhere at any time. Beware!

How does this relate to my secure business to business communications?


Read More

Topics: Privacy Opinions, Business WISE

About this blog

There are times where privacy matters. Under the Veil explores the concept of PRIVACY - when and why it matters, and how to ensure that when privacy matters it does and that delete actually means delete.

Enjoy and do join the debate.

Spread the word - Privacy Matters!

    

Subscribe to Email Updates

Recent Posts

Test Drive VeilMail  for Free CLICK HERE