Email security

Security of company emails is becoming more and more important. For example, the massive Sony hack that exposed countless internal emails compromised a lot of internal information, both personal and financial, occurred because the attacker was able to gain access to the email system, which was not encrypted. Email encryption is a critical part of […]

Security becomes daily routine – gpg4o 3.4 with new features for commercial and private e-mail encryption

Dreieich, 13 January 2015 – Just in time for the start of the year, the latest version 3.4 of the email encryption add-in gpg4o has been released. Inspired by customer feedback and corporate needs, the update above all brings new features for administrators to improve and further simplify integration into the corporate environment. In addition, […]

How To Protect Confidential Data

05.01.2015 | Blog

There is a lot of confusion about how to make sure your important business data is well protected. But there are good data security alternatives for those willing to do just a little work. E-mail Policy First and foremost, establish and maintain an e-mail policy for your company. E-mail encryption with a standard like openPGP […]

gpg4o 3.4 Released

Distributed since Dec. 19 2014 – gpg4o 3.4 is available now. As usual we did a lot of development below the surface. Security and useability are the key issues. gpg4o 3.4 delivers even more security Our longtime customers know: Quality and Security are capitalized at Giegerich & Partner. Therefore we reviewed the complete sources to […]

gpg4o 3.4 Beta 1 available

It has been a long and intense development work with lots of quality assurance. Yet here we go: gpg4o 3.4 Beta 1 is available. We emphasized on better integration of gpg4o in enterprise environments, optimized user experience again to make email encryption even easier to use. In addition, compatibility to other OpenPGP based implementations has […]

How to protect your Emails and Internet Browsing from government surveillance

With the rampant Internet eavesdropping happening from many sources including government agencies (e.g. NSA) and criminals, it should be the top priority of a company to safeguard its email communication. Any potential leaks into company’s confidential data can have a detrimental effect on the company, which could potentially shut down its operations. PGP to the […]

The Importance of Encrypting Emails Using OpenPGP

29.07.2014 | Uncategorized

With the widespread reliance upon emails for quick communication between employees, internet security has become more important than ever. A malicious party gaining access to sensitive information contained within emails can spell disaster for a company, which is why encryption using a strong protocol is absolutely vital. OpenPGP is an encryption standard that is secure […]

Internet and Email Security in Companies

20.07.2014 | Uncategorized

As the recent Goldman Sachs email breach has pointed out, it is critical for companies to utilize proper encryption and mail archiving techniques in order to protect sensitive data. This is an issue that is even more important for certain high-profile businesses, including law firms and solicitors. Failure to take the proper steps by implementing […]

Let’s create a better internet together / Security in the Web

19.02.2014 | Uncategorized

Internet security is a growing concern amongst companies keen to protect their data from outside scrutiny or tampering and their systems from malicious attacks. Fortunately, there are some simple measures that businesses can take to ensure their data remains as secure as possible. Why email security is important IT-security, and email security in particular, is […]

Secure e-mail communication within companies

10.01.2014 | Uncategorized

  Many senior staff would like to view internet security breaches as the result of either the intrusion of a James Bond super cyber-villain or of an inside job. According to Verizon’s 2013 data breach report, 92 per cent of breaches originate outside of a company and the majority of successful attacks rely on low-tech […]