The rapid development and increasing interconnectedness of internal and external business processes and the challenges this poses places new demands on companies. In addition to the […]
As many know, email is not naturally well suited for sending large file attachments. Most email providers enforce file size limitations on email attachments. One can […]
Part 3 of our series: “Done any tricks today?“ addresses solutions for ensuring verifiable and secure e-mail correspondence. In addition, we should not forget the EU […]
When it comes to the delivery of standard e-mails, employees have little faith in the technology. How often is the phone grabbed simply to ask “has […]
In this series, which will be published at irregular intervals, we will take a closer look at the subject of “e-mails”, in particular which effects the […]
Cyber criminality and identity theft have now become one of the strongest growing forms of crime on the Internet. The hackers attack on the recently elected […]