Inciter | 2013 June
0
archive,date,ajax_fade,page_not_loaded,,select-child-theme-ver-1.0.0,select-theme-ver-1.7.1, vertical_menu_background_opacity,smooth_scroll,wpb-js-composer js-comp-ver-4.11.2.1,vc_responsive

The Cryptic Problem of Encryption

by Sarah McCrudenSo you’ve compiled some raw data for your next big report, or, you’ve come across a few clients’ records that have errors that need to be addressed. If you need to share these tasks with a coworker, email is often the most convenient method for sharing: just attach and send! Sounds simple. But, have you ever wondered just how the email makes its way to the recipient—and whether it’s really safe on its journey there?According to Leo Notenboom, a personal computer and software industry expert, concerns about email interception may be exaggerated: “It is possible to sniff and eavesdrop on email conversations. It's also not particularly easy, unless you're on an open WiFi connection.” Yet, he goes on to say that, “by default, the contents of email is...

Read More