As of January 1, 2017, a new law has been enacted in France allowing employees to be offline outside of their working times.
France now also gets to take a break
Tags: Email // Email Security
As of January 1, 2017, a new law has been enacted in France allowing employees to be offline outside of their working times.
Tags: Email // Email Security
Texting is the most widely utilized on a smartphone – used by 97% of Americans at least once a day, and with 6 billion sent inside of the US every day. But how can organizations start utilizing SMS?
Tags: Enterprise SMS
70 of all companies previously held to ransom by perpetrators of a ransomware attack ended up paying the ransom demanded in order to regain access to their data.
Tags: Email Security // Patient Zero Detection // Ransomware
Tags: Infographic // xmas
Anyone working at a company is unlikely to be knocked off their swivel chair by this piece of news. In fact, most members of staff are still provided with a desktop computer by their employers.
Tags: Desktops & Devices // Retarus Cloud Services
For like a year and a half Silicon Valley started spreading the gospel that messaging was set to revolutionize the use of mobile devices, ushering in the post-app era.
Tags: Chatbots // Enterprise SMS // Messaging
Almost all US colleges and universities require applicants to go through an extensive admissions process that involves submission of an application along with supporting documents. A few colleges and universities are moving away from handling paper documentation by switching to electronic files on a secure and private cloud infrastructure. Processing digital documents has resulted in enhanced security by improving the ability for multiple reviewers to concurrently find and process documents.
Tags: college admission // digitization // Public Sector
Retarus E-Mail Security customers are given the option of either marking and delivering legitimate mass-emails or sending them straight to quarantine. So far we’ve have been calling all such emails “newsletters”. From now on we will instead be using the more accurate term “graymail”
Tags: Email // Email Security // Graymail
CIOs would do well to pursue a risk management led approach when selecting, commissioning and supervising their IT service providers.
Tags: Data Protection // IT-Security // Risk Management
Tags: All-IP // Cloud Fax // Infographic