The IronBox Team Blog

How to Send Encrypted Email

Easily one of the most common questions we get is how to send encrypted email. In this article, I’ll show you a quick and easy way to encrypt data so you can send it using any email client (Microsoft Outlook,

Read More

Protecting ePHI Data on Mobile Applications for HIPAA – Part 1 (for Non-Geeks)

In a few days we will be publicly releasing our IronBox Secure File Transfer mobile application for Apple iOS devices on the App Store for our customers. As with any software we produce here at IronBox, we focused specifically on

Read More

IronBox Launches “One Click” Email Encryption Technology for Law Firms and Accounting Firms

Company offers free trial of encryption technology to protect Microsoft Outlook emails REDMOND, WA—February 12, 2014—Redmond-based IronBox, a leader in Internet security, data protection and application security, today announced the launch of its email encryption technology for law firms and

Read More

What You Probably Didn’t Know About the Kaiser Foundation Health Plan Data Breach

This past January 2014, the Attorney General of California filed a complaint against Kaiser Foundation Health Plan, Inc. for the data breach of about 30,000 social security numbers. The SSNs were found left on an external hard drive which was

Read More

Top Data Protection Questions I Would Ask Your Vendors in 2014

I read an article this past week that gave readers a checklist on protecting data. One of the bullet points the author provided read something like this “Ensure your vendors are also secure”. Not a lot of prescriptive guidance followed.

Read More

The Most Used Passwords, Top 25

ESET gathered information from a bunch of data breaches and compiled this list of the 25 most used passwords.  It really shouldn’t surprise anyone, but there’s a lot of weak passwords still being used today.  Take a look at the

Read More

Target’s Partners Asymmetrical Risk Problem

Here’s a new twist on the Target hack:  Target’s payment partners could also be exposed to consume lawsuits and fines from the folks at Visa and Mastercard.  Classic example of asymmetric risk, interesting read and ramifications. http://money.msn.com/business-news/article.aspx?feed=OBR&date=20140114&id=17260087 Enjoy, –Kevin

Read More

Neiman Marcus Hack

The retail chain Neiman Marcus reported last week that it was hacked in mid-December last year. Here’s an article from the Washington Post, not much details on the hack, but it did elude to more retailers that got hacked.  It’ll

Read More

It’s the Season for … Identity Theft!

It’s time to do your taxes again, which means lots of personally identifiable information (PII) will be transmitted back and forth (hopefully securely).  Here’s an article on identity theft and how you can expect it to grow during the tax

Read More

Looks Like the Target Data Breach Got Worse

Originally reported to be 40 million accounts breached, according to this news story the number is actually closer to 70 million.  Part of the article indicated that Target would miss its targets, speculating that it might be in part due

Read More