New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue
In 1997, I decided after 15 years as a practicing CPA that it was time to put down my pencil and explore a new venture on the exciting new internet which, while perhaps not exactly in its infancy at that point, was still at least a pimply faced teenaged medium still unexplored by most accountants.
I founded CPAsites.com and made a life for myself and a few other employees by designing and managing websites for CPA firms across the country. We had no competition in the early, heady days of the late 90's and were able to quickly secure a name for ourselves by offering quality sites to quality firms.
Since 1997 however, the internet has grown from a pimply faced teenaged medium to a...well, goliath-sized pimply faced teenaged medium. I can recall getting my first spam messages in the early days of email and like everyone else, I thought they were "kinda' neat" in the way that my teenage daughters think college mail is "kinda' neat."
As a website developer in 2005 however, spam has become the bane of my existence. Invariably, once a week, we get a call or email from a CPA exasperated by the volume of spam email he or she is receiving and, also invariably, we - or the website we host for the accountant - gets the blame. "Please remove all of our email addresses off the site!" they proclaim with finality.
So much for the golden age of instant internet communication at your fingertips. Dutifully, we would comply with their requests and it wasn't until I endeavored to solve another common CPA complaint that I stumbled on the perfect solution for email theft.
For several years, the second most common complaint coming from my CPA clients was concerning an easy way to have clients email them securely from their website. After we explain to them the intricacies of password management and secure logins, they immediately dropped their security plans. They, like everyone else on the internet, suffer from "password fatigue" and weren't about to subject their clients to learning and remembering yet another password just to send their CPA some tax information.
About a year ago, we finally decided there SHOULD be an easy way to just click on a website or email link and download a person's encryption key so that you can email encrypted documents to the individual. We searched. There wasn't. Seeing a critical need not only for our CPA clients, but also for attorneys, physicians and other financial professionals, we called an encryption programmer, gave him our idea and said "do it."
The result is CipherSend.com which began selling in March of 2005 for $19.95. As the encryption programmers promised, it works perfectly for what we needed (click the button, encrypt anything and send it with no password), but imagine our surprise when we realized it also solved an even bigger problem - spambots stealing our clients' email addresses!
When our clients replace their email addresses with CipherSend buttons, spambot crawlers are stopped in their tracks. The button-owner's email address is stored on our secure server, not on his or her public website. Needless to say, both we and our clients were rather delighted that a "side effect" of the program was even better than the intended cure!
The service is ideally suited for professionals and physicians who can now quickly and easily receive secure documents from clients, associates and patients at their standard email address without the inconvenience of giving out passwords or secure logins, but it is also finding a huge market among millions of aggravated spam victims needing to replace an email address posted on a public website or included in the coding of a contact form.
CipherSend offers advantages over standard website email or contact forms with its spam-block security and double notification to site visitors when their email has been delivered and again when it is opened by the recipient. Despite the low price, CipherSend uses sophisticated 2048-bit RSA asymmetrical (two-key) encryption algorithms with maximum key length and meets government security regulations required in the healthcare industry for the transfer of patient medical information.
Since messages and documents are encrypted right on the sender's computer with a downloaded public key and decrypted by the recipient's private key, CipherSend represents true end-to-end security. A demo of the button can be found on the CipherSend.com website and the program has a 30 day free trial membership.
Generally, "the law of unintended consequences" is a nightmare scenario for people introducing a new product or service on the market, but for this fortunate CPA, "two birds with one stone" just took on new meaning and made my life a whole lot less stressful!
US has ‘absolute legal right’ to shoot down Chinese spy balloon, say national security experts - Fox News
Tallahassee hospital cancels procedures, diverts EMS after IT security issue Tallahassee Democrat
TMH postpones all non-emergency patient procedures due to IT security issue - WTXL ABC 27 Tallahassee News
TMH postpones all non-emergency patient procedures due to IT security issue WTXL ABC 27 Tallahassee News
Band of Barbers, Judges and Security Guards Uses Soviet-Era Guns to Repel Russian Drones - The Wall Street Journal
Band of Barbers, Judges and Security Guards Uses Soviet-Era Guns to Repel Russian Drones The Wall Street Journal
Air Force warns Chinese company's North Dakota mill would be 'significant' national security threat - Fox News
Air Force warns Chinese company's North Dakota mill would be 'significant' national security threat Fox News
Deputy Secretary Sherman's Meeting with Poland's National ... Department of State
President Biden Announces Appointments to the President’s ... The White House
CBP proposes efforts to strengthen aviation security | U.S Customs and Border Protection
Biden Administration Announces Additional Security Assistance for ... Department of Defense
Electronic pollbook security raises concerns going into 2024 Chattanooga Times Free Press
Texas Senate leaders signal intent to spend big on border security The Texas Tribune
FAA Closes Three U.S. Airports Over National Security Risk Travel Market Report
Iran’s Security Forces ‘Systematically’ Targeting Protesters’ Faces ایران اینترنشنال
US. Department of Homeland Security and Finnish Ministry of the ... Homeland Security
DREAM THEATER's Concert In Oulu, Finland Canceled For ... BLABBERMOUTH.NET
Security Tight as North Macedonia, Bulgaria Honor National Hero Voice of America - VOA News
Downtown bars under new security guidelines following fatal ... The Turlock Journal
Palestinian leaders ‘rebuff' pressure to resume security coordination The Jerusalem Post
Statement of Homeland Security Secretary Mayorkas on the Family ... Homeland Security
Gigamon names Chaim Mazal as CSO Help Net Security
Additional security at Rolesville High School for Friday varsity games after Code Red Alert Wednesday - CBS17.com
Additional security at Rolesville High School for Friday varsity games after Code Red Alert Wednesday CBS17.com
Attacks on Electrical Substations Raise Alarm The New York Times
Barely Dressed Woman Meanders Through Security At The Miami ... View from the Wing
Memphis Police Chief Trained With Israel Security Forces The Intercept
Letters: Recruiting security volunteers could be quite useful, St. Paul and Minneapolis - St. Paul Pioneer Press
Letters: Recruiting security volunteers could be quite useful, St. Paul and Minneapolis St. Paul Pioneer Press
Turkey says West failed to share details of security threat The Associated Press - en Español
Hong Kong's largest national security trial to begin Monday as 47 ... Hong Kong Free Press
Williamsport security guard allegedly chokeholds boy PAHomePage.com
Transportation Security Administration confiscates 8th firearm at Reagan National Airport this year - Washington Times
Transportation Security Administration confiscates 8th firearm at Reagan National Airport this year Washington Times
FAA: Flights paused at Charleston, Myrtle Beach, and Wilmington due to national security - ABC NEWS 4
Teen arrested on suspicion of killing security guard at party in Muscoy San Bernardino County Sun
SRPD, cannabis companies gather to hash out security concerns ... The Santa Rosa Press Democrat
US will send Stryker combat vehicles to Ukraine for first time as part of $2.5 billion security package - CNN
US will send Stryker combat vehicles to Ukraine for first time as part of $2.5 billion security package CNN
DOD, Japan MOD Sign Technology and Security of Supply ... Department of Defense
DHS Announces Process Enhancements for Supporting Labor ... Homeland Security
More Than $3 Billion in Additional Security Assistance for Ukraine Department of Defense
JsonWebToken Security Bug Opens Servers to RCE Dark Reading
Git patches two critical remote code execution security flaws BleepingComputer
Microsoft ends Windows 7 security updates TechCrunch
Top Ten Spyware and Adware Threats Identified
On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you.
Backup and Save your business!
There you are busily typing away on your PC or yourLaptop, and all of a sudden the strangest thing happens.The screen goes black, extinquished like a candle in thewind.
Breaking Into Your PC: News...
You'd better learn news from media, not from emails, security experts warn us users again.Numerous emails with "breaking news" in subject lines are appearing in users' inboxes.
Wells Fargo Report Phishing Scam
First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information.
Fishing for Fortunes. Scam!
Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account.
Click Here To Defeat Evil
Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:"A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it.
How To Be Your Own Secret Service Agency
So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance.
Virus Prevention 101
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar?Have you been as bothered by viruses this past year as I have? Does it seem like there are more viruses, worms and Trojans out now then ever before? It is only getting worse.For the general public, "virus" has become a catchall term for any unwanted program that spreads from computer-to-computer; yet, in reality, there are differences between viruses, worms and Trojan horses.
What Can Be Done About Spyware And Adware
Having a good Spyware eliminator on your computer is vital now a days with all of the different Spyware, Adware, and other malicious computer parasites that are out there. Most of them are reasonably priced and very easy to use.
Corporate Security for Your Home Business
The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations.
The One Critical Piece Of Free Software Thats Been Overlooked
Can You Prevent Spyware, Worms, Trojans, Viruses,..
Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking
Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home.
Parental Control - Dangers To Your Child Online & Internet Child Safety Tips
Did you know..
Its War I Tell You!
There are ways to insure security though. You can get the Windows Update CD from Microsoft and install that before you get online, You can also get most Antivirus Definitions downloaded and save them to disk, then install those before you go online, (of course you have to be using that Product in the first place), and you can get Anti-Spyware on a disk and do the same.
Online Cell Phone Scams and Spam
They're out there. Individuals trying to make a quick buck at your expense.
Phishing - A High Tech Identity Theft With A Low Tech Solution
Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief.
Steganography - The Art Of Deception & Concealment
The Message Must Get Through-----------------------------The year is 300A.D.
Watching the Watchers: Detection and Removal of Spyware
If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you.
IPv6 - Next Step In IP Security
IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete.
Make Money Online - Latest Scam Disclosed
Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time.
|home | site map|