www.1001TopWords.com |
New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue
In 1997, I decided after 15 years as a practicing CPA that it was time to put down my pencil and explore a new venture on the exciting new internet which, while perhaps not exactly in its infancy at that point, was still at least a pimply faced teenaged medium still unexplored by most accountants. I founded CPAsites.com and made a life for myself and a few other employees by designing and managing websites for CPA firms across the country. We had no competition in the early, heady days of the late 90's and were able to quickly secure a name for ourselves by offering quality sites to quality firms. Since 1997 however, the internet has grown from a pimply faced teenaged medium to a...well, goliath-sized pimply faced teenaged medium. I can recall getting my first spam messages in the early days of email and like everyone else, I thought they were "kinda' neat" in the way that my teenage daughters think college mail is "kinda' neat." As a website developer in 2005 however, spam has become the bane of my existence. Invariably, once a week, we get a call or email from a CPA exasperated by the volume of spam email he or she is receiving and, also invariably, we - or the website we host for the accountant - gets the blame. "Please remove all of our email addresses off the site!" they proclaim with finality. So much for the golden age of instant internet communication at your fingertips. Dutifully, we would comply with their requests and it wasn't until I endeavored to solve another common CPA complaint that I stumbled on the perfect solution for email theft. For several years, the second most common complaint coming from my CPA clients was concerning an easy way to have clients email them securely from their website. After we explain to them the intricacies of password management and secure logins, they immediately dropped their security plans. They, like everyone else on the internet, suffer from "password fatigue" and weren't about to subject their clients to learning and remembering yet another password just to send their CPA some tax information. About a year ago, we finally decided there SHOULD be an easy way to just click on a website or email link and download a person's encryption key so that you can email encrypted documents to the individual. We searched. There wasn't. Seeing a critical need not only for our CPA clients, but also for attorneys, physicians and other financial professionals, we called an encryption programmer, gave him our idea and said "do it." The result is CipherSend.com which began selling in March of 2005 for $19.95. As the encryption programmers promised, it works perfectly for what we needed (click the button, encrypt anything and send it with no password), but imagine our surprise when we realized it also solved an even bigger problem - spambots stealing our clients' email addresses! When our clients replace their email addresses with CipherSend buttons, spambot crawlers are stopped in their tracks. The button-owner's email address is stored on our secure server, not on his or her public website. Needless to say, both we and our clients were rather delighted that a "side effect" of the program was even better than the intended cure! The service is ideally suited for professionals and physicians who can now quickly and easily receive secure documents from clients, associates and patients at their standard email address without the inconvenience of giving out passwords or secure logins, but it is also finding a huge market among millions of aggravated spam victims needing to replace an email address posted on a public website or included in the coding of a contact form. CipherSend offers advantages over standard website email or contact forms with its spam-block security and double notification to site visitors when their email has been delivered and again when it is opened by the recipient. Despite the low price, CipherSend uses sophisticated 2048-bit RSA asymmetrical (two-key) encryption algorithms with maximum key length and meets government security regulations required in the healthcare industry for the transfer of patient medical information. Since messages and documents are encrypted right on the sender's computer with a downloaded public key and decrypted by the recipient's private key, CipherSend represents true end-to-end security. A demo of the button can be found on the CipherSend.com website and the program has a 30 day free trial membership. Generally, "the law of unintended consequences" is a nightmare scenario for people introducing a new product or service on the market, but for this fortunate CPA, "two birds with one stone" just took on new meaning and made my life a whole lot less stressful! Jeffery N Drake, CPA, MBAPresidenthttp://www.CipherSend.comhttp://www.CPAsites.com
|
RELATED ARTICLES
Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. That "person" is our spam filter that insists on sending me, the administrator, a notification when it blocks an email. It's also set to delete some other mail automatically, those would be that come from addresses that have sent me spam. So I have 4000 of these in my trash. Yippee. A Painless Plagiarism Solution A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest. Virus Nightmare..Lessons Learned I got a virus the other day, Thursday I believe and since then I have been making FRANTIC efforts to save all my info. An Open Door To Your Home Wireless Internet Network Security? This is not some new fangled techno-speak, it is a real tool to be used for the protection of your wireless internet network and LAN. African American SMBs have to realize that if your Internet connection is on 24/7 then your network, and it is a network that your computer is connected to, is at risk. Any business that uses the Internet to share or exchange information, news, or ideas with clients, vendors, partners, or other locations look in the reflection of your monitor and realize that your business is an unintentional (or intentional) target. What is Hacking? Are You a Hacker? WHAT IS HACKING? The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms... oh my! Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders Can you protect your computer from all possible viruses and other invasions? Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. Preventing Online Identity Theft Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. They may take out credit cards in your name, mortgages, or even worse. The internet has opened up a whole world of possibilities for these criminals, and the threat is very real. There are things that you can do to help prevent such a crime. It costs very little to protect your information, and it is money well spent. The Never Ending Spyware Story It's been with us since 1993, it's gotten more intrusive, more complicated. Steganography ? The Art Of Deception & Concealment The Message Must Get Through-----------------------------The year is 300A.D., and you're part of a war machine unlike anything the world has ever seen. You are a field General for the Roman Empire and charged with assimilating yet another non-Roman culture. Your current mission; get tactical information you've collected in the field to an outpost one hundred miles away. The land between you and the outpost is treacherous and filled with enemy. The information you've collected is critical to the success of the current campaign and must reach the remote outpost intact. This will call for ingenious deception. Identity Theft Article ? A Phisher Is Trying To Steal Your Identity! Sooner or later everyone with an email account will receive a phishing attempt from some internet scammer. What is phishing? How can you protect yourself? These are some of the questions this identity theft article will provide, along with some free resources and practical advice on how to protect your online identity. Password Security and Safety There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. If your password becomes compromised, there are limitless consequences to what could happen. There are a few very important factors in keeping your passwords safe and secure that everyone should adhere to. Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing. What I am talking about here is not going after your ordinary, everyday catch. Yet a fine catch it indeed may be to those thieving bandits if they can lure you into giving up your personal and private information. Trickery is vast and common on the World Wide Web. Beware, I say, beware! The Importance of Protecting Your PC from Viruses and Spam Today the internet is a mine field of malicious code looking to harm your computer. Hackers want to have access to your PC for both fun and profit. You must be diligent in your ability to detect and then protect your important computer data. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. Instant gratification, so coveted by our lifestyles, is something to be very wary of in the realm of online business. Avoid Internet Theft, Fraud and Phishing Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. Online services such as Internet banking save time and money. However, from the depths of its vast expanse have come the dregs of society intent on preying on the new, the naïve, and the less informed. How To Prevent Spyware Attacking Your Computer Spyware is software or hardware installed on a computerwithout a user's knowledge. It gathers information andreports it back to its source. It ties up bandwidth, slowsdown CPU speed and generally is a nuisance. Secure Your PC From Hackers, Viruses, and Trojans Viruses, Trojans and Spyware: Protecting yourself. Hacking the Body Via PDA Wireless Device First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. We all know that the brain runs on chemicals and waves. We know from medicines, vitamins, alcohol, drugs and food intake that we can alter those chemicals. And most of us understand that brain waves are about allow for the process of cognition. The computers we use also run on frequencies which are use to hearing about for instance Pentium Chips running 1.2 GigaHertz. Cell phones run 800 MHz approximately. Also the power supply in a computer runs on a certain cycle creating another set of waves. |
© Athifea Distribution LLC - 2013 |