Taming Email Requires Democratization, Not Specialization

Taming Email Requires Democratization, Not Specialization

Self-Sufficiency Must Match Inconsistency The natural course of progress has been to specialize. One person does one thing really well and does it for all the others who have their own specializations. The difficulty is this makes the system fragile. Failure of one...
Taming The Wild West Of Email With Enveloperty

Taming The Wild West Of Email With Enveloperty

Putting Down Bullies As standards are raised, certain tactics and innovations irrevocably keep that standard. One such innovation was the revolver. Being able to sequentially fire bullets simply and reliably forever changed combat. Most importantly it allowed for a...
Colt Made Them Equal, Enveloperty Makes Phishing A Fight

Colt Made Them Equal, Enveloperty Makes Phishing A Fight

Goliath Vs The Grandma In the days before the revolver, size and training was everything. A grandma taking on Goliath would never prevail. Even with the advent of gunpowder, firearms were too unwieldy for many to use. But with a revolver, all grandma needs is one good...
Email Must Show ID For Entry

Email Must Show ID For Entry

How Is This Not Already Required? Anyone who has flown or crossed a border has seen the signs reminding people to have their identification ready. The ID verifies that you are who you say you are, and provides context when run through the system. Such as if there are...
The One Click Phishing Check

The One Click Phishing Check

Security Discipline In A Quick & Complex World The most frequent trade off of having good security is ease of use. This is a leading problem due to our modern work environment being distinctly fast passed and complex. Introducing voluntary disruptions like...
Anti-Phishing Success Requires Instruction AND Equipment

Anti-Phishing Success Requires Instruction AND Equipment

Golf With A Hockey Stick People are not the extent of their equipment but are certainly limited to it. You aren’t guaranteed to win a golf tournament with proper gear. But you are guaranteed to lose if you play with a hockey stick. If someone knows next to nothing...
Anti-Phishing Training Is Fixable

Anti-Phishing Training Is Fixable

It’s All About The Execution Phishing is an abstruse threat. In essence it is just lying with a goal and a plan. Deception is everywhere when humans interact, some by accident, some not by accident. There are specific markers one can look for in email phishing....
Anti-Phishing Training Raises Questions

Anti-Phishing Training Raises Questions

Enveloperty Provides Answers Anti-phishing training is about exposing trainees to the dangers of phishing and shaping their mind about how to think about using email safely. Training does an excellent job of educating people to the possibilities. But most programs are...
Hey I Need This From You Real Quick… And Hacked

Hey I Need This From You Real Quick… And Hacked

What If A Hacker Pretended To Be You? Spoofing is the security term for when someone pretends to be someone else. The whole point of building relationships is to build trust. But what if in that relationship, a hacker pretended to be you? Imagine you are on onboarding...

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Share This