{"id":1489,"date":"2018-03-27T10:00:15","date_gmt":"2018-03-27T15:00:15","guid":{"rendered":"http:\/\/www.exchangedefender.com\/blog\/?p=1489"},"modified":"2018-03-15T14:27:39","modified_gmt":"2018-03-15T19:27:39","slug":"why-is-there-suddenly-a-heavy-demand-for-encryption","status":"publish","type":"post","link":"https:\/\/www.exchangedefender.com\/blog\/2018\/03\/why-is-there-suddenly-a-heavy-demand-for-encryption\/","title":{"rendered":"Why is there suddenly a heavy demand for Encryption?"},"content":{"rendered":"<div id=\"attachment_1490\" style=\"width: 750px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/security-265130_1280-100723186-orig_1.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1490\" class=\"size-full wp-image-1490\" src=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/security-265130_1280-100723186-orig_1.jpeg\" alt=\"\" width=\"740\" height=\"493\" srcset=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/security-265130_1280-100723186-orig_1.jpeg 740w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/security-265130_1280-100723186-orig_1-300x200.jpeg 300w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/><\/a><p id=\"caption-attachment-1490\" class=\"wp-caption-text\">Email encryption is on the rise, ExchangeDefender offers two types of encryption.<\/p><\/div>\n<h2 style=\"text-align: left; padding-left: 30px;\"><span style=\"color: #000000;\"><br \/>\nWhat is behind the growth in the adoption of email encryption?<\/span><\/h2>\n<p style=\"padding-left: 30px;\"><span style=\"color: #000000;\">Over the past year we\u2019ve seen an explosion in sales of ExchangeDefender <span style=\"color: #0956a4;\"><strong><a style=\"color: #0956a4;\" href=\"http:\/\/exchangedefender.com\/encryption.php\">Email Encryption<\/a> <\/strong><\/span>\u2013 which is a surprise given that we\u2019ve not only had it for years but that we\u2019ve also given it away for free. <strong>HIPAA<\/strong> has been around for over 20 years, dozens of other regulations that almost all companies ignore have been gone for just as long \u2013 so why now?<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"color: #000000;\">In one word:<strong><span style=\"color: #0956a4;\"> penalties<\/span>.<\/strong><\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"color: #000000;\">Companies have long known that they can&#8217;t operate efficiently without email &#8211; and that they cannot just move files around <em>&#8220;just to get it to them&#8221;<\/em> once they see the penalties. But selling a service to someone that has avoided using or paying for it is never an easy discussion so here are the<span style=\"color: #0956a4;\"> <strong>3 quick questions<\/strong><\/span> that should lead you to an effective pitch in under 1 minute:<\/span><\/p>\n<h4 style=\"padding-left: 30px;\"><span style=\"color: #0956a4;\">1. Who sends you encrypted messages?<\/span><br \/>\n<span style=\"color: #0956a4;\"> 2. Who could get hurt if this information went public?<\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"color: #0956a4;\"> 3. What is your exposure? How much negligence insurance do you have?<\/span><\/span><\/h4>\n<p style=\"padding-left: 30px;\"><span style=\"color: #000000;\">The more they mumble, the more of those questions they cannot answer, the more details or costs or scope they don\u2019t understand, the more they need it. End your question with this line: <em><u>How comfortable would you be having this conversation in a legal deposition?<br \/>\n<\/u><\/em><\/span><\/p>\n<div id=\"attachment_1503\" style=\"width: 786px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/business-report-1955822_960_720.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1503\" class=\"wp-image-1503\" src=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/business-report-1955822_960_720.jpg\" alt=\"\" width=\"776\" height=\"582\" srcset=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/business-report-1955822_960_720.jpg 960w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/business-report-1955822_960_720-300x225.jpg 300w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/business-report-1955822_960_720-768x576.jpg 768w\" sizes=\"auto, (max-width: 776px) 100vw, 776px\" \/><\/a><p id=\"caption-attachment-1503\" class=\"wp-caption-text\">Grow your business: Positioning ExchangeDefender&#8217;s Encryption feature.<\/p><\/div>\n<h3 style=\"padding-left: 30px; text-align: left;\"><span style=\"color: #000000;\"><br \/>\nElevator pitch: How to position<span style=\"color: #0956a4;\"><a style=\"color: #0956a4;\" href=\".http:\/\/exchangedefender.com\/encryption.php\"> ExchangeDefender Encryption<\/a><\/span> as an answer to all of the above problems<br \/>\n<\/span><\/h3>\n<h4 style=\"padding-left: 60px;\"><span style=\"color: #0956a4;\"><br \/>\n\u2192It is included in your ExchangeDefender Pro subscription and it\u2019s transparent \u2013 no software to install, nothing to manage or configure.<br \/>\n<strong>\u2192<\/strong> You\u2019ll be using the same process and same security major banks, health care providers and lawyers use \u2013 so you\u2019ll be protected from most critical security exploits.<br \/>\n<strong>\u2192<\/strong> Finally, it\u2019s dead simple to use \u2013 all your employees need to do is put [ENCRYPT] in the subject when they are sending the message. Doesn\u2019t matter if it\u2019s on the phone our Outlook or Outlook Web Access, it just works.<\/span><\/h4>\n<p style=\"padding-left: 30px;\"><span style=\"color: #000000;\">Ding. You\u2019re done. It\u2019s virtually impossible not to sell this service \u2013 and it\u2019s desperately needed by anyone using email to do business or conduct confidential discussions. <span style=\"color: #0956a4;\"><strong>One more thing<\/strong><\/span>: Because encryption is transparent and on demand in the cloud, <em>it also protects you when the security issue is on the recipients end<\/em> \u2013 because email is never stored on their PC or device, if someone hacks their network they won\u2019t be able to get to the info stored in your encrypted message!<\/span><\/p>\n<h3 style=\"padding-left: 30px;\"><span style=\"color: #000000;\">If email is a business necessity then email encryption is it\u2019s insurance policy.<\/span><\/h3>\n<p style=\"padding-left: 30px;\"><span style=\"color: #000000;\">If you discuss business over email, then anything confidential that should be in that email should be a matter of employee communication protocol: <em>If you attach something sensitive to this message, you better encrypt it and CYA.<\/em> This is the way things go at banks, with lawyers, with accountants, with realtors and at nearly every white collar job: Nobody wants to assume the liability so they\u2019ll all do what it takes to protect the data.<br \/>\n<\/span><\/p>\n<h4 style=\"padding-left: 30px;\"><span style=\"color: #000000;\">And with high profile hacks and compromises in the news daily, is not having it worth risking the whole company?<\/span><\/h4>\n<p>&nbsp;<\/p>\n<h4 style=\"padding-left: 30px;\"><a href=\"http:\/\/exchangedefender.com\/partners.php\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1528\" src=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/blog-post-footer-1024x215.jpg\" alt=\"\" width=\"895\" height=\"188\" srcset=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/blog-post-footer-1024x215.jpg 1024w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/blog-post-footer-300x63.jpg 300w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/blog-post-footer-768x161.jpg 768w\" sizes=\"auto, (max-width: 895px) 100vw, 895px\" \/><\/a><\/h4>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49,33,4,48],"tags":[53,51,52,50,40],"class_list":["post-1489","post","type-post","status-publish","format-standard","hentry","category-business-continuity","category-compliance","category-exchangedefender","category-security","tag-cyber-security","tag-email","tag-email-security","tag-it","tag-security"],"_links":{"self":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/1489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/comments?post=1489"}],"version-history":[{"count":54,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/1489\/revisions"}],"predecessor-version":[{"id":1547,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/1489\/revisions\/1547"}],"wp:attachment":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/media?parent=1489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/categories?post=1489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/tags?post=1489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}