(Kelly Jackson Higgins) The last thing you need when auditors come to town is an encrypted e-mail message in your archive that you can’t decipher. You have to locate the end user who encrypted it and pray that he still has the decryption key — and that it hasn’t expired.
Read More - Register for Free Membership