Types of Encryption: 5 Encryption Algorithms & How to Choose the Right One

We’ll break down the two main types of encryption — symmetric and asymmetric — before diving into the list of the 5 most commonly used encryption algorithms to simplify them…
The post Types of Encryption: 5 Encryption Algorithms &#… Continue reading Types of Encryption: 5 Encryption Algorithms & How to Choose the Right One

3-2-1 Backup Rule: The Rule of Thumb to Solve Your Data Loss Problems

Downtime from ransomware attacks results in an average of 16.2 days of downtime for businesses, according to Coveware’s Q4 2019 Ransomware Marketplace report While it may sound like a rule…
The post 3-2-1 Backup Rule: The Rule of Thumb to Solv… Continue reading 3-2-1 Backup Rule: The Rule of Thumb to Solve Your Data Loss Problems

Zoom Encryption, Whatsapp Encryption…Wait, Let’s Not Forget About Email Encryption

While you try to lock down your windows, your door could be wide open. Many of my friends ask me if I get bored writing about encryption day-after-day. Well, this…
The post Zoom Encryption, Whatsapp Encryption…Wait, Let’s Not Forget Abou… Continue reading Zoom Encryption, Whatsapp Encryption…Wait, Let’s Not Forget About Email Encryption

Browser Watch: Google Chrome to Block HTTP Downloads

Starting mid-2020, you won’t be able to download certain files on Chrome — here’s why Time after time, we’ve witnessed browser giants making security-related decisions that have a significant impact…
The post Browser Watch: G… Continue reading Browser Watch: Google Chrome to Block HTTP Downloads

The Latest PayPal Phishing Email Goes Beyond Your Login Credentials

Another day and another clever PayPal phishing scam to learn from to better protect yourself and your organization “In this world, nothing can be said to be certain, except death,…
The post The Latest PayPal Phishing Email Goes Beyond Your Log… Continue reading The Latest PayPal Phishing Email Goes Beyond Your Login Credentials

Dropbox Phishing Scam: Don’t Get Fooled by Fake Shared Documents

Hackers use familiar brands like Dropbox to steal login credentials and spread malware It’s funny how hackers, phishers, and scamsters can be blatantly obvious and inexplicably unpredictable at the same…
The post Dropbox Phishing Scam: Don&#82… Continue reading Dropbox Phishing Scam: Don’t Get Fooled by Fake Shared Documents

Delegated Credentials: Facebook, Mozilla & Cloudflare’s New TLS Protocol Explained

Here’s what you need to know about delegated credentials and how they’ll affect your certificate management Facebook, Mozilla, and Cloudflare just announced the development of delegated credentials, a new cryptographic…
The post Delegate… Continue reading Delegated Credentials: Facebook, Mozilla & Cloudflare’s New TLS Protocol Explained

End-to-End Encryption: The Good, the Bad and the Politics

Here’s what you need to know about the debate over end-to-end encryption It’s that time of the year when we grab our popcorn and witness another chapter in the age-old…
The post End-to-End Encryption: The Good, the Bad and the Politics a… Continue reading End-to-End Encryption: The Good, the Bad and the Politics