Data breaches and cyber-attacks are becoming more and more common, so it’s essential that security measures are put in place to protect our data. One of these measures is using end-to-end encryption products, such as Cyph - a simple and secure encryption app that is extremely easy to use. Capable of securing photos, health data, video calls, cryptocurrency and file transfers, the app provides protection from a multitude of cryptographic attacks. Here we discuss some of its features and benefits: End-to-end encryption End-to-end encryption is a secure communication method that prevents any third parties from accessing...

Why 1Password is a great choice as a Password Manager
Cybercrime is on the rise and one of the main reasons for this is that users are not thinking about security enough. Usernames are fairly easy to discover, with most being related to names/email addresses which can be found with just a simple Google search. So, when combined with a commonly used password, hackers will gain access to private, ‘secure’, files easily. In 2019, the most commonly used password was 123456. This was used by 23.2 million people who had their accounts hacked. The next most popular password was 123456789, which was used by more than 7.7 million hacked...

What is Online Encryption and why it matters to you
We all own precious family photographs, health and legal documents that are private to us. Once upon a time you could simply lock your home or build a wall of physical security around your business in order to keep your personal information safe. Over the last 20 years, our lives have increasingly moved online. A bolt on the door doesn’t protect our online data. That is why encryption matters. Online digital security matters to us all When it comes to the internet and networking, it’s not just our own personal computer or business ethernet which needs guarding. The very...

How to Securely Erase your Computer’s Hard drive
The hard drive or solid state drive of your computer holds a lot of sensitive information. This includes your account passwords, personal details, financial records and personal files and photos that no one but you should see. When you want to sell or dispose of your old computer, you need to wipe out all the sensitive data. This will protect you from identity theft. Simply deleting files and folders and emptying your recycle bin or formatting your computer does not wipe out all the data, however. You may no longer be able to access the deleted data, but...

The Deep Dark Web
The Deep Dark Web It’s very easy to make the comparison between the internet and the ocean: both are expansive bodies, ever evolving and changing. To take the analogy further, right now you are floating out on the very surface in the warm, safe waters. But there are things that lie beneath what you can access on your phone or your laptop, in the part of the internet known as the ‘deep web’ The name ‘deep web’ sounds ominous but, in fact, the term simply refers to sites and pages that cannot be accessed by traditional browsers. Like...