<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

CloudMask Blog

If everybody could read your email, are you secure?

Email is one of the most critical business tools and a major component of the lives of many people. At the same time, it seems to lack adequate security as the Clinton campaign email leaks and the publication of France’s Macron emails have shown. Email is at the same time insecure but used to share important and often sensitive information. While companies encrypt...

Google Is Hit With Another Blow to User Privacy: Here's What You Can Do

February 3, 2017, US Magistrate Judge Thomas Rueter ruled that Google must provide emails stored overseas to US authorities for domestic investigations. On August 2016, courts issued two search warrants, which required Google to disclose, to the FBI, electronic data held in the accounts of the two accused of fraud in violation of federal law. Google only provided data...

Think Security Best Practices Can Keep Your Data Safe? Think Again

The application of best practices to a business process can give you the results you want. For example, quality assurance best practices result in the specified level of product quality and best practices in manufacturing reduce the number of product defects. Applied to data security, best practices can keep the data on your computer and mobile devices safe as long as it...

Unencrypted, accidental email leads to data breach

Despite corporations investing heavily in data protection, small errors can have big consequences, and a lack of email encryption will certainly lead to data leaks, loss and theft. It's been a long 2015 in regard to data security, but there are still new breaches being discovered and reported in these last two months. Despite corporations investing heavily in data...

A lesson in email security from an unlikely source

Without adequate email protection, some business people could experience personal and business-related disruption. The data breach of Avid Life Media demonstrated how easy it is for cybercriminal groups to steal incriminating information, as hackers successfully breached the company's network and made off with the personal records and account data of millions of...

Customer confidentiality: 3 ways to take care of clients' data

It is up to lawyers and their employers to protect the confidentiality of their clients, maintain the integrity of data and ensure that information is readily available without compromising security. Technology has always been a double-edged sword, and cloud computing is not an exception to this rule. The use of cloud services and hosted infrastructure has dozens of...
1

CloudMask provides end-to-end encryption for emails, files and applications. Only those you explicitly trust can decrypt and see your data in clear; Not hackers, Cloud Providers, Government Agencies, or even CloudMask. Twenty-six government cybersecurity agencies around the world back these claims.

TRY IT FREE

Sign Up for our Newsletter to get the latest in everything cyber security. We care about your privacy, let us show you how.

Recent Posts