Showing posts with label Cyber Security. Show all posts
Showing posts with label Cyber Security. Show all posts

Friday, October 23, 2020

Top 5 Must-Have Tools for Professional Journalists




Remember the time when the only tools a journalist needed were a pencil and a notepad? 

Capturing a story is challenging. Newshounds have to take into consideration multiple moving pieces before they can publish an article. Luckily, it’s not 1940 anymore, and today’s journalists have a slew of apps, tools, and sites that make the job easier. 
Whether you need a tool to help with brainstorming, security, organization, research, or visuals, here are five journalism tools you won’t want to be without.

1. Pocket

The Pocket App makes saving articles, videos, and content from other publications, web pages, and apps simple. Think of it as your personal reading list. If you don’t have time to read an article as soon as you come across it or watch a video clip, save it for later. Pocket is available on iOS and Android devices, plus the base app is free!

2. Trustwire

Part of being a journalist is sharing and receiving sensitive information online. Cyber threats are at an all-time high. Share documents securely with Trustwire. Trustwire allows a reporter or source to send and collect information safely, even in high-risk environments. All files shared via Trustwire are encrypted, meaning only the file owner and the rightful recipient will be able to see it.

3. Representation Matters

As a journalist, visuals are likely a huge part of your day job. You may be familiar with other stock image libraries like Pixabay, Shutterstock, or Pexels. While those are all great tools to source images, Representation Matters is an all-inclusive stock image library. They focus on diverse and inclusive photos with themes, including body positivity, disabilities, LGBT, and more.

4. Echosec

Echosec is a free online app that allows users to generate location-based social media data from the most popular social networks. If you work at a local level, this tool can help fill your pages or create website copy as you get info from events as they unfold in real-time. For example, Echosec allows users to concentrate on an area on a map where it will then provide you with a list of Tweets (or other social media posts) that have been made from that area. The free version offers Twitter data, but if you invest in the premium version, you get results from other platforms like Instagram and YouTube.

5. Hemingway

Part of being a great journalist is captivating an audience with words. The Hemingway App makes your writing bold and clear. This tool highlights common errors, complex sentences, and lengthy or hard-to-understand sentences in your typing. The text is color-coded to make things as simple as possible. If a sentence is highlighted in yellow, it’s too long, and if it has a red highlight, it’s too hard to read. Journalists can appeal to a broader audience with high-quality, user-friendly text. This online app is free, but a paid premium version is also available.






Friday, November 29, 2019

How to Share Files Securely and Protect Your Device


If you own a business where your client's information is at risk, surely you are concerned with the safety of your customer's sensitive info being leaked, stolen, or breached. It's a fear among most business owners in the US, especially small business owners like private doctors, journalists, small enterprise owners, and lawyers. Cybersecurity is a problem that business owners decades ago never had to encounter, but in 2019 we are in the midst of the digital revolution. The days of storing your client's records in a filing cabinet are over. While going digital has had massive benefits for businesses worldwide, along with it has come an immense influx of cyberattacks. Many are left wondering what the best way to share files securely is?

Secure File Sharing - What To Do And What Not To Do


  • Don't: Send sensitive documents over email
While sending an email may feel private, keep in mind the recipient may not have a protected server and may download your file from an unencrypted HTTP connection. If they're doing so from a public wi-fi network, the chances of a security breach are much higher.  

  • Do: Safeguard your computer
A cybersecurity measure you should always take it safeguarding all of your devices. Always install anti-virus programs, never leave computers unattended, and conduct software updates on the regular. When choosing passwords, go for ones that are not easily guessed and back up your files regularly.  

  • Don't: Rely Solely on Cloud Storage
Cloud storage providers like Dropbox and Google Drive are among the most popular. However, note that both of these services can gain full access to your files at any given time, meaning if there is a security breach, your data could be affected. These large companies may even look at your information for marketing purposes.  

  • Do: Use an encrypted file-sharing service
Many file-sharing services offer encrypted transmission for file sharing. Trustwire uses only trusted and verified open-source cryptography libraries to ensure your files are protected. Trustwire guarantees never to sell or give away data and gives its users full control over their records.  

Secure File Sharing With Trustwire


While there are plenty of ways to share files online, most of those methods are not reliable. Many existing software platforms may offer features like document password protection, but that doesn't mean it applies to every file or folder. Plus, hackers today are smarter and more ruthless than ever before. The only way to ensure the files you wish to share remain private is with some form of end-to-end encryption. Trustwire uses real end-to-end encryption to guarantee that only the owner of the file can access and share the contents. Trustwire can not decrypt its user's files, making it the most secure file sharing service available. With cybersecurity breaches on the rise, be sure your devised are protected from malicious hackers with Trustwire.



Trustwire has unparalleled ease of use, meaning that your employees can quickly adjust to working with it. Furthermore, Trustwire is available on any device, anywhere in the world. Earn more about how your business can begin protecting its valuable intellectual property with Trustwire.






Thursday, October 31, 2019

The future will run on 5G - How will the new era impact cybersecurity?

















The fifth-generation cellular network technology, 5G, will launch a new era of wireless connections, completely changing the way we consume content. With faster speeds, more reliable connections, and lower latency, businesses need to begin supporting this explosive rate of new tech innovation. Projections show that the number of 5G users will climb to over a billion by 2023. Better cybersecurity will be part of the demands businesses must undergo to be part of the new evolution. Will the evolutionary 5G network implement new privacy challenges?

The security risk of 5G:


When we make the transition into a 5G world, several things will happen:  
  • Exponentially faster speeds, higher capacity, and more flexible service delivery.
  • Organizations will provide better content and offer an excellent user experience.
  • Greater edge-based computing. 5G servers will have the intelligence to act as application servers.

5G will enable new technology that isn’t yet available today, and the world at large should expect substantial potential benefits. However, the implementation of 5G technology will also create new opportunities for those who wish to exploit it. 5G will disrupt the traditional relationships between networks, computing resources, and end-users, causing a notable impact on cybersecurity.  

5G and your privacy:


Challenges such as access to local info, health and lifestyle data, and leakage of personal voice are very real privacy concerns when it comes to 5G security. Remember, adequate 5G protection will not be a one-size-fits-all approach. With the upcoming different 5G entities, each will require different security needs.


5G and end-to-encryption:


When it comes to secure file sharing, end-to-end encryption has been the go-to for the past decade. How will you ensure your sensitive info is safe when we make the change to 5G? Cybersecurity solutions will have the challenge of deciphering which web traffic contaminated and conclude if any traffic is malicious. One way people are choosing to keep their sites safe is through Encrypted Traffic Analytics. ETA uses advanced algorithms to detect malicious traffic patterns of encrypted traffic. The technology can identify potential threats hiding in encrypted traffic. Exploring the potential benefits of ETA may be the key to keeping your website secure when 5G is in full swing.

What can you do?


Whether you’re ready or not, 5G is on its way, and it’s best to prepare as soon as possible.


Three steps to preparing for 5G


1. Cybersecurity technologies are a must. Don’t look at them as an added cost; instead, see them as strategies to ensure your organization remains safe during the changing times.

2. Don’t let security woes ruin the opportunity for your organization to reap the benefits of 5G.

3. Start preparing now, so when the time comes, you will be ready. Don’t wait until you deploy 5G to implement a better security strategy. Start using cybersecurity technology now to stay ahead of the game.


Trustwire has unparalleled ease of use, meaning that your employees can quickly adjust to working with it. Furthermore, Trustwire is available on any device, anywhere in the world. Earn more about how your business can begin protecting its valuable intellectual property with Trustwire.






Saturday, October 26, 2019

Why Professionals Are Choosing Trustwire To Transfer And Save Files?


Journalists, Lawyers, Doctors, Enterprises, and anyone who works with sensitive data must keep their client's info protected. Cybersecurity is at an all-time high. Today, it's almost impossible to do any sort of business without personal data winding up in a networked Computer system. Whether you're at home, down the street, or across the world, keeping all data secure is crucial. Read on to learn about why more people are choosing Trustwire to store and send their sensitive data online.

What is strong encryption, and why is it important?


End-to-end encryption technology helps protect personal data by making it unreadable to anyone who doesn't have the code key. Think of it like a jigsaw puzzle, your data will be scrambled using a "secret code," and only those who Today, cybersecurity and secure file sharing are more important than ever before. Vast amounts of personal data are managed online and stored in the cloud or on third-party servers. While storing files and records on the cloud can help, it's far from 100% secure. The only way to protect your privacy on the web, share your files securely, and defend your business against cyber attacks is with end-to-end encryption. Trustwire gives users secure end-to-end encryption so hackers won't stand a chance of getting their hands your files.

Trustwire's SecureLink makes secure file sharing a breeze:


Encryption tools can be annoying and challenging to use. Trustwire is committed to offering the most user-friendly and accessible protection to professionals and small business owners. Users don't have to clog up their phones and laptops downloading and installing apps. Trustwire is web-based, meaning all files can be shared online from anywhere in the world. Send your SecureLink address to anyone you wish to share confidential records. If the receiver clicks on your SecureLink address, you, the owner, may then send files securely. There are no sign-ups, no installations, and no pesky blast emails.  


Internet privacy concerns are on a steady incline:


The purpose of cybersecurity is to help prevent data breaches, cyberattacks, and eliminate identity theft. Sounds great right? Well, today the 'bad guys' or hackers are coming up with new methods to hack into sensitive information. Just like technology is always evolving, cybercriminals are getting smarter, they’re developing new ways to produce more malicious code to compromise data. Hackers don't discriminate either; they are thieves; they will attack all types of businesses and corporations from doctors offices to non-profits.


Trustwire solves all information security issues:


Hacking is a big business. Hackers aren't bored teenagers in basements anymore. They are smart, ruthless, and out to steal personal information. To keep your money out of the hacker's pockets, verified open-source cryptography is a must. Trustwire uses only Verified open-source cryptography libraries. While that may sound like a mouthful, in other words, Trustwire can ensure that the encryption algorithms do not have backdoors and are secure. Even users who don't consider themselves to be tech-savvy can use Trustwire to Keep their information private.

Keeping things simple is what we do best here. We found the perfect balance between usability, security, and accessibility. Trustwire does not track usage and will never sell data. The owner of the document fully controls any data stored on the Trustwire servers.
 



Trustwire has unparalleled ease of use, meaning that your employees can quickly adjust to working with it. Furthermore, Trustwire is available on any device, anywhere in the world. Earn more about how your business can begin protecting its valuable intellectual property with Trustwire.






Thursday, July 25, 2019

Government Contract and Cyber Security Requirements

government contracting cyber security requirements


All government contracting companies must meet certain Department of Defense (DoD) standards in order to maintain their contracts, especially with regard to cyber security requirements. In this post, we look at how your business is required to comply.

What is DFARS?


DFARS is the Defense Federal Acquisition Regulation Supplement, which sets forth the requirements for protecting both the government’s and the contractor’s sensitive information. Basically, any contractor that maintains Controlled Unclassified Information (CUI) has an obligation to secure this information.

This information may be particularly valuable to small manufacturers who seek DoD contracts. The guidelines pertain to both contractors and subcontractors.

Cyber security Requirements


According to the parameters set forth by DFARS, contractors must provide “adequate security” of all CUI. Furthermore, any cyber incidents that occur must be reported quickly, generally within 72 hours.  The DFARS makes clear that a cyber incident doesn’t necessarily mean that the contractor did not provide adequate security, but that the security measures will be assessed. More information can be found here.

The NIST MEP Cybersecurity Self-Assessment Handbook details the ways in which contractors, subcontractors, and supply chains can determine how well they are meeting the needs of DoD contracts’ cyber security requirements for government contracting.
government contracting cyber security requirements


Cyber security Requirements and Government Contracting


Naturally, with the requirements laid out by the DFARS, it makes sense to use the strongest encryption technology available in order to secure information. Trustwire’s encryption is open-sourced, with not deliberate back doors. Furthermore, Trustwire itself does not have access to any of its clients messages, data, or documents, which perfectly aligns with guidelines for handling DoD information.

Implementing Trustwire is simple due to its incredible ease-of-use. This mean less training employees and more getting work done. To learn more about how Trustwire can help your business meet DFARS standards, click here.

Transmission of Security Clearance Documents

what type of information is requested on a security clearance

In the Greater Capital Region, having a security clearance is a common requirement for employment. Even more, having a security clearance can set an applicant apart from others in the job selection process. Knowing what type of information is requested on a security clearance is important. Similarly, protecting the transmission of this sensitive information is vital. Let’s take a look at what’s involved.

What Type of Information is Requested on a Security Clearance?


National Security positions generally look a few key areas of an applicant’s life. The first is identity and citizenship. You will need to provide your name and any other names you’ve had. You will need to provide information about your citizenship.

While this is pretty straightforward for many applicants, those who are naturalized citizens, hold dual citizenship, or those who are not U.S. citizens will be required to give more information. You will want to share this information securely.

Residence, Employment, and Education


Following your citizenship and identifying information, you will need to provide your residences for the last ten years. Then, you will be required to list your education history. The scope of your education will involve all of the education you have had after your 18th birthday, unless you need more to provide at least two years of educational history.

Then, you will be required to list your employment history for ten years. You will need to provide the name and contact information for your supervisor at each of the positions you have held. There are options for unemployment, self-employment, and “other” if necessary.

Naturally, you will be required to list any and all involvement you have had with the military, including foreign military service.

The type of information requested on a security clearance involves listing whether or not you were reprimanded, fired, or for what reason you resigned from any of these positions.

what type of information is requested for a security clearance

Personal, Financial, and Legal History


The next section of your application will involve listing references for people who know you well. You’ll be required to detail your marital history. If you currently reside with a significant other, you will be required to list his or her information.

The form requires that you list family members, foreign contacts, activities, and travel. You will be asked to describe any mental health services you’ve received. Obviously, your criminal record, if any, will need to be disclosed in full detail.

In addition to your legal record, you will be asked to provide information concerning drug and alcohol use. Your financial information, including any bankruptcies or significant debts will need to be listed.

Transmission of Security Clearance Documents


As you can see the type of information requested for a security clearance is extensive. As this is a matter of national security, that makes sense. However, a significant amount of personal information resides on this 100+ page form. If you fill out the file on your own and send it in, you will need a secure means of transfer to protect your sensitive information. You really should not rely on email

Trustwire’s secure, end-to-end encryption technology ensures that your document is stored and transmitted safely. Sending such a comprehensive document should be done with the utmost care. Be confident when you click send. Learn more at Trustwire.com

Public WiFi and Email Security | Is It Ever Safe?

public wifi and email security

Back in the days of AOL-dominated email, security wasn’t a huge issue. People used their email at home to communicate with friends and family. Wifi wasn’t a thing, so email security wasn’t a pressing concern. That’s no longer the case.

We use our email for work, shopping, sending confidential documents to lawyers, doctors, and other professionals. Our credit card information and other financial information lives in our email accounts. 

So how secure public wifi for our vital email security?

The Stakes of Email Security


Basically, if a hacker gets into your email, he has found a gold mine. When you connect to a WiFi network, your data is stored on the router for that network.

Using public wifi increases your susceptibility to this type of cybercrime because a hacker can set up a network in a public location, thereby gaining access to your data. This includes your email username and password.

How Can You Protect Yourself?


It’s an almost impossible job to refuse to ever link up to a public WiFi network. We take our jobs with us everywhere. We store important documents in our email that we need to reference when we are on the go. So, how do we protect our email?

public wifi and email security

Two-Factor Authentication


If your email allows you to require two-factor authentication, use that. This requires a notification to be sent another one of your devices, such as a cell phone, before a new sign-in attempt is allowed. Chances are the hacker won’t have access to both devices.

The Official Network


You can ask the establishment for the name of their network to help authenticate which network you are actually using. This isn’t a sure-fire way to protect yourself, but it’s one step in the right direction.

Trustwire: Always Safe


If you find yourself away from your secure home network, and you need to send or access files, look to Trustwire as a way to do this without compromising your email security. Trustwire functions kind of like email, in that you can access it from anywhere. What’s more, it’s easy to use.

Trustwire is different from email in that it uses the strongest form of encryption to protect your data, no matter where you access our web-based portal. Send your documents from the local coffee shop using Trustwire and be assured that even the most savvy hackers cannot access it. Problem solved. Click here to learn more.


Avoiding Cyber-Espionage in China and Hong Kong for Business Travelers

avoiding cyber-espionage in china and hong kong


As China is the US’s second largest partner in trade, business travel to China and Hong Kong is essential. But should you be packing your laptop and smart devices? We’ll show you why avoiding cyber-espionage is essential for the business traveler.

Business Travel

Partnerships with Chinese companies remain lucrative and fruitful. Yet, many fear that traveling on business can leave their data subject to surveillance by the Chinese government. There is some evidence that Chinese custom officials were installing spyware on devices.


China: A Surveillance State

For years, the Chinese government has been tracking its citizens: their travels, their credit, and their activity. This is daily life for Chinese citizens; however, this type of surveillance is highly suspect to Americans.

Unfortunately, many nations choose to spy on citizens of other nations as they travel. Much of the time this is for national security purposes. Yet, visitors tracked in China tend to be those who have important corporate ties—pointing to an economic incentive at hand.


avoiding cyber-espionage in china and hong kong

Corporate Espionage: Part of the Game?

While Chinese officials insist that corporate espionage takes place in many countries, yet the US government has publicized many recent cases of corporate espionage.

Avoiding Cyber-Espionage in China and Hong Kong

Here are some tips to take to avoid being subject to cyber-espionage while traveling on business to China or Hong Kong:

  • Do not take un-needed electronics with sensitive data
  • Consider using temporary laptops that have been cleared of sensitive data; ditto for cell phones
  • Use thumb-drives for sensitive data, and open files on offline computers only
  • In order to access files online, use a service like Trustwire, which is end-to-end encrypted and can be used on any computer.
  • Keep in mind that all networks are owned and monitored by the Chinese government.
  • Change passwords often.
  • Back up your information.
  • Do not accept thumb drives or other electronic devices as gifts.
  • Remove cell phone batteries to limit tracking.

Depending on how sensitive your data can be, all these tips may not be necessary. Storing and transferring files on Trustwire is an easy and portable way to ensure the security of your business documents. Click here to find out more.

Business Travel Abroad | Protecting Secure Documents

protecting secure documents business travel abroad

One of the best things about our interconnected world is that we can often work from anywhere. This allows us the freedom to explore while managing to make a living. However, the need to protect secure documents when engaging in business travel abroad is a real need. We’ll outline the practices you should follow.

Business Travel & Cyber Security

The thing is, when you travel abroad for business or leisure, your sensitive data is up for grabs. Whether from foreign governments, corporate entities, or private illegal hackers, your email, documents, and data represent valuable capital for others.

So how is protecting secure documents possible when you have business travel abroad?


Consider a Password Manager

Companies like LastPass and 1Password allow you to manage your passwords in a way that makes them far less vulnerable to malicious actors. Both of these services are available at a low cost.

Also, when it comes to the security of your personal bank data, it’s worth asking your bank what they offer. Banks often have security measures available that aren’t well known to even their own customers.

protecting secure documents business travel abroad


Back Up Your Secure Documents

Backing up your secure documents is important so that a stolen device doesn’t mean that you’ve lost things permanently. Store this back up in a separate location that is also secure. Consider a physical drive, as well as an online back up.


Trustwire offers cloud storage that boasts incredibly strong encryption to keep your documents safe from those with malicious intent. Furthermore, should your laptop go missing abroad, you can access 
Trustwire from any computer without worrying about it being compromised.

Protecting Secure Documents During Business Travel Abroad

Trustwire can be one of the components of cyber security for smart business professionals. Trustwire enables you to securely store and send documents regardless of your location or the device from which you access it. To learn more about our business or personal plans, click here.

Privacy Concerns Online | Is FaceApp Safe?

privacy concerns online and faceapp


Recently, pictures of all your friends covered in wrinkles have gone viral. Everyone’s doing it and commenting on how much they look like a grandparent of theirs. Then, the debate over terms of service agreements and the company’s origin and intentions have sparked controversy. Should you have privacy concerns online regarding the FaceApp?  Let’s take a look.

A Bad Idea?

As soon as it seemed like everyone was posting their picture, the “thoughtful” friends appeared in the comments. Didn’t you read the terms of service? Don’t you know this company owns all your photos now? Is the company spying on behalf of Russia?

The Industry Norm?

And of course, there was the in-turn response: Facebook creates just as many privacy concerns online as the FaceApp. No one reads the terms of service agreements. Doesn’t the US government already keep track of our online activity?


A Mixed Bag

Well, the truth is somewhat murkier than either side would have you believe. FaceApp is probably not going to use your photos to create crazy DeepFake videos. The App’s founder Yaroslav Goncharov insists that no data is sent to Russia. They also claim that your data is not shared or sold to third parties. While all of this is comforting, it does not seem to be entirely true.

Privacy Policy Woes

In its privacy policy, FaceApp does ask users to “grant FaceApp a perpetual, irrevocable, nonexclusive, royalty-free, worldwide, fully-paid, transferable sub-licensable license to use, reproduce, modify, adapt, publish, translate, create derivative works from, distribute, publicly perform and display your User Content.” That’s definitely not something most people would be comfortable with.

Beyond that, the Washington Post found that FaceApp did have third party trackers in its app. Also, its photos are processed in the cloud rather than on your device. While it claims photos are deleted within 48 hours, there’s no real way to verify this.

FaceApp and Privacy Concerns Online

The most alarming aspect of the whole FaceApp debate is not that it is some anomaly in the tech landscape, but that it isn’t. Privacy policies are rarely read, and for good reason. They’re super long, and they’re written by experts who can easily bury their true objective in legalese on behalf of the app. Checking the “agree” box initiates a commonplace scheme: your data is sent to a variety of locations.

privacy concerns online and faceapp



The stakes are huge. They’re not just using our data to sell us more stuff. As the Cambridge Analytica and 2016 election taught us, they may be influencing the way in which we elect our government. This is why we feel Trustwire’s mission is so essential.

How Trustwire is Different

In the world of surveillance, where your data becomes the property of other’s agendas, we are committed to protecting your privacy. This is why we encrypt your messages, files, and photos. In fact, no one who works at Trustwire has access to any of your content or pattern of access.

This means that you are in complete and total control of your privacy. We think this should be the industry standard. Learn more about how we can help you protect your privacy online. 

Thursday, June 27, 2019

Whatsapp Spyware & The Importance of Encryption for Human Rights Activists and Lawyers

Whatsapp Spyware and the importance of encryption for human rights activists and lawyers



Hackers have done it again—breached what many trusted to be a secure method of communication and turned it into a tool for data mining and tracking the activity of users. 

This particular issue stems from a failing in the security framework of Whatsapp that allows hackers to infect users’ phones with spyware. 

Given the increased targeting of human rights activists and lawyers by oppressive regimes, the importance of encryption has become paramount. Whatsapp spyware further raises the stakes.

The Problem

Reuters reported just weeks ago that some governments have been using Whatsapp spyware of tracking human rights activists and lawyers they deem a threat. While Whatsapp claims to use strong encryption technology and recognizes the importance of this, their security has failed.

Human Rights lawyers and other activists realize that their work cause them to fall under scrutiny. Some even endure threats to their livelihood or person. Because of these risks, lawyers and activists use encryption to protect their anonymity while communicating online and on mobile devices.

Needless to say, learning that a government who disapproves of your work has access to your contacts’ list, location, and passwords is frightening.

The Solution

Unfortunately, this type of hacking is hard to prevent and detect, because rather than accessing data, this software accesses the device itself. Luckily, this software is expensive to operate, and hackers cannot easily make a profit leveraging this “service.” 

Facebook, the owner of Whatsapp, promises to increase security across all of its platforms. This comes especially after Congressional inquiry into how Facebook profits from its users’ data. Unfortunately, Facebook hasn’t made good on its promises before.
The importance of encryption for human rights activists and lawyers whatsapp spyware

Still, encryption is a matter of importance for all human rights activists and lawyers. While spyware that accesses your device from Whatsapp is a threat, it’s not as common as hacking that accesses your date due to a lack of encryption technology.

The Importance of Encryption for Human Rights Activists and Lawyers & Whatsapp Spyware

If you’re looking to protect sensitive documents and messages from hackers, don’t look to an organization that is designed to profit from your private content and behaviors. 

At Trustwire, we are committed to providing a truly private, truly secure means of communicating and transferring data.

We never have access to your communications or documents, and we don’t track your usage or the websites you visit before ours. If integrity matters to you, then sign up today and begin transferring and communicating with true security.

Wednesday, June 26, 2019

Stick to These Best Practices for Client Security


Best Practices for Client Security

These days keeping your clients’ information confidential is absolutely paramount to remain credible in your industry.

A data breach that leaves your clients vulnerable is almost certain death for the responsible business. Maintain your credibility and protect your clients by following these best practices for security.

1. Keep Your Clients’ Data in One Location.

This means that you shouldn’t keep information about your clients on multiple platforms with varying levels of security.

Store contracts, files, payment info and records, etc., in one location that is protected with robust security. Access to this information should be multi-factor authenticated, password-protected, and cloud-based.

2. Give Access Only as Necessary.

Once client data is stored in one location, enable employees to access only what they need to. In other words, limiting the number of folks who can access files limits their exposure to potential threats.

This type of role-based security also protects employees from altering documents outside their purview.

3. Transition to Electronic Signatures.

Not only will e-signatures be easier to gather than paper ones, they’re more secure. In addition, gaining e-signatures is quicker. Why are they more secure? E-signatures have a digital trail including when and where they were signed.
Best Practices for Client Security

4. Forgo Email for Data Collection.

Email is the number one method hackers use to access corporate entities. Therefore, do not use email to collect contracts, signatures, or exchange sensitive documents. Use end-to-end encryption methods of securing client data needed for designing or finalizing contracts.

5. Maintain Rigorous Security Standards.

Security breaches are devastating to a business; therefore, best practices for client security are vital. Make sure any cloud-based storage systems are supported by the strongest possible security.

Furthermore, make sure that you know if your cloud storage and file transfer systems collect data of their own regarding your clients’ information. This is a potential privacy violation. Beyond that, file transfers need to be end-to-end encrypted with the strongest, open-sourced encryption technology.

Best Practices | Client Security

Trustwire champions the protection of its clients’ privacy and data integrity. This means that your organization can store, share, and communicate without worry.

Trustwire uses the strongest end-to-end encryption available.

Moreover, Trustwire never has access to your data, and never tracks usage, or sells your information. Look to Trustwire to solve your security needs.

Tuesday, June 25, 2019

Privacy Violations Crack Down: What Businesses Need to Know

Privacy Violations Crack Down


The digital age changed lives in so many great ways: we can make purchases in an instant, finalize important documents remotely, and communicate across continents. All of this advancement has come with some unwanted negatives: namely, the loss of true privacy.

For decades now, some corporations have based their profit structures on selling what they know about their consumers. Because the US lacks a comprehensive federal statute on personal data online, the FTC is scrambling to crack down on privacy violations. Here’s what you need to know.

Face the Music

Music.ly or TikTok is a social media platform popular with teens and children. The FTC filed a complaint recently due to what it considered as unauthorized distribution of the personal data of minors.

Under the Children’s Online Privacy Protection Act (COPPA), TikTok was required to obtain consent for such activity but did not.

To make matters worse, the popular social media platform continued to list identifying markers of children even when they set their profiles to private.
Privacy Violations Crack Down

While the company paid a whopping near-six-million-dollar settlement, they failed to fully comply with the regulations of COPPA.

This prompted the FTC to issue a statement saying that they would pursue large corporations who put the advancement of their business goals above the rights of private citizens.

Surely, this case is a cautionary tale for any organization that caters to consumers who are minors.

Facebook and Cambridge Analytica

Facebook has always been iffy when it comes to consideration for its users’ privacy.

However, alarm bells began ringing in 2018 when the news that Facebook had allowed user data to be used by Cambridge Analytica, a British consulting firm that uses personal data to help politicians and businesses “change audience behavior.”

The firm got access to more than 50 million users personal data. Here’s the kicker, Facebook says that it’s not responsible because it allows researchers to collect data about users.

And the organization claims it had nothing to do with a researcher turning over such data to an unauthorized entity (Cambridge Analytica).

Incidentally, Cambridge Analytica claims they deleted the data anyway, upon learning that it was harvested unethically.

Yet, in spite of users’ private data being exploited by others, Facebook was allowed to handle the mess as they saw fit.

The FTC says that they are investigating, so it looks like Facebook may soon face a privacy-violations crack down of its own. The EU is also investigation Facebook for potential violations of its General Data Protection Regulation (GDPR).

Crack Down on Privacy Violations

Issues with Facebook especially, but also with smaller corporations like TikTok, show the movement towards large scale legislation that makes companies responsible for maintaining the privacy of its users.

At the very least, and we’ve seen this with recent legislation passed in California, more and more state governments are seeking to maintain the integrity of consumers’ privacy online.

What This Means for Your Business

The Federal Trade Commission’s commitment to enforcing consumers’ privacy can only lead to a widescale enforcement of such rules. Better be the forerunner of change than the last to cross the finish line.

Start by protecting the integrity of the data you collect and retain on behalf of your clients. By showing them that you take their privacy seriously, you can build loyalty.

Take a look at how Trustwire can enable you to do so, without compromising your commitment to security.

Monday, June 24, 2019

Cybercrime and Protecting Small Businesses

cybercrime and protecting small businesses

Some security experts predict that cybercrime profit will exceed 6 trillion dollars annually by 2021. Surprisingly, small businesses will be the primary target.

So, how can the difficult job of protecting small businesses from cybercrime be accomplished? Let’s take a look.

What Makes Small Businesses So Vulnerable?

Small and medium-sized businesses (SMBs) are more susceptible to cybercrime attacks because they simply do not make use of the strength of security they need.

Sometimes resources are thin and a cheaper alternative seems appealing or adequate.

By the same token, SMBs generally don’t have a dedicated security expert that can adapt technology to threats that are constantly evolving.


Your Employees Are Your Biggest Threat

That’s right. Not that you have unintentionally hired some bad actors, but employees commonly inadvertently compromise security.

From clicking on compromised emails, falling for impersonation scams, or sending a sensitive file in a less than secure manner—employees create vulnerabilities.

The best way to neutralize these unintentional security threats is to train your employees to recognize them. 
cybercrime and protecting small businesses


Even better, employees should know to alert your security expert to potential threats.
Another tactic is requiring employees to use secure means of file transfer and online-collaboration.

Hand in hand with this, limit the access employees have to certain data. The fewer people who have access to sensitive information, the better.


Wholesale Changes that Work

First, get a VPN to protect your servers when employees access them remotely. The ways in which your employees access your servers when out of the office often compromise the security of the whole system.

Therefore, using a VPN and multi-factor authentication can ramp up your defenses.
Second, encrypt any mobile devices that store your organization’s data.

Laptops can be a giant security risk—a stolen laptop can either big a huge problem, or if encrypted, simply a matter of being replaced. A compromised mobile device can be an easy target for cybercrime.

Best Practices for Protecting Small Businesses from Cybercrime

  1. Train employees to recognize potential scams, alert security team members to possible threats, how to execute policies regarding cybersecurity, and conduct themselves safely online, including by using strong password techniques. They should also know what to do if something goes wrong.
  2. Have your security team keep tabs on your network for potential weakness, patterns of access, and any suspicious irregularities.
  3. Create security policies that are strictly enforced. These policies need to both protect your clients and your business. Moreover, they should comply with any regulatory requirements, if not exceed them. Whatever your industry is, make sure that you are not skimping on any security for your clients/customers.
  4. Limit access and enforce perimeters. Each employee should have only the access required of their job.  All traffic on your network needs to be screened for viruses and other malicious content.

Running an SMB can be extremely rewarding. Protect your livelihood by taking reasonable and required measures to prevent cybercriminals from ruining your hard work.

Preventing cybercrime and protecting small businesses is one of the most important goals of Trustwire. Enable your employees to communicate, transfer, and store documents safely today.

The Best Ways to Share Files Securely

In our fast-paced, electronic-device driven world, in-person document delivery rarely occurs. In business situations, we collaborate and ...