Showing posts with label File Sharing. Show all posts
Showing posts with label File Sharing. Show all posts

Friday, October 23, 2020

Top 5 Must-Have Tools for Professional Journalists




Remember the time when the only tools a journalist needed were a pencil and a notepad? 

Capturing a story is challenging. Newshounds have to take into consideration multiple moving pieces before they can publish an article. Luckily, it’s not 1940 anymore, and today’s journalists have a slew of apps, tools, and sites that make the job easier. 
Whether you need a tool to help with brainstorming, security, organization, research, or visuals, here are five journalism tools you won’t want to be without.

1. Pocket

The Pocket App makes saving articles, videos, and content from other publications, web pages, and apps simple. Think of it as your personal reading list. If you don’t have time to read an article as soon as you come across it or watch a video clip, save it for later. Pocket is available on iOS and Android devices, plus the base app is free!

2. Trustwire

Part of being a journalist is sharing and receiving sensitive information online. Cyber threats are at an all-time high. Share documents securely with Trustwire. Trustwire allows a reporter or source to send and collect information safely, even in high-risk environments. All files shared via Trustwire are encrypted, meaning only the file owner and the rightful recipient will be able to see it.

3. Representation Matters

As a journalist, visuals are likely a huge part of your day job. You may be familiar with other stock image libraries like Pixabay, Shutterstock, or Pexels. While those are all great tools to source images, Representation Matters is an all-inclusive stock image library. They focus on diverse and inclusive photos with themes, including body positivity, disabilities, LGBT, and more.

4. Echosec

Echosec is a free online app that allows users to generate location-based social media data from the most popular social networks. If you work at a local level, this tool can help fill your pages or create website copy as you get info from events as they unfold in real-time. For example, Echosec allows users to concentrate on an area on a map where it will then provide you with a list of Tweets (or other social media posts) that have been made from that area. The free version offers Twitter data, but if you invest in the premium version, you get results from other platforms like Instagram and YouTube.

5. Hemingway

Part of being a great journalist is captivating an audience with words. The Hemingway App makes your writing bold and clear. This tool highlights common errors, complex sentences, and lengthy or hard-to-understand sentences in your typing. The text is color-coded to make things as simple as possible. If a sentence is highlighted in yellow, it’s too long, and if it has a red highlight, it’s too hard to read. Journalists can appeal to a broader audience with high-quality, user-friendly text. This online app is free, but a paid premium version is also available.






Wednesday, September 23, 2020

How to Protect Your Business Trade Secrets From Being Stolen

















Are you familiar with the Waymo v. Uber trade secrets case? An employee took 14,000 documents containing sensitive data, which resulted in a US$1.859 billion claim and a settlement of around US$245 million. How could something like this happen? Especially with companies of this caliber? Waymo stated they had been following sufficient security precautions to protect trade secrets. Things like encryption, security cameras, and confidentiality agreements. Of course, as the case would show, that wasn’t enough. 

A Waymo competitor likely obtained access to Waymo’s information. During the court hearings, Waymo had to explain the measures they used were consistent with the Defend Trade Secrets Act (DTSA). Yet, somehow over 14,000 documents filled with sensitive data were leaked. 
The question we have to be asking ourselves here is: How can a company take “reasonable measures” to satisfy DTSA requirements and protect it against theft of trade secrets?
Here are some ways that can help your business trade secrets from ending up in the wrong hands.

Identify and mark your trade secrets:

One way to protect a company’s trade secret is to understand what information is considered to be (and should be) guarded as a trade secret. What information requires secrecy? Once an institution can establish this, the information should be deemed a trade secret, identified, and marked confidential.

Limit and track access to trade secret information:

As soon as trade secrets are marketed, access must be immediately restricted. Limit the disclosure of the information only to the people “need to know” it to perform their tasks adequately. Not sure how to control access? Taking precautionary steps like physical security, passwords, encryption, and data segregation are the best ways to start. We saw a good example of this after the Waymo case played out. Waymo employees who were working on projects unrelated to self-driving cars were prevented from obtaining the information they did not need to know.

How to manage secret information:

Yes, you can take initial proactive steps to protect trade secret information, and that’s a great start! But now, you have to be mindful that continuing to manage the trade secrets is critical. Some steps to secure information like password-protected servers and folders, and employing a third-party internet security company to protect its servers from outside hacking is a great way to keep your info safe.

Sharing sensitive information:

Companies and individuals will inevitably have to send and share confidential information over the internet. Especially since the COVID-19 pandemic. People don’t have the option to hand-deliver files anymore. Trustwire is a platform that allows users to send and receive files online without the risks. Using end-to-end encryption, only the rightful receiver of the file will gain access to it. No one else, including Trustwire, will be given access to view the file. 

When you need to keep your private information safe on the internet, trust Trustwire.






Saturday, March 28, 2020

Coronavirus: Strategies and tools for remote work during a worldwide pandemic


Along with worldwide hysteria and fear, the novel Coronavirus is also affecting the way we work, run businesses, and go about our daily lives. Unfortunately, the viral Coronavirus isn't just a threat to our immune systems, but it can be a significant cause for concern regarding cyberattacks as well. Whether you're in forced a two-week quarantine or taking safety precautions on your own from the virus, a major surge of folks has been working from home. With this new era of working outside the formal office, how will you ensure the integrity of your work remains unscathed? We've compiled a list of the best tips, tricks, and tools to get the most out of working remotely.

How to keep business running as usual:


While the Coronavirus has shaken the world, many of us still have to conduct business as usual. This can mean having employees work from home, canceling all company travel, and forgetting about any meetings in person for the foreseeable future. Follow the tips below to create a comfortable remote working environment for your employees.  

1. Strong Internet Access Some of us may take reliable WiFi for granted. Keep in mind that some of your employees may not have the luxury of lighting fast internet access at home. If that's the case, you may want to invest in mobile hotspots for your employees.  


2. Remote Work Devices Of course, your workers will need access to a laptop, but don't forget accessories like headsets, mics, and webcams too. These will be required for conducting online meetings and web conferences. If your employees don't have these items at home, it's highly recommended for the business to provide these tools. 

3. Collaboration Tools Since meetings in person are no-go at the moment, you'll want to use collaborative meeting tools like Zoom GoToMeeting to help unify communication. This way, you and your team can still hear and speak to each other without having fears of contracting the deadly Coronavirus.  

How to ensure your business remains safe:


While the Coronavirus has shaken the world, many of us still have to conduct business as usual. This can mean having employees work from home, canceling all company travel, and forgetting about any meetings in person for the foreseeable future. Follow the tips below to create a comfortable remote working environment for your employees. 


To learn more about how Trustwire can be a useful tool against ransomware attacks and other cybercrimes.






Friday, November 29, 2019

How to Share Files Securely and Protect Your Device


If you own a business where your client's information is at risk, surely you are concerned with the safety of your customer's sensitive info being leaked, stolen, or breached. It's a fear among most business owners in the US, especially small business owners like private doctors, journalists, small enterprise owners, and lawyers. Cybersecurity is a problem that business owners decades ago never had to encounter, but in 2019 we are in the midst of the digital revolution. The days of storing your client's records in a filing cabinet are over. While going digital has had massive benefits for businesses worldwide, along with it has come an immense influx of cyberattacks. Many are left wondering what the best way to share files securely is?

Secure File Sharing - What To Do And What Not To Do


  • Don't: Send sensitive documents over email
While sending an email may feel private, keep in mind the recipient may not have a protected server and may download your file from an unencrypted HTTP connection. If they're doing so from a public wi-fi network, the chances of a security breach are much higher.  

  • Do: Safeguard your computer
A cybersecurity measure you should always take it safeguarding all of your devices. Always install anti-virus programs, never leave computers unattended, and conduct software updates on the regular. When choosing passwords, go for ones that are not easily guessed and back up your files regularly.  

  • Don't: Rely Solely on Cloud Storage
Cloud storage providers like Dropbox and Google Drive are among the most popular. However, note that both of these services can gain full access to your files at any given time, meaning if there is a security breach, your data could be affected. These large companies may even look at your information for marketing purposes.  

  • Do: Use an encrypted file-sharing service
Many file-sharing services offer encrypted transmission for file sharing. Trustwire uses only trusted and verified open-source cryptography libraries to ensure your files are protected. Trustwire guarantees never to sell or give away data and gives its users full control over their records.  

Secure File Sharing With Trustwire


While there are plenty of ways to share files online, most of those methods are not reliable. Many existing software platforms may offer features like document password protection, but that doesn't mean it applies to every file or folder. Plus, hackers today are smarter and more ruthless than ever before. The only way to ensure the files you wish to share remain private is with some form of end-to-end encryption. Trustwire uses real end-to-end encryption to guarantee that only the owner of the file can access and share the contents. Trustwire can not decrypt its user's files, making it the most secure file sharing service available. With cybersecurity breaches on the rise, be sure your devised are protected from malicious hackers with Trustwire.



Trustwire has unparalleled ease of use, meaning that your employees can quickly adjust to working with it. Furthermore, Trustwire is available on any device, anywhere in the world. Earn more about how your business can begin protecting its valuable intellectual property with Trustwire.






Thursday, July 25, 2019

Transmission of Security Clearance Documents

what type of information is requested on a security clearance

In the Greater Capital Region, having a security clearance is a common requirement for employment. Even more, having a security clearance can set an applicant apart from others in the job selection process. Knowing what type of information is requested on a security clearance is important. Similarly, protecting the transmission of this sensitive information is vital. Let’s take a look at what’s involved.

What Type of Information is Requested on a Security Clearance?


National Security positions generally look a few key areas of an applicant’s life. The first is identity and citizenship. You will need to provide your name and any other names you’ve had. You will need to provide information about your citizenship.

While this is pretty straightforward for many applicants, those who are naturalized citizens, hold dual citizenship, or those who are not U.S. citizens will be required to give more information. You will want to share this information securely.

Residence, Employment, and Education


Following your citizenship and identifying information, you will need to provide your residences for the last ten years. Then, you will be required to list your education history. The scope of your education will involve all of the education you have had after your 18th birthday, unless you need more to provide at least two years of educational history.

Then, you will be required to list your employment history for ten years. You will need to provide the name and contact information for your supervisor at each of the positions you have held. There are options for unemployment, self-employment, and “other” if necessary.

Naturally, you will be required to list any and all involvement you have had with the military, including foreign military service.

The type of information requested on a security clearance involves listing whether or not you were reprimanded, fired, or for what reason you resigned from any of these positions.

what type of information is requested for a security clearance

Personal, Financial, and Legal History


The next section of your application will involve listing references for people who know you well. You’ll be required to detail your marital history. If you currently reside with a significant other, you will be required to list his or her information.

The form requires that you list family members, foreign contacts, activities, and travel. You will be asked to describe any mental health services you’ve received. Obviously, your criminal record, if any, will need to be disclosed in full detail.

In addition to your legal record, you will be asked to provide information concerning drug and alcohol use. Your financial information, including any bankruptcies or significant debts will need to be listed.

Transmission of Security Clearance Documents


As you can see the type of information requested for a security clearance is extensive. As this is a matter of national security, that makes sense. However, a significant amount of personal information resides on this 100+ page form. If you fill out the file on your own and send it in, you will need a secure means of transfer to protect your sensitive information. You really should not rely on email

Trustwire’s secure, end-to-end encryption technology ensures that your document is stored and transmitted safely. Sending such a comprehensive document should be done with the utmost care. Be confident when you click send. Learn more at Trustwire.com

Public WiFi and Email Security | Is It Ever Safe?

public wifi and email security

Back in the days of AOL-dominated email, security wasn’t a huge issue. People used their email at home to communicate with friends and family. Wifi wasn’t a thing, so email security wasn’t a pressing concern. That’s no longer the case.

We use our email for work, shopping, sending confidential documents to lawyers, doctors, and other professionals. Our credit card information and other financial information lives in our email accounts. 

So how secure public wifi for our vital email security?

The Stakes of Email Security


Basically, if a hacker gets into your email, he has found a gold mine. When you connect to a WiFi network, your data is stored on the router for that network.

Using public wifi increases your susceptibility to this type of cybercrime because a hacker can set up a network in a public location, thereby gaining access to your data. This includes your email username and password.

How Can You Protect Yourself?


It’s an almost impossible job to refuse to ever link up to a public WiFi network. We take our jobs with us everywhere. We store important documents in our email that we need to reference when we are on the go. So, how do we protect our email?

public wifi and email security

Two-Factor Authentication


If your email allows you to require two-factor authentication, use that. This requires a notification to be sent another one of your devices, such as a cell phone, before a new sign-in attempt is allowed. Chances are the hacker won’t have access to both devices.

The Official Network


You can ask the establishment for the name of their network to help authenticate which network you are actually using. This isn’t a sure-fire way to protect yourself, but it’s one step in the right direction.

Trustwire: Always Safe


If you find yourself away from your secure home network, and you need to send or access files, look to Trustwire as a way to do this without compromising your email security. Trustwire functions kind of like email, in that you can access it from anywhere. What’s more, it’s easy to use.

Trustwire is different from email in that it uses the strongest form of encryption to protect your data, no matter where you access our web-based portal. Send your documents from the local coffee shop using Trustwire and be assured that even the most savvy hackers cannot access it. Problem solved. Click here to learn more.


Intellectual Property Theft | Is the Cloud Vulnerable?

intellectual property theft and the cloud

Being relevant and competitive in a global economy requires innovation. Successful businesses realize that innovation requires collaboration. To that end, cloud-based solutions allow for collaboration on projects despite differences in geographical location. But does using the cloud place your organization at risk for intellectual property theft? Let’s take a look.

What’s at Stake?


Trade secrets, patents, product designs, and ideas in development. Making all of these available across the devices and locations of various employees creates a potentially risky situation. Litigation over patent disputes, for example, can be astronomical.

Cybercrime experts suggest that more than a quarter of hackers seek IP rather than consumer identity or financial information. This means that your organization’s IP is vulnerable.

Intellectual Property Theft and the Cloud


Unfortunately, protecting IP is a bit tricker than preventing typical data breaches. Why? Most typical data breaches come from external sources—hackers seeking your clients’ information, for example. 
However, when the target is IP, according to a study conducted by Verizon, 49% of IP theft was due to either employee misuse or employee (current or former) malicious actors.

intellectual property theft and the cloud

Tips to Protect Your Organization


  • Remove access to the cloud from former employees.
  • Restrict access to information stored in the cloud to each employees specific needs only. Make sure that you can use tiers, and enforce access levels.
  • Train your employees to use the cloud responsibly—especially with regard to protecting security.
  • Furthermore, encrypt all files. This prevents transmission of sensitive files if devices are lost or stolen.
  • Maintain an audit trail within your cloud to monitor patterns of access and to alert security professionals to unauthorized access.
  • Use Trustwire.


How Trustwire Protects Your Organization from Intellectual Property Theft


Trustwire uses the strongest open-sourced encryption to secure your files and messages. Furthermore, unlike other cloud-based solutions like Dropbox, Trustwire does not have access to your organization’s messages, files, or data. This further secures your IP.

Trustwire has unparalleled ease of use, meaning that your employees can quickly adjust to working with it. Furthermore, Trustwire is available on any device, anywhere in the world. Click here to earn more about how your business can begin protecting its valuable intellectual property with Trustwire.

Avoiding Cyber-Espionage in China and Hong Kong for Business Travelers

avoiding cyber-espionage in china and hong kong


As China is the US’s second largest partner in trade, business travel to China and Hong Kong is essential. But should you be packing your laptop and smart devices? We’ll show you why avoiding cyber-espionage is essential for the business traveler.

Business Travel

Partnerships with Chinese companies remain lucrative and fruitful. Yet, many fear that traveling on business can leave their data subject to surveillance by the Chinese government. There is some evidence that Chinese custom officials were installing spyware on devices.


China: A Surveillance State

For years, the Chinese government has been tracking its citizens: their travels, their credit, and their activity. This is daily life for Chinese citizens; however, this type of surveillance is highly suspect to Americans.

Unfortunately, many nations choose to spy on citizens of other nations as they travel. Much of the time this is for national security purposes. Yet, visitors tracked in China tend to be those who have important corporate ties—pointing to an economic incentive at hand.


avoiding cyber-espionage in china and hong kong

Corporate Espionage: Part of the Game?

While Chinese officials insist that corporate espionage takes place in many countries, yet the US government has publicized many recent cases of corporate espionage.

Avoiding Cyber-Espionage in China and Hong Kong

Here are some tips to take to avoid being subject to cyber-espionage while traveling on business to China or Hong Kong:

  • Do not take un-needed electronics with sensitive data
  • Consider using temporary laptops that have been cleared of sensitive data; ditto for cell phones
  • Use thumb-drives for sensitive data, and open files on offline computers only
  • In order to access files online, use a service like Trustwire, which is end-to-end encrypted and can be used on any computer.
  • Keep in mind that all networks are owned and monitored by the Chinese government.
  • Change passwords often.
  • Back up your information.
  • Do not accept thumb drives or other electronic devices as gifts.
  • Remove cell phone batteries to limit tracking.

Depending on how sensitive your data can be, all these tips may not be necessary. Storing and transferring files on Trustwire is an easy and portable way to ensure the security of your business documents. Click here to find out more.

Friday, June 28, 2019

Is Gmail Really Confidential?



Seemingly a lot of changes are in the works with Google’s email systems. Recently, Google made a confidential mode available (beta) to its G suite customers.

The update promises to provide confidentiality via emails that can be sent in confidential mode and data exchange that is similarly private.

However, you may be wondering how confidential is Gmail in light of this update?

[Related: The Best Encrypted Email for Your Business]

What Is “Confidential Mode”?


Confidential mode employs IFM (information management controls) that gives users the ability to control certain aspects of their emails. For instance, they can set expiration dates, predetermine the ability for recipients to copy, print, or download an email, and revoke sent emails.

Users interested in an added layer security can opt to require a text-message based two-factor identification process as well. This aims to protect the contents of an email in case of an account’s potential security breach.

For stored files and archiving, there’s Google Vault. From Google Drive, Jamboard files can be archived and searched. Furthermore, data can be retained and exported.

How Secure is Gmail Confidential Mode?


First, it must be noted that confidential mode must be manually enabled. Secondly, recipients are able to copy and paste text once they have accessed it. There is no protection from screenshots.

Their promise of security further breaks down with regard to recipients external to Gmail—a confidential email now exists outside of gmail’s “secure” server.



Perhaps most importantly, Gmail offers no promise to bar its own access to your files. How do we know this?

Because confidential mode does not encrypt the confidential emails. This means that Google can retain your message data indefinitely and analyze its contents.

[Related: Email Security: Best Practices for Your Organization]

Why Trustwire Is a Better Alternative to Gmail Confidential Mode


Traditional super-strong encryption, such as PGP, requires the user to be knowledgeable about cryptography. Why should your everyday user learn cryptography simply to be able to share documents safely?

 On the other hand, solutions that are seemingly secure, like Gmail’s confidential setting are too weak to provide true data security. This leaves the problem of data security either too hard to use or too weak to matter.

Enter Trustwire. Trustwire is a secure, browser-based file transfer service. Simply sign up for a free personal account, or our low-cost business plan, and begin sharing files.  Trustwire has a simple user interface, yet we use the strongest open-sourced encryption available—AES 256-bit and RSA 4096-bit encryption (end-to-end) to protect your messages and documents.

Unlike Gmail, Trustwire never has access to the content of your messages or your documents. We do not analyze or track your usage or browser history. Trustwire is a simple solution to a difficult problem. Sign up today to begin sharing data with confidence.

Wednesday, June 26, 2019

Stick to These Best Practices for Client Security


Best Practices for Client Security

These days keeping your clients’ information confidential is absolutely paramount to remain credible in your industry.

A data breach that leaves your clients vulnerable is almost certain death for the responsible business. Maintain your credibility and protect your clients by following these best practices for security.

1. Keep Your Clients’ Data in One Location.

This means that you shouldn’t keep information about your clients on multiple platforms with varying levels of security.

Store contracts, files, payment info and records, etc., in one location that is protected with robust security. Access to this information should be multi-factor authenticated, password-protected, and cloud-based.

2. Give Access Only as Necessary.

Once client data is stored in one location, enable employees to access only what they need to. In other words, limiting the number of folks who can access files limits their exposure to potential threats.

This type of role-based security also protects employees from altering documents outside their purview.

3. Transition to Electronic Signatures.

Not only will e-signatures be easier to gather than paper ones, they’re more secure. In addition, gaining e-signatures is quicker. Why are they more secure? E-signatures have a digital trail including when and where they were signed.
Best Practices for Client Security

4. Forgo Email for Data Collection.

Email is the number one method hackers use to access corporate entities. Therefore, do not use email to collect contracts, signatures, or exchange sensitive documents. Use end-to-end encryption methods of securing client data needed for designing or finalizing contracts.

5. Maintain Rigorous Security Standards.

Security breaches are devastating to a business; therefore, best practices for client security are vital. Make sure any cloud-based storage systems are supported by the strongest possible security.

Furthermore, make sure that you know if your cloud storage and file transfer systems collect data of their own regarding your clients’ information. This is a potential privacy violation. Beyond that, file transfers need to be end-to-end encrypted with the strongest, open-sourced encryption technology.

Best Practices | Client Security

Trustwire champions the protection of its clients’ privacy and data integrity. This means that your organization can store, share, and communicate without worry.

Trustwire uses the strongest end-to-end encryption available.

Moreover, Trustwire never has access to your data, and never tracks usage, or sells your information. Look to Trustwire to solve your security needs.

Monday, June 24, 2019

Cybercrime and Protecting Small Businesses

cybercrime and protecting small businesses

Some security experts predict that cybercrime profit will exceed 6 trillion dollars annually by 2021. Surprisingly, small businesses will be the primary target.

So, how can the difficult job of protecting small businesses from cybercrime be accomplished? Let’s take a look.

What Makes Small Businesses So Vulnerable?

Small and medium-sized businesses (SMBs) are more susceptible to cybercrime attacks because they simply do not make use of the strength of security they need.

Sometimes resources are thin and a cheaper alternative seems appealing or adequate.

By the same token, SMBs generally don’t have a dedicated security expert that can adapt technology to threats that are constantly evolving.


Your Employees Are Your Biggest Threat

That’s right. Not that you have unintentionally hired some bad actors, but employees commonly inadvertently compromise security.

From clicking on compromised emails, falling for impersonation scams, or sending a sensitive file in a less than secure manner—employees create vulnerabilities.

The best way to neutralize these unintentional security threats is to train your employees to recognize them. 
cybercrime and protecting small businesses


Even better, employees should know to alert your security expert to potential threats.
Another tactic is requiring employees to use secure means of file transfer and online-collaboration.

Hand in hand with this, limit the access employees have to certain data. The fewer people who have access to sensitive information, the better.


Wholesale Changes that Work

First, get a VPN to protect your servers when employees access them remotely. The ways in which your employees access your servers when out of the office often compromise the security of the whole system.

Therefore, using a VPN and multi-factor authentication can ramp up your defenses.
Second, encrypt any mobile devices that store your organization’s data.

Laptops can be a giant security risk—a stolen laptop can either big a huge problem, or if encrypted, simply a matter of being replaced. A compromised mobile device can be an easy target for cybercrime.

Best Practices for Protecting Small Businesses from Cybercrime

  1. Train employees to recognize potential scams, alert security team members to possible threats, how to execute policies regarding cybersecurity, and conduct themselves safely online, including by using strong password techniques. They should also know what to do if something goes wrong.
  2. Have your security team keep tabs on your network for potential weakness, patterns of access, and any suspicious irregularities.
  3. Create security policies that are strictly enforced. These policies need to both protect your clients and your business. Moreover, they should comply with any regulatory requirements, if not exceed them. Whatever your industry is, make sure that you are not skimping on any security for your clients/customers.
  4. Limit access and enforce perimeters. Each employee should have only the access required of their job.  All traffic on your network needs to be screened for viruses and other malicious content.

Running an SMB can be extremely rewarding. Protect your livelihood by taking reasonable and required measures to prevent cybercriminals from ruining your hard work.

Preventing cybercrime and protecting small businesses is one of the most important goals of Trustwire. Enable your employees to communicate, transfer, and store documents safely today.

Wednesday, June 12, 2019

Top 5 Email Security Risks in 2019

email security risks in 2019

Once again, we are confronted by a fact: email is not secure. As invaluable as email is, malicious actors look to its weaknesses to take advantage of users, and the threats are growing in sophistication.

According to the Email Security Risk Assessment (ESRA) quarterly report released by email and data security company Mimecast, these are the top # email security risks in 2019.

#1 Spam

While one kind of SPAM may be detrimental to your arteries, the other kind targets your email and attacks your identity and privacy. ESRA looked at some 319,000 email users over the course of a little more than five years.

In this time, they identified more than 26 million spam emails. The report notes that spam is generally just annoying. However, in that larger number of annoying emails, there were many truly damaging and malicious emails. 

#2 Dangerous File Types

The report identified more than 25,000 files that were malicious. It’s important to note that these emails with attachments were approved by organizations’ email security systems. These emails contained attachments that, when opened, install systems detrimental to the user and/or organization. Such files include programs (.exe), source files (.src), and Java service pages (.jsp).

 #3 Malware

Malware is software that gains unauthorized access to a computer and causes that device harm. The ESRA found that over 27,000 emails contained malware. Yet again, these emails made it past the organization’s existing security. Malware has become increasingly sophisticated. Past methods to detect malware are sometimes unable to find this new more targeted and deceptive software.

#4 Impersonation

Impersonation attacks generally try to buy credibility by assuming the identity of a trusted entity. Name recognition causes users to let down their guard, and the impersonation attack succeeds in its deception. Oftentimes, these emails enlist the user to send sensitive documents, transfer money, or otherwise divulge valuable information. ESRA found over 55,000 of these attacks. These scams have even targeted university students.
email security risks in 2019

#5 Sinister URLs

The report also found more than 460,000 or 1 in 69 emails containing a malicious URL. This leaves organizations and employees vulnerable to malware, spyware, or ransomware. Businesses can hardly be thrilled about assuming this level of risk.

Top 5 Email Security Risks in 2019

In light of the top email security risks in 2019, we hope it has become evident how truly un-secure email is. All of the emails analyzed by in the report were already being screened for malicious activity, yet several millions of malicious emails made their way into employees’ inboxes.
Trustwire’s remarkably simple browser-based platform enables your employees to share documents and messages without compromising your organization’s security. Sign up today if you’re interested in the safest way to transfer files online.


Monday, June 3, 2019

Email Security: Best Practices for Your Organization


From Microsoft to the Democratic National Committee, email security seems to be tenuous, at best. Not only are large-scale organizations vulnerable, but personal email accounts as well.

John Podesta fell prey to a phishing scam in his email, and Colin Powell’s personal opinions became public knowledge after his email was hacked and leaked. 

With email so seemingly open to attack, many wonder what are the best practices for email security for their organizations and personal lives.

Email Is a Target

Many do not consider email as the primary target of hackers looking to access information. Email is the point of entry for something bigger: bank accounts, servers, etc. However, data contained within emails frequently are the target of hackers. 

Think about this: how often does your organization use email to plan or record strategy, culture, and actions? Now, imagine handing this information over to a hacker? 

You wouldn’t do that, yet email susceptible to hacking makes that a very real possibility.

Why Secure Email?

Because email is such a common form of workplace communication, organizations must secure it if they want to secure their data. 

With BYOD becoming more commonplace, and the added issue of IoT, organizations are at a loss to find a simple solution to all their digital security problems.

So, while an organization-owned computer may be secure, an employee’s personal computer may not be. Given how work seems to take place both in and out of the office, secure methods of transferring sensitive files and communications need to be found. 

Historically, the complex nature of email security has muddied the water when it comes to best practices.

Email Security | Best Practices

Strong Security

Email has its advantages for file transfer: it’s portable, easy to use, and ubiquitous. 

Unfortunately, solutions to secure it tend to fail for two reasons: either they’re too difficult to implement or they’re not actually secure. 

Trustwire offers the robust security of AES 256-bit and RSA 4096-bit encryption. We also don’t have the access to or the ability to decrypt the files you send and/or store.

Easy to Use

We wanted to create something that is extremely secure but also easy to use. Our web-based portal keeps things easy. 

Simply create an account, login, and begin sharing files securely. Clients and colleagues do not have to download any apps or programs to access the files.

Use your email, but when the transfer of sensitive or confidential data is required, look to Trustwire.

The Best Secure Dropbox Alternative


It’s become common practice, when we sign up for something, to quickly click that “I agree to the Terms of Service” box.

No doubt the millions of Dropbox users have clicked that little box without thinking of the consequences.

By doing this, you and your organization have agreed to allow Dropbox to access your files, scan, and share them with third parties at their discretion. 

Hardly seems secure, right? Luckily there is a secure Dropbox alternative.

Why Dropbox Can Be Problematic


In its Terms of Service, Dropbox clearly states that:

  • They collect data on how you use their service.
  • They collect your IP addresses, browser and device information, and the webpage you visit before accessing Dropbox
  • And they collect personal data for their “legitimate business needs.”
It’s important to note that Dropbox promises not to sell your data to any third parties. However, its collection suggests that it could be targeted by malicious actors. 

Meaning, if all this valuable information about your usage history and business is stored somewhere, it can become a target for enterprising hackers. 

Clearly there is a need for a secure alternative to Dropbox.

Why Do I Need Secure File Sharing/Storage?


Secure file storage and sharing is important for businesses and individuals. Businesses need to protect customer or client confidentiality and trade secrets and innovations. 

Individuals need to preserve confidential documents online, such as tax returns, pay stubs, health records, and identity records. None of this needs to be vulnerable to malicious people or software.

What to Look for in a Secure Dropbox Alternative


Trustwire provides the ease of use and accessibility of Dropbox but also provides the powerful security you and your organization deserve. 

Let’s take a look at what we offer:

Free
  • 2 GB secure storage space for your files
  • Exchange up to 100 files per month with other Trustwire users
  • True end-to-end encrypted for file exchange and storage
  • Strong AES 256-bit and RSA 4096-bit encryption
  • Incredibly simple-to-use interface
  • Advanced search to find your files quickly
  • Manage your contacts
  • Upload personal files to your account for backup and safekeeping
  • Use tags to easily categorize and identify files
  • Invite unlimited friends and family to join Trustwire and starting exchanging files and messages securely
Business
  • Everything in offered in Basic
  • 2 TB secure storage space for all your files
  • Unlimited file exchange per month
  • Trustwire SecureLink lets you to receive files from anyone securely with same level of encryption, even if the sender is not a Trustwire user
  • Branded site with your logo
  • Unlimited email support with guaranteed 24-hours response time
Sign up today to explore how you can securely transfer and store files with Trustwire!

Legal Cybersecurity: A Lawyer’s Obligation

Most of us are familiar with Attorney-Client privilege, or an attorney’s obligation to maintain the privacy of the communications between themselves and clients.

This enables the lawyer to have the full confidence of their client and work to their best advantage. 

Recently, the American Bar Association (ABA) has published guidance on how this obligation to privacy extends to digital data. 

They state that a lawyer has a strong obligation to protect all electronic communications and data exchanged in the attorney-client relationship.

The Risks


Because lawyers often handle confidential client material, this data can be vulnerable to targeting by hackers. Oftentimes attorneys have financial documentation, identity documents, and in some cases health records pertaining to clients.

Furthermore, the ABA urges legal practices to have a plan of action for handling data breaches before they occur. 

While the ABA offers guidance, it does not go so far as to recommend technology to support legal practices, leaving legal cybersecurity at their discretion.

Legal Cybersecurity with Trustwire


Trustwire simplifies the process of protecting client data for attorneys. Clients and attorneys can exchange files and messages with strong end-to-end encryption. 

Furthermore, neither clients nor legal practices will have to bother with downloading software or learning difficult encryption. 

Simply sign up with Trustwire with an existing email address and both attorneys and clients and store and share files securely.

Take a look at some of our features:

· Strong encryption: AES 256-bit and RSA 4096-bit encryption that is open sourced.

· Trust: Our encryption has no built-in backdoors, and we cannot access your files or messages.

· Privacy: Your usage, location, and data are never tracked, sold, or given away.

· Simplicity: User-friendly for even the most technologically-challenged user.

· Accessibility: Attorneys and clients can access the web-based portal from any device and any modern browser.

Find out how your legal practice can benefit from secure communications with Trustwire.

Is Dropbox Really Secure for Your Business?


When it comes to sharing photos from the big family reunion, Dropbox is great. Most people use it at home, so it makes sense that this translates to work. 

In fact, Dropbox Business has more than 300,000 subscribers. Unfortunately, when you look at how their digital security functions, Dropbox appears to be an inadequate solution for secure file transfer. 

In this post, we explore why.

Data Encryption Insufficient


Dropbox stores your confidential files alongside other users’ data. This means your company’s files on new products and financial reports are in the cloud right next to Grandma’s apple pie recipe. 

Business files need to be properly isolated. In the event of a security breach, your data may not be safe.

No Granular Permission Options


In order to facilitate collaboration from employees at multiple locations, files are often uploaded for editing. 

Currently, there are no options to set permissions for certain groups of users, which is another way in which Dropbox is not secure for business. So, your junior employees will be granted access to the same files as C-level executives. 

This doesn’t mean the files under the purview of your junior employees don’t need to be secure, but the lack of granular permissions can be an issue.

No Passwords for Subfolders


Because Dropbox won’t allow you to password protect subfolders, your business may have to restructure its folders. At best, this is a waste of precious time. 

At worst, some employees will be granted access to information they shouldn’t be privy to. Another way in which Dropbox doesn’t meet the needs of businesses.

No Option for Password-Protected Links


Currently Dropbox doesn’t allow you to share a link to a password-protected link. Furthermore, you cannot add password to a file already uploaded to Dropbox. 

Basically, once it’s uploaded, everyone who has access to the Dropbox account can access the file.

No Involvement from Your IT Department


Another reason Dropbox isn’t secure for business is that your IT department doesn’t have access to an audit log—so they cannot know who has accessed your files. Your IT department cannot wipe a device that has been lost or stolen. 

Additionally, IT staff cannot alter who can sync with particular files. This takes a lot of control away from the professionals you employ to monitor your technology.


You Can’t Lock Editing on Files


During the collaboration process, when you come to a stopping point, you need to lock editing. 

If you don’t do that you can waste a lot of time sorting through different versions, trying to find the final product. 

When the final edits have occurred, you need to halt the process, and you can’t do that with Dropbox.

So, Is Dropbox Secure for Business?


Dropbox is a great app for people to use in their personal lives, but it just doesn’t meet our standards for secure file transfers. 

As we discussed, you can see several areas where Dropbox may leave you wanting. 

If your business is looking for a simple, secure file transfer method, go to Trustwire now and sign up today.

3 Secure Communications Tips for Journalists



In a contentious political climate, it becomes increasingly more important for journalists to secure their online communications.

Sources often provide valuable information, and if they are exposed as sources can face personal or career backlash.

In some cases, as with former Senate aide James Wolfe, the source can face criminal charges. Here are three secure communications tips to help journalists.

Tip 1 – Eliminate Metadata of Photos and Documents


First, sending and receiving files securely is the best secure communication tip for journalists. Then, before journalists use documents and photos sent by sources, these files need to have their metadata removed.

A few great tools for this include: Exiftool for documents and mogrify for photos.

Keep in mind that any tracking pixels from Data Leak Protection software needs to be removed in addition to removing the metadata. For PDF files, which are notorious for phishing scams, we recommend PDF-redact-tools.

Tip 2 – Reduce Instant Messaging Issues


While encrypted instant messaging apps may seem secure, they also leave a trail of metadata. So, while the content of the messages may be encrypted, communications between journalists and sources can still be evident.

Messages can be exchanged along with files via web-based Trustwire.

Tip 3 – Document Exchange Security


First, journalists should receive sensitive documents on a secure file sharing platform, such as Trustwire.

This ensures that documents cannot be accessed at any point in transit, nor can they be accessed from storage on Trustwire.

Furthermore, encryption is rock solid, and the platform can be accessed from anywhere. Trustwire does not track usage, IP addresses, or location info, and doesn’t have access to its users’ files or data.

Other options for secure document transfer exist, but sources may not be willing or able to use the technology, rendering it useless.

Then, the file needs to have its metadata scrubbed as well. Use exiftool <filename> on each document. This may involve converting a Word file to a PDF and then using the pdf-redact-tools to be absolutely sure of sanitation.

Secure Communications Tips for Journalists Takeaways


Journalists have an obligation to protect their sources from unwarranted backlash. Beyond that, these secure communications tips can enable journalists to demonstrate a record of integrity.

Removing metadata from images and files can protect sources. More importantly, providing sources with a secure means of transferring sensitive files and exchanging messages is crucial to maintaining privacy.

Trustwire simplifies the former by allowing you to exchange and store files from sources in a secure location.

We provide powerful encryption technology with none of the hassle. Simply sign up for Trustwire and begin sharing files securely.

Trustwire allows you to use end-to-end encryption to send files, and you can send secure messages along with your file. Trustwire will never access your documents or analyze your data for any purpose at all.

Take the guess work out of file sharing, and sign up with Trustwire today.

The Best Ways to Share Files Securely

In our fast-paced, electronic-device driven world, in-person document delivery rarely occurs. In business situations, we collaborate and ...