Showing posts with label Privacy. Show all posts
Showing posts with label Privacy. Show all posts

Saturday, September 19, 2020

Privacy in The Era of Big Data
















Let’s face it. We live in a world where practically everything we do is being monitored and saved on the internet. Yes, we have access to tech devices that make our lives so much easier, and they come cheap. But what people tend to overlook when they’re browsing the web, downloading the new “it” app, or even sending a selfie to their friends is that they may not be as protected as they may think. When was the last time you read a company’s privacy policy or the T&C page? If you can’t answer, you’re not alone. Data protection and privacy are some of the most underrated acts of personal security.

Do you know how valuable your data is?

While you may think you’re just another user in the pool of thousands, brands do whatever it takes to find out more about you, your browsing habits, and even your spending history. Machine learning has enabled companies to learn things about you, like where you tend to shop, your personal contact information, and where you’re geographically located. Sounds invasive, right? Consumers must be aware of how valuable their data is, and companies must start being more transparent with their audience about their business models. Shouldn’t consumers be offered a fair and transparent trade for data about THEM?

Government’s are exploiting user data:

While we may not be entirely shocked to learn that corporate institutions are exploiting user data for their own gain, did you know that governments are doing it as well? Unfortunately, cases of identity theft are rapidly growing in developing countries. Governments who should be educating their citizens on proper data protection are instead abusing user data for their own benefits without proper consent or acknowledgment. Until appropriate laws, rules, regulations, and sensitization concerning data protection are put in place; people are at a loss. Legislation should be used to help serve their community; instead, government officials are using it for personal and financial gain. People all around the globe are simply not told about the dangers of having their information stolen. And it seems like the governments in some countries are hoping to keep it that way.

Trustwire can help keep you protected:

Everyday people online are unknowingly exposing themselves to cases of identity theft and data fraud. With the lack of rules and regulations concerning data protection laws in most countries, people are forced to take matters into their own hands. There’s a severe lack of consequences for the mishandling of private or personal information. Trustwire is tool businesses and individuals can use to ensure the data they share over the internet remains safe. Using end-to-end encryption, all files sent through Trustwire are protected from vicious internet predators.

Identity theft is at an all-time high. How do you know you’re not giving hackers exclusive access to your most sensitive information? With Trustwire, never fear your personal information being in the hands of the wrong people.







Thursday, August 27, 2020

The top 5 Best Startup Tools for 2020

Startups need to be fully equipped with the proper tools in their arsenal to survive in the highly-competitive industry. With limited resources (specifically money and time), startup founders seek help from security, accounting, and team management tools online. Luckily, there are plenty of tools that help minimize startup costs and help save a new entrepreneur’s precious time. 

Now, business owners can significantly enhance efficiency with just a few great tools. Below are the top 5 tools and resources you can use to help make your landing into the startup world a little smoother.

1. Slack

Work better at home or in the office by organizing all of your projects in one comfortable place. Slack is an incredible communication tool for both groups and one-on-one chat flows. The app is an all-in-one meeting space that helps keep teams organized. It’s incredibly useful when working remotely as well! Slack allows users to categorize their conversations in “channels,” making relevant information quick and easy to find. If you’re working on the go, Slack also has a user-friendly mobile app and integrates with other tools like Trello and Twitter.

2. Trello

Trello is a web-based project management tool that was built for improving workflow. It’s quickly becoming a household name among startups owners across the globe. This project management software allows project managers to organize multiple projects with specific tasks inside each project. This fast Kanban tool is for anyone who needs to capture, organize, and provide real-time insights regarding project status. Plus, it’s free! Trello is known for being ultra user-friendly, and the free plan offers all the tools and functionality a small startup needs.

3. Zoom

While Zoom may have gained worldwide popularity during 2020 because of COVID-19, it was actually ranked the #1 meeting tool by Gartner in 2018. The fast and reliable video conferencing software makes remote working a breeze. Startups and major corporations alike are relying on Zoom to conduct team meetings. To keep everyone in the loop, users can integrate Zoom with Slack to automatically share the recording with participants after the call ends.

4. BambooHR

BambooHR provides human resources software as a service. Brand new startups often ignore ‘corporate’ functions like HR - which is a big mistake. BambooHR is a handy online tool that makes hiring, transitioning, and recruiting a breeze. With onboarding tools and applicant tracking features, BambooHR users can easily keep track of potential applicants. The app also gives users the ability to track time-off, performance management, and e-signing.

5. Trustwire

Surely as a startup owner, you and your employees will need to send and receive multiple files. But did you know that cybersecurity risks are at an all-time high? Trustwire is an online tool to send and receive sensitive data safely. If you think sending files over email is safe, think again. Instead, use Trustwire to ensure no one other than the rightful receiver of a file will be able to open. All data is end-to-end encrypted, meaning Trustwire or any other third party can not access your data.






Saturday, May 30, 2020

Take Control of Your Digital Life: 7 Ways to Protect Your Privacy



Technology has changed our lives. It’s made our lives more convenient. We can shop for pretty much anything under the sun, order food, talk to loved ones, and even be treated by a doctor, all over the internet. While tech advances have incredible advantages, like everything else, it also comes with a slew of disadvantages. Website hackers are waiting to gain access to your personal information. Malicious online behavior is nothing new, and the hackers are only getting smarter. That’s why data security is so important. Here are 7 ways that you can protect yourself and your identity.

1. Be cautious of phishing

Phishing is one of the most common ways hackers try to get a hold of your personal information. Usually, the hackers will attach a link containing malware or other viruses in an email. Once you click the link, they have access to all of your info. Always be wary of opening email attachments, even if you think you know it’s from a reputable sender.  


2. Remember that incognito mode doesn’t mean you’re invisible

The privacy feature, available on Chrome, Safari, and Firefox may sound secure, but pay attention to the clear warnings. On Chrome, for example, it says, “Going incognito doesn’t hide your browsing from your employer, your internet service provider, or the websites you visit.” So, it doesn’t help when it comes to data security, but it will prevent anyone using your computer from seeing which sites you visited.


3. Practice safe texting

Signal is an excellent tool for people who want to protect their texts. It’s free, easy to use, and available for iPhone and Android. WhatsApp is another popular chat tool, which uses Signal’s software to encrypt its messaging.


4. Use Strong Passwords

Did you know that 83% of Americans still use weak passwords? According to  Avast Press, it’s a good idea to change your passwords often and pick something more clever than your dog’s name or your birthday.


5. Use a VPN

A Virtual Private Network (VPN) lets you surf the internet without anyone tracking your IP address. The good ones aren’t free, but worth the investment in your privacy and data security. You can also use them across all of your devices, like your smartphones, tablets, and
computers.


6. Use an encrypted file-sharing software

For anyone who deals with sensitive information on the internet, surely privacy is a top concern. Business owners, doctors, journalists, and lawyers are continually sending files containing their own or their client’s info. Trustwire is one of the easiest and safest ways to send and receive files online. The software uses end-to-end encryption so you can ensure hackers won’t be able to crack the codes to your data.


7. Keep your data backed up

Online backup services like CrashPlan, back up your data and encrypt it at the same time. The backups help protect your photos and documents during a technical malfunction and from ransomware and other malicious attacks.







Saturday, May 23, 2020

FaceApp Lets You Peek Into The Future. Does It Also Violate Your Privacy?



FaceApp is the photo-altering smartphone application that takes one of your photos and 'ages' it by decades. The app works scarily well, and the modified photographs do give users a realistic glimpse of what they could look like in 30 to 40 years, or what they may have looked like as young children. 

The app was created by Wireless Lab of St. Petersburg, Russia, and quickly soared to be amid the top free apps in both the Apple and Android app stores. This could have something to do with the major social media and celeb following. Once A-List celebrities like The Jonas Brothers, Drake, and Chris Hemsworth began shouting out the app on social media, needless to say, the buzz around FaceApp was swarming. 


The Russian hacker jokes are endless. Many influencers have taken to Twitter to poke fun at the fact that Russia now has access to many of our personal photos and potentially our information. While there is no hard evidence that FaceApp is stealing photos and taking them back to Russia for some evil project, there are a couple of privacy issues.

FaceApp And Your Privacy, What You Need To Know


FaceApp's privacy policy and terms and conditions have been raising eyebrows, and growing concerns over cybersecurity and the app are on the steady incline. One clause that stands out is that FaceApp holds extensive rights to its user's photos. Do keep in mind that many other apps do as well, though, and this is the unfortunate "norm" in the world of photo applications. According to Jeremy Gillula, who is a project director at the Electronic Frontier Foundation (a nonprofit civil liberties group) does say there is cause for concern. 

According to Gillula, "The fact that a lot of apps and services usually contain this catch-all clause that says you grant us worldwide license to reproduce, modify, adapt, create derivative works from, distribute, publicly perform and display your user content always seems a little over the top to me.  


Is FaceApp Safe To Use?


It's always disheartening when a seemingly fun, harmless smartphone application can create serious concerns surrounding privacy and cybersecurity. Many of the app's young users don't give a second thought to whether or not their information is protected. However, for working professionals, people who own/operate businesses, and anyone who wants to keep their privacy, using FaceApp may not be the best idea. 

Reps from FaceApp have divulged that most of the images uploaded from their serves have a 48-hour lifespan until deleted. They claim to never sell or share user data with third parties; however, in their privacy policy, it does say they reserve the right to share some information. 

This info includes analytic tools to help measure traffic and usage trends, and these are done with third-party organizations. 

All in all, FaceApp most likely isn't using your photos for some kind of world-domination scheme, but you should still be cautious of everything you post on the app.


Trustwire is a browser-based file transfer method. Using the latest end-to-end encryption software, Trustwire guarantees your files will be shared safely with only the rightful recipient. Our free service means no more trips hand-delivering data, worrying about cybersecurity breaches, and knowing the information you divulge to your CPA, lawyer, or doctor remains secure. With Trustwire, you can easily exchange and access files anywhere in the world, and no downloads or installations are required. Are you ready to start surfing the internet securely? Sign up for a free account Trustwire here.






Tuesday, April 28, 2020

Is Zoom Protecting Your Sensitive Information



Since the worldwide outbreak of COVID-19, many people have been forced to stay at home, either to practice self-distancing or in mandatory quarantine. While we may be living in the middle of a pandemic, work must go on, even if we're doing it from our living rooms. In comes the popular video conferencing app, Zoom. This easy-to-use app is currently being utilized by millions to host work meetings, interviews, virtual birthday parties, dinners, and more. While the user-friendly, free app may be one of the most popular during the pandemic to see familiar faces online, it does come with a slew of privacy and cybersecurity issues.

Zoom's Past Privacy Blunders:


Zoom is no stranger to privacy snafus and data breaches. You may be familiar with the term "Zoombombing," where cybercriminals and trolls hijacked user's web cameras and bombarded them with inappropriate materials during their videoconferences. Zoom's chief executive, Eric Yuan, has addressed the security concerns and has apologized for the application's recent problems. While the company has promised to fix their privacy and security issues, can we trust it? When a company fails to protect its user's privacy, more often than not, it does leave a bad taste in their customer's mouths. However, so many of us are relying on the software to comply with work orders, or keep up with family and friends during the coronavirus pandemic.

Should You Still Use Zoom?


We get it; in these difficult times, many of us don't have any better options than to continue to use Zoom. Keep these tips in mind to ensure your privacy remains protected while using the app.

  • Zoom is safer on mobile devices:
  • Use the app on an iPad, iPhone, or Android smartphone, rather than on a Mac or PC. Mobile apps that go through Apple's App Store and Google's Play store go through more rigorous review processes, including inspection for security flaws.

  • Turn on Zoom security settings:
  • Be sure to create a meeting password to help prevent any unwanted visitors Zoombombing your video calls.

  • Don't rely on Zoom to relay sensitive information:
  • Try to avoid using Zoom on work calls relating to any private or confidential matters.


If Privacy is Your Main Concern, Try an Alternative:


If Privacy is Your Main Concern, Try an Alternative: If your line of work can survive without video calls, stop using Zoom. With so many of us working from home now, likely you'll need to implement secure file transfer software. Trustwire is the most reliable way to send and receive files online. Use Trustwire to safely send data to your customers, employees, and colleagues.

If you require video conferences to complete your work, there are other video chatting tools available, with better reputations. Applications like Google's Hangouts, Cisco's Webex, and FaceTime for Apple devices are safer alternatives to Zoom. While they may not be as straightforward and easy to use, you can worry less about cybersecurity.

To learn more about how Trustwire can be a useful tool against ransomware attacks and other cybercrimes.






Thursday, July 25, 2019

Is There a Safe Way to Transmit HR Documents Online?


is there a safe way to transmit hr documents online

HR documents are a treasure trove of personal information. As of July 2019, over 4 billion sensitive pieces of data have been breached. That being said, is there ever a safe way to transmit HR documents online? We think so, and we’ll tell you why.

The Problem

The methods we use to transfer secure documents are just not robust enough to weather sophisticated security breaches. We’ve blogged a lot about how email is an extremely vulnerable method of file transfer and storage. So, that’s no way to transmit an HR document.

Similarly, encrypted email falls short a lot of the time as well. While your end may encrypt the email before it’s sent and transmit it encrypted, your recipient may not have the same concerns. Thus, your transmission is potentially open to being compromised.

Is It Safe to Fax to Transmit HR Documents Online?

Well, in a couple of words, probably not. Fax machines are susceptible to human error—dialing the wrong number, it’s an image document, and it may be viewable at the receiving site by anyone. Online Fax or Cloud-Based Fax is generally considered much more secure than traditional faxing.

is there a safe way to transmit hr documents online


In-Person Delivery

When it comes to secure file transfer, it’s really difficult to find a method more secure than this one. However, for obvious reasons, this isn’t always possible. When you don’t work on-location, it’s essential to send HR documents online.

Trustwire: A Secure Online Solution

If you need to transmit HR documents online in a safe way, consider Trustwire. New employees can easily create an account to send documents to HR departments. All documents are end-to-end encrypted.

Furthermore, Trustwire’s ease of use is unparalleled. This means that what it costs to keep your employees up to speed on how to use the platform is virtually free and intuitive.

Is There a Safe Way to Transmit Documents Online?

Yes. Put your confidence in a service that is committed to maintaining its clients’ privacy above all else. Learn more by visiting our website.

Transmission of Security Clearance Documents

what type of information is requested on a security clearance

In the Greater Capital Region, having a security clearance is a common requirement for employment. Even more, having a security clearance can set an applicant apart from others in the job selection process. Knowing what type of information is requested on a security clearance is important. Similarly, protecting the transmission of this sensitive information is vital. Let’s take a look at what’s involved.

What Type of Information is Requested on a Security Clearance?


National Security positions generally look a few key areas of an applicant’s life. The first is identity and citizenship. You will need to provide your name and any other names you’ve had. You will need to provide information about your citizenship.

While this is pretty straightforward for many applicants, those who are naturalized citizens, hold dual citizenship, or those who are not U.S. citizens will be required to give more information. You will want to share this information securely.

Residence, Employment, and Education


Following your citizenship and identifying information, you will need to provide your residences for the last ten years. Then, you will be required to list your education history. The scope of your education will involve all of the education you have had after your 18th birthday, unless you need more to provide at least two years of educational history.

Then, you will be required to list your employment history for ten years. You will need to provide the name and contact information for your supervisor at each of the positions you have held. There are options for unemployment, self-employment, and “other” if necessary.

Naturally, you will be required to list any and all involvement you have had with the military, including foreign military service.

The type of information requested on a security clearance involves listing whether or not you were reprimanded, fired, or for what reason you resigned from any of these positions.

what type of information is requested for a security clearance

Personal, Financial, and Legal History


The next section of your application will involve listing references for people who know you well. You’ll be required to detail your marital history. If you currently reside with a significant other, you will be required to list his or her information.

The form requires that you list family members, foreign contacts, activities, and travel. You will be asked to describe any mental health services you’ve received. Obviously, your criminal record, if any, will need to be disclosed in full detail.

In addition to your legal record, you will be asked to provide information concerning drug and alcohol use. Your financial information, including any bankruptcies or significant debts will need to be listed.

Transmission of Security Clearance Documents


As you can see the type of information requested for a security clearance is extensive. As this is a matter of national security, that makes sense. However, a significant amount of personal information resides on this 100+ page form. If you fill out the file on your own and send it in, you will need a secure means of transfer to protect your sensitive information. You really should not rely on email

Trustwire’s secure, end-to-end encryption technology ensures that your document is stored and transmitted safely. Sending such a comprehensive document should be done with the utmost care. Be confident when you click send. Learn more at Trustwire.com

Intellectual Property Theft | Is the Cloud Vulnerable?

intellectual property theft and the cloud

Being relevant and competitive in a global economy requires innovation. Successful businesses realize that innovation requires collaboration. To that end, cloud-based solutions allow for collaboration on projects despite differences in geographical location. But does using the cloud place your organization at risk for intellectual property theft? Let’s take a look.

What’s at Stake?


Trade secrets, patents, product designs, and ideas in development. Making all of these available across the devices and locations of various employees creates a potentially risky situation. Litigation over patent disputes, for example, can be astronomical.

Cybercrime experts suggest that more than a quarter of hackers seek IP rather than consumer identity or financial information. This means that your organization’s IP is vulnerable.

Intellectual Property Theft and the Cloud


Unfortunately, protecting IP is a bit tricker than preventing typical data breaches. Why? Most typical data breaches come from external sources—hackers seeking your clients’ information, for example. 
However, when the target is IP, according to a study conducted by Verizon, 49% of IP theft was due to either employee misuse or employee (current or former) malicious actors.

intellectual property theft and the cloud

Tips to Protect Your Organization


  • Remove access to the cloud from former employees.
  • Restrict access to information stored in the cloud to each employees specific needs only. Make sure that you can use tiers, and enforce access levels.
  • Train your employees to use the cloud responsibly—especially with regard to protecting security.
  • Furthermore, encrypt all files. This prevents transmission of sensitive files if devices are lost or stolen.
  • Maintain an audit trail within your cloud to monitor patterns of access and to alert security professionals to unauthorized access.
  • Use Trustwire.


How Trustwire Protects Your Organization from Intellectual Property Theft


Trustwire uses the strongest open-sourced encryption to secure your files and messages. Furthermore, unlike other cloud-based solutions like Dropbox, Trustwire does not have access to your organization’s messages, files, or data. This further secures your IP.

Trustwire has unparalleled ease of use, meaning that your employees can quickly adjust to working with it. Furthermore, Trustwire is available on any device, anywhere in the world. Click here to earn more about how your business can begin protecting its valuable intellectual property with Trustwire.

Avoiding Cyber-Espionage in China and Hong Kong for Business Travelers

avoiding cyber-espionage in china and hong kong


As China is the US’s second largest partner in trade, business travel to China and Hong Kong is essential. But should you be packing your laptop and smart devices? We’ll show you why avoiding cyber-espionage is essential for the business traveler.

Business Travel

Partnerships with Chinese companies remain lucrative and fruitful. Yet, many fear that traveling on business can leave their data subject to surveillance by the Chinese government. There is some evidence that Chinese custom officials were installing spyware on devices.


China: A Surveillance State

For years, the Chinese government has been tracking its citizens: their travels, their credit, and their activity. This is daily life for Chinese citizens; however, this type of surveillance is highly suspect to Americans.

Unfortunately, many nations choose to spy on citizens of other nations as they travel. Much of the time this is for national security purposes. Yet, visitors tracked in China tend to be those who have important corporate ties—pointing to an economic incentive at hand.


avoiding cyber-espionage in china and hong kong

Corporate Espionage: Part of the Game?

While Chinese officials insist that corporate espionage takes place in many countries, yet the US government has publicized many recent cases of corporate espionage.

Avoiding Cyber-Espionage in China and Hong Kong

Here are some tips to take to avoid being subject to cyber-espionage while traveling on business to China or Hong Kong:

  • Do not take un-needed electronics with sensitive data
  • Consider using temporary laptops that have been cleared of sensitive data; ditto for cell phones
  • Use thumb-drives for sensitive data, and open files on offline computers only
  • In order to access files online, use a service like Trustwire, which is end-to-end encrypted and can be used on any computer.
  • Keep in mind that all networks are owned and monitored by the Chinese government.
  • Change passwords often.
  • Back up your information.
  • Do not accept thumb drives or other electronic devices as gifts.
  • Remove cell phone batteries to limit tracking.

Depending on how sensitive your data can be, all these tips may not be necessary. Storing and transferring files on Trustwire is an easy and portable way to ensure the security of your business documents. Click here to find out more.

Business Travel Abroad | Protecting Secure Documents

protecting secure documents business travel abroad

One of the best things about our interconnected world is that we can often work from anywhere. This allows us the freedom to explore while managing to make a living. However, the need to protect secure documents when engaging in business travel abroad is a real need. We’ll outline the practices you should follow.

Business Travel & Cyber Security

The thing is, when you travel abroad for business or leisure, your sensitive data is up for grabs. Whether from foreign governments, corporate entities, or private illegal hackers, your email, documents, and data represent valuable capital for others.

So how is protecting secure documents possible when you have business travel abroad?


Consider a Password Manager

Companies like LastPass and 1Password allow you to manage your passwords in a way that makes them far less vulnerable to malicious actors. Both of these services are available at a low cost.

Also, when it comes to the security of your personal bank data, it’s worth asking your bank what they offer. Banks often have security measures available that aren’t well known to even their own customers.

protecting secure documents business travel abroad


Back Up Your Secure Documents

Backing up your secure documents is important so that a stolen device doesn’t mean that you’ve lost things permanently. Store this back up in a separate location that is also secure. Consider a physical drive, as well as an online back up.


Trustwire offers cloud storage that boasts incredibly strong encryption to keep your documents safe from those with malicious intent. Furthermore, should your laptop go missing abroad, you can access 
Trustwire from any computer without worrying about it being compromised.

Protecting Secure Documents During Business Travel Abroad

Trustwire can be one of the components of cyber security for smart business professionals. Trustwire enables you to securely store and send documents regardless of your location or the device from which you access it. To learn more about our business or personal plans, click here.

Privacy Concerns Online | Is FaceApp Safe?

privacy concerns online and faceapp


Recently, pictures of all your friends covered in wrinkles have gone viral. Everyone’s doing it and commenting on how much they look like a grandparent of theirs. Then, the debate over terms of service agreements and the company’s origin and intentions have sparked controversy. Should you have privacy concerns online regarding the FaceApp?  Let’s take a look.

A Bad Idea?

As soon as it seemed like everyone was posting their picture, the “thoughtful” friends appeared in the comments. Didn’t you read the terms of service? Don’t you know this company owns all your photos now? Is the company spying on behalf of Russia?

The Industry Norm?

And of course, there was the in-turn response: Facebook creates just as many privacy concerns online as the FaceApp. No one reads the terms of service agreements. Doesn’t the US government already keep track of our online activity?


A Mixed Bag

Well, the truth is somewhat murkier than either side would have you believe. FaceApp is probably not going to use your photos to create crazy DeepFake videos. The App’s founder Yaroslav Goncharov insists that no data is sent to Russia. They also claim that your data is not shared or sold to third parties. While all of this is comforting, it does not seem to be entirely true.

Privacy Policy Woes

In its privacy policy, FaceApp does ask users to “grant FaceApp a perpetual, irrevocable, nonexclusive, royalty-free, worldwide, fully-paid, transferable sub-licensable license to use, reproduce, modify, adapt, publish, translate, create derivative works from, distribute, publicly perform and display your User Content.” That’s definitely not something most people would be comfortable with.

Beyond that, the Washington Post found that FaceApp did have third party trackers in its app. Also, its photos are processed in the cloud rather than on your device. While it claims photos are deleted within 48 hours, there’s no real way to verify this.

FaceApp and Privacy Concerns Online

The most alarming aspect of the whole FaceApp debate is not that it is some anomaly in the tech landscape, but that it isn’t. Privacy policies are rarely read, and for good reason. They’re super long, and they’re written by experts who can easily bury their true objective in legalese on behalf of the app. Checking the “agree” box initiates a commonplace scheme: your data is sent to a variety of locations.

privacy concerns online and faceapp



The stakes are huge. They’re not just using our data to sell us more stuff. As the Cambridge Analytica and 2016 election taught us, they may be influencing the way in which we elect our government. This is why we feel Trustwire’s mission is so essential.

How Trustwire is Different

In the world of surveillance, where your data becomes the property of other’s agendas, we are committed to protecting your privacy. This is why we encrypt your messages, files, and photos. In fact, no one who works at Trustwire has access to any of your content or pattern of access.

This means that you are in complete and total control of your privacy. We think this should be the industry standard. Learn more about how we can help you protect your privacy online. 

Friday, June 28, 2019

Is Gmail Really Confidential?



Seemingly a lot of changes are in the works with Google’s email systems. Recently, Google made a confidential mode available (beta) to its G suite customers.

The update promises to provide confidentiality via emails that can be sent in confidential mode and data exchange that is similarly private.

However, you may be wondering how confidential is Gmail in light of this update?

[Related: The Best Encrypted Email for Your Business]

What Is “Confidential Mode”?


Confidential mode employs IFM (information management controls) that gives users the ability to control certain aspects of their emails. For instance, they can set expiration dates, predetermine the ability for recipients to copy, print, or download an email, and revoke sent emails.

Users interested in an added layer security can opt to require a text-message based two-factor identification process as well. This aims to protect the contents of an email in case of an account’s potential security breach.

For stored files and archiving, there’s Google Vault. From Google Drive, Jamboard files can be archived and searched. Furthermore, data can be retained and exported.

How Secure is Gmail Confidential Mode?


First, it must be noted that confidential mode must be manually enabled. Secondly, recipients are able to copy and paste text once they have accessed it. There is no protection from screenshots.

Their promise of security further breaks down with regard to recipients external to Gmail—a confidential email now exists outside of gmail’s “secure” server.



Perhaps most importantly, Gmail offers no promise to bar its own access to your files. How do we know this?

Because confidential mode does not encrypt the confidential emails. This means that Google can retain your message data indefinitely and analyze its contents.

[Related: Email Security: Best Practices for Your Organization]

Why Trustwire Is a Better Alternative to Gmail Confidential Mode


Traditional super-strong encryption, such as PGP, requires the user to be knowledgeable about cryptography. Why should your everyday user learn cryptography simply to be able to share documents safely?

 On the other hand, solutions that are seemingly secure, like Gmail’s confidential setting are too weak to provide true data security. This leaves the problem of data security either too hard to use or too weak to matter.

Enter Trustwire. Trustwire is a secure, browser-based file transfer service. Simply sign up for a free personal account, or our low-cost business plan, and begin sharing files.  Trustwire has a simple user interface, yet we use the strongest open-sourced encryption available—AES 256-bit and RSA 4096-bit encryption (end-to-end) to protect your messages and documents.

Unlike Gmail, Trustwire never has access to the content of your messages or your documents. We do not analyze or track your usage or browser history. Trustwire is a simple solution to a difficult problem. Sign up today to begin sharing data with confidence.

Thursday, June 27, 2019

Whatsapp Spyware & The Importance of Encryption for Human Rights Activists and Lawyers

Whatsapp Spyware and the importance of encryption for human rights activists and lawyers



Hackers have done it again—breached what many trusted to be a secure method of communication and turned it into a tool for data mining and tracking the activity of users. 

This particular issue stems from a failing in the security framework of Whatsapp that allows hackers to infect users’ phones with spyware. 

Given the increased targeting of human rights activists and lawyers by oppressive regimes, the importance of encryption has become paramount. Whatsapp spyware further raises the stakes.

The Problem

Reuters reported just weeks ago that some governments have been using Whatsapp spyware of tracking human rights activists and lawyers they deem a threat. While Whatsapp claims to use strong encryption technology and recognizes the importance of this, their security has failed.

Human Rights lawyers and other activists realize that their work cause them to fall under scrutiny. Some even endure threats to their livelihood or person. Because of these risks, lawyers and activists use encryption to protect their anonymity while communicating online and on mobile devices.

Needless to say, learning that a government who disapproves of your work has access to your contacts’ list, location, and passwords is frightening.

The Solution

Unfortunately, this type of hacking is hard to prevent and detect, because rather than accessing data, this software accesses the device itself. Luckily, this software is expensive to operate, and hackers cannot easily make a profit leveraging this “service.” 

Facebook, the owner of Whatsapp, promises to increase security across all of its platforms. This comes especially after Congressional inquiry into how Facebook profits from its users’ data. Unfortunately, Facebook hasn’t made good on its promises before.
The importance of encryption for human rights activists and lawyers whatsapp spyware

Still, encryption is a matter of importance for all human rights activists and lawyers. While spyware that accesses your device from Whatsapp is a threat, it’s not as common as hacking that accesses your date due to a lack of encryption technology.

The Importance of Encryption for Human Rights Activists and Lawyers & Whatsapp Spyware

If you’re looking to protect sensitive documents and messages from hackers, don’t look to an organization that is designed to profit from your private content and behaviors. 

At Trustwire, we are committed to providing a truly private, truly secure means of communicating and transferring data.

We never have access to your communications or documents, and we don’t track your usage or the websites you visit before ours. If integrity matters to you, then sign up today and begin transferring and communicating with true security.

Wednesday, June 26, 2019

Stick to These Best Practices for Client Security


Best Practices for Client Security

These days keeping your clients’ information confidential is absolutely paramount to remain credible in your industry.

A data breach that leaves your clients vulnerable is almost certain death for the responsible business. Maintain your credibility and protect your clients by following these best practices for security.

1. Keep Your Clients’ Data in One Location.

This means that you shouldn’t keep information about your clients on multiple platforms with varying levels of security.

Store contracts, files, payment info and records, etc., in one location that is protected with robust security. Access to this information should be multi-factor authenticated, password-protected, and cloud-based.

2. Give Access Only as Necessary.

Once client data is stored in one location, enable employees to access only what they need to. In other words, limiting the number of folks who can access files limits their exposure to potential threats.

This type of role-based security also protects employees from altering documents outside their purview.

3. Transition to Electronic Signatures.

Not only will e-signatures be easier to gather than paper ones, they’re more secure. In addition, gaining e-signatures is quicker. Why are they more secure? E-signatures have a digital trail including when and where they were signed.
Best Practices for Client Security

4. Forgo Email for Data Collection.

Email is the number one method hackers use to access corporate entities. Therefore, do not use email to collect contracts, signatures, or exchange sensitive documents. Use end-to-end encryption methods of securing client data needed for designing or finalizing contracts.

5. Maintain Rigorous Security Standards.

Security breaches are devastating to a business; therefore, best practices for client security are vital. Make sure any cloud-based storage systems are supported by the strongest possible security.

Furthermore, make sure that you know if your cloud storage and file transfer systems collect data of their own regarding your clients’ information. This is a potential privacy violation. Beyond that, file transfers need to be end-to-end encrypted with the strongest, open-sourced encryption technology.

Best Practices | Client Security

Trustwire champions the protection of its clients’ privacy and data integrity. This means that your organization can store, share, and communicate without worry.

Trustwire uses the strongest end-to-end encryption available.

Moreover, Trustwire never has access to your data, and never tracks usage, or sells your information. Look to Trustwire to solve your security needs.

The Best Ways to Share Files Securely

In our fast-paced, electronic-device driven world, in-person document delivery rarely occurs. In business situations, we collaborate and ...