Showing posts with label Trustwire. Show all posts
Showing posts with label Trustwire. Show all posts

Thursday, August 27, 2020

The top 5 Best Startup Tools for 2020

Startups need to be fully equipped with the proper tools in their arsenal to survive in the highly-competitive industry. With limited resources (specifically money and time), startup founders seek help from security, accounting, and team management tools online. Luckily, there are plenty of tools that help minimize startup costs and help save a new entrepreneur’s precious time. 

Now, business owners can significantly enhance efficiency with just a few great tools. Below are the top 5 tools and resources you can use to help make your landing into the startup world a little smoother.

1. Slack

Work better at home or in the office by organizing all of your projects in one comfortable place. Slack is an incredible communication tool for both groups and one-on-one chat flows. The app is an all-in-one meeting space that helps keep teams organized. It’s incredibly useful when working remotely as well! Slack allows users to categorize their conversations in “channels,” making relevant information quick and easy to find. If you’re working on the go, Slack also has a user-friendly mobile app and integrates with other tools like Trello and Twitter.

2. Trello

Trello is a web-based project management tool that was built for improving workflow. It’s quickly becoming a household name among startups owners across the globe. This project management software allows project managers to organize multiple projects with specific tasks inside each project. This fast Kanban tool is for anyone who needs to capture, organize, and provide real-time insights regarding project status. Plus, it’s free! Trello is known for being ultra user-friendly, and the free plan offers all the tools and functionality a small startup needs.

3. Zoom

While Zoom may have gained worldwide popularity during 2020 because of COVID-19, it was actually ranked the #1 meeting tool by Gartner in 2018. The fast and reliable video conferencing software makes remote working a breeze. Startups and major corporations alike are relying on Zoom to conduct team meetings. To keep everyone in the loop, users can integrate Zoom with Slack to automatically share the recording with participants after the call ends.

4. BambooHR

BambooHR provides human resources software as a service. Brand new startups often ignore ‘corporate’ functions like HR - which is a big mistake. BambooHR is a handy online tool that makes hiring, transitioning, and recruiting a breeze. With onboarding tools and applicant tracking features, BambooHR users can easily keep track of potential applicants. The app also gives users the ability to track time-off, performance management, and e-signing.

5. Trustwire

Surely as a startup owner, you and your employees will need to send and receive multiple files. But did you know that cybersecurity risks are at an all-time high? Trustwire is an online tool to send and receive sensitive data safely. If you think sending files over email is safe, think again. Instead, use Trustwire to ensure no one other than the rightful receiver of a file will be able to open. All data is end-to-end encrypted, meaning Trustwire or any other third party can not access your data.






Wednesday, September 25, 2019

Top 3 Reasons Your Company Should Be Paying More Attention to Cybersecurity






Unfortunately, more small businesses are the target of cyber-attacks compared to larger corporations. A staggering 43% of cybercrime is directed at small businesses. Lawyers, doctors, and journalists are among the highest at risk for cyber threats. The key here is to be protected. Cybersecurity is the only way to ensure your data and the sensitive information of your clients is safe from the diabolical hackers that fill cyberspace.

1. Cybercrime is much more than just an inconvenience:


Yes, cyber attacks are annoying, but they can also lead to severe consequences like bankruptcy, identity theft, lawsuits, and massive money loss. While you may think you're safe by merely backing up your data, the odds being safe from an attack are unfortunately stacked against you. According to the National Small Business Association, the average cyberattack resulted in a $32,000 loss from the business' accounts. Even more worrisome, the National Cyber Security Alliance concluded that 60% of small companies went out of business within six months of a cyber attack.

2. Not all cloud providers are safe:


Not all secure file sharing software is made equal. Putting your data in the cloud means trusting your cloud providers to keep your data secure, keep customers information confidential, ensure your employee's personal information is safe, and so much more. Bear in mind this is a massive leap of faith. Before choosing your cloud provider as the following questions:  
  • How many security breaches have the provider experienced?
  • Does the vendor use end-to-end encryption?
  • How many clients does put their trust in the provider?
  • Will my data be intertwined with any other client's data?
  • How many employees does the vendor have working exclusively on cybersecurity?


3. Hackers are getting smarter:


The purpose of cybersecurity is to help prevent data breaches, cyberattacks, and eliminate identity theft. Sounds great right? Well, today the 'bad guys' or hackers are coming up with new methods to hack into sensitive information. Just like technology is always evolving, cybercriminals are getting smarter, they’re developing new ways to produce more malicious code to compromise data. Hackers don't discriminate either; they are thieves; they will attack all types of businesses and corporations from doctors offices to non-profits.


Trustwire solves all information security issues:


One of the most problematic elements of cybersecurity is the continually evolving nature of security risks. Trustwire is always on top of the latest technologies to ensure your business is safe from hackers sealing, altering, or destroying your data. We use end-to-end encryption to guarantee that only the owner can see the contents of the files, and whomever they choose to share them with. Don't leave your data at risk, by using a trusted secure file sharing service like Trustwire; all of your sensitive information in the cloud will be protected.

Final thoughts:


Cybercrime cost organizations $2.7 billion in 2018, and by the end of 2019 the numbers are projected to snowball. Cybercriminals are on the rise. What will you do to stop them? Have you done all you can to protect your organization from an attack?


Trustwire has unparalleled ease of use, meaning that your employees can quickly adjust to working with it. Furthermore, Trustwire is available on any device, anywhere in the world. Earn more about how your business can begin protecting its valuable intellectual property with Trustwire.






Friday, September 13, 2019

The Best Secure Cloud Storage and File-Sharing Service in 2019




In recent years, businesses and consumers have become increasingly more reliant on storing their sensitive files on cloud-based storage solutions. There's no need to waste precious space on your computer's harddrive anymore. Since the advent of the internet, secure file sharing has never been more comfortable. Companies like Trustwire make file storage and sharing a breeze. Anyone who works with sensitive data knows how crucial safe file sharing is. Trustwire is here to provide you with the most reliable file-sharing software of 2019.

Why Store Your Files in the Cloud with Trustwire?


Boost productivity by keeping your documents and media files in the could. It gives users the ability to share, sync, and manage files from anywhere around the globe. Have seamless access to all of your essential data at the touch of a button. The days of needing to be in the office or sitting at your work PC to view your files are long gone. Also, Trustwire has file restoration software, meaning if there's a disk-failure or you have data you want to have the peace of mind knowing you will never lose, they will forever be accessible from the cloud.

Will Your Sensitive Information be Protected?


For business owners, doctors, lawyers, and journalists, keeping your data safe and keeping your clients' individual information protected is the number one priority. Trustwire is a clear front-runner in secure file sharing and cybersecurity. We understand the importance of keeping information private to protect the integrity of your business or organization, that's why we take all measures necessary to guarantee your info will remain unscathed. Our advanced cybersecurity keeps all of your personal information, files, and messages safe from malicious attacks. 

End-to-End Encryption:


For the most secure file sharing users choose end-to-end- encryption. Don't understand how encryption works, or care to understand it for that matter? Our advanced encryption is made simple, so users won't feel overwhelmed when using our service. At Trustwire, we use end-to-end encryption, meaning only the sender and the recipient of the messages can read it. End-to-end encryption is the best way to communicate privately and securely online. Using Trustwire means you are the sole owner of your files, and your data can't be decrypted in the cloud. Only you and those you choose to share your files with will have access, no one else will be granted access, not even Trustwire administers. We also don't analyze your activity or messages, and we will never create profiles of our users to blast them with unwanted advertisements.

Why Choose Trustwire?

  • No download or installation
  • The safest way to share your files online
  • File restoration features
  • Extremely user-friendly
  • Affordable pricing
  • Free options available
  • Impressive UI and sharing options
  • Access your data from anywhere in the world
  • We provide all our customers with unparalleled customer support

Trustwire has unparalleled ease of use, meaning that your employees can quickly adjust to working with it. Furthermore, Trustwire is available on any device, anywhere in the world. Click here to earn more about how your business can begin protecting its valuable intellectual property with Trustwire.






Wednesday, June 26, 2019

Stick to These Best Practices for Client Security


Best Practices for Client Security

These days keeping your clients’ information confidential is absolutely paramount to remain credible in your industry.

A data breach that leaves your clients vulnerable is almost certain death for the responsible business. Maintain your credibility and protect your clients by following these best practices for security.

1. Keep Your Clients’ Data in One Location.

This means that you shouldn’t keep information about your clients on multiple platforms with varying levels of security.

Store contracts, files, payment info and records, etc., in one location that is protected with robust security. Access to this information should be multi-factor authenticated, password-protected, and cloud-based.

2. Give Access Only as Necessary.

Once client data is stored in one location, enable employees to access only what they need to. In other words, limiting the number of folks who can access files limits their exposure to potential threats.

This type of role-based security also protects employees from altering documents outside their purview.

3. Transition to Electronic Signatures.

Not only will e-signatures be easier to gather than paper ones, they’re more secure. In addition, gaining e-signatures is quicker. Why are they more secure? E-signatures have a digital trail including when and where they were signed.
Best Practices for Client Security

4. Forgo Email for Data Collection.

Email is the number one method hackers use to access corporate entities. Therefore, do not use email to collect contracts, signatures, or exchange sensitive documents. Use end-to-end encryption methods of securing client data needed for designing or finalizing contracts.

5. Maintain Rigorous Security Standards.

Security breaches are devastating to a business; therefore, best practices for client security are vital. Make sure any cloud-based storage systems are supported by the strongest possible security.

Furthermore, make sure that you know if your cloud storage and file transfer systems collect data of their own regarding your clients’ information. This is a potential privacy violation. Beyond that, file transfers need to be end-to-end encrypted with the strongest, open-sourced encryption technology.

Best Practices | Client Security

Trustwire champions the protection of its clients’ privacy and data integrity. This means that your organization can store, share, and communicate without worry.

Trustwire uses the strongest end-to-end encryption available.

Moreover, Trustwire never has access to your data, and never tracks usage, or sells your information. Look to Trustwire to solve your security needs.

Tuesday, June 25, 2019

Privacy Violations Crack Down: What Businesses Need to Know

Privacy Violations Crack Down


The digital age changed lives in so many great ways: we can make purchases in an instant, finalize important documents remotely, and communicate across continents. All of this advancement has come with some unwanted negatives: namely, the loss of true privacy.

For decades now, some corporations have based their profit structures on selling what they know about their consumers. Because the US lacks a comprehensive federal statute on personal data online, the FTC is scrambling to crack down on privacy violations. Here’s what you need to know.

Face the Music

Music.ly or TikTok is a social media platform popular with teens and children. The FTC filed a complaint recently due to what it considered as unauthorized distribution of the personal data of minors.

Under the Children’s Online Privacy Protection Act (COPPA), TikTok was required to obtain consent for such activity but did not.

To make matters worse, the popular social media platform continued to list identifying markers of children even when they set their profiles to private.
Privacy Violations Crack Down

While the company paid a whopping near-six-million-dollar settlement, they failed to fully comply with the regulations of COPPA.

This prompted the FTC to issue a statement saying that they would pursue large corporations who put the advancement of their business goals above the rights of private citizens.

Surely, this case is a cautionary tale for any organization that caters to consumers who are minors.

Facebook and Cambridge Analytica

Facebook has always been iffy when it comes to consideration for its users’ privacy.

However, alarm bells began ringing in 2018 when the news that Facebook had allowed user data to be used by Cambridge Analytica, a British consulting firm that uses personal data to help politicians and businesses “change audience behavior.”

The firm got access to more than 50 million users personal data. Here’s the kicker, Facebook says that it’s not responsible because it allows researchers to collect data about users.

And the organization claims it had nothing to do with a researcher turning over such data to an unauthorized entity (Cambridge Analytica).

Incidentally, Cambridge Analytica claims they deleted the data anyway, upon learning that it was harvested unethically.

Yet, in spite of users’ private data being exploited by others, Facebook was allowed to handle the mess as they saw fit.

The FTC says that they are investigating, so it looks like Facebook may soon face a privacy-violations crack down of its own. The EU is also investigation Facebook for potential violations of its General Data Protection Regulation (GDPR).

Crack Down on Privacy Violations

Issues with Facebook especially, but also with smaller corporations like TikTok, show the movement towards large scale legislation that makes companies responsible for maintaining the privacy of its users.

At the very least, and we’ve seen this with recent legislation passed in California, more and more state governments are seeking to maintain the integrity of consumers’ privacy online.

What This Means for Your Business

The Federal Trade Commission’s commitment to enforcing consumers’ privacy can only lead to a widescale enforcement of such rules. Better be the forerunner of change than the last to cross the finish line.

Start by protecting the integrity of the data you collect and retain on behalf of your clients. By showing them that you take their privacy seriously, you can build loyalty.

Take a look at how Trustwire can enable you to do so, without compromising your commitment to security.

Wednesday, June 19, 2019

Avoiding Privacy Violations: Why Not Acting Now is Risky Business


Ever on the cutting edge, California delves into the new frontier of data protection with its California Consumer Privacy Act (CCPA), effective January 1, 2020.

This piece of legislation seeks to protect the way information about consumers is used by businesses and other organizations.

More importantly, for businesses, avoiding privacy violations will be paramount if legal retribution and financial damage are to be avoided. 

What CCPA Means for Your Business

The government of California feels that businesses, who were previously required to take “reasonable” steps to safeguard consumer information, did so insufficiently. Now, businesses whose customers are residents of California must do the following:
  • Implement and maintain security systems & procedures
  • Protect consumers’ personal information from unauthorized disclosure.
  • Must not destroy, use, modify, access, or disclose consumers’ personal information without consent.
  • Protect consumers’ information from security breaches.

How to Protect Your Business

First, your business needs to consider how well its privacy procedures are actually working.

Businesses who invest in a privacy audit aren’t wasting money. Taking such action can expose areas where work is needed. Before you seek out a consultant, consider how your organizations stands in these five areas:

1. Do you document the consumer data you collect?

Firstly, under the CCPA, consumers can request to know what data has been collected about them, so you’d better be prepared to divulge. Secondly, any third-party involvement you have may also be collecting data on your behalf, and you need to be aware of such activity.

A procedure for informing consumers of this information needs to be in place and ready to go. In July 2020, consumers can rightfully demand to know.

2. Keep track of the “personal information” you collect about consumers.

The CCPA defines “personal information” as “Identifiers such as a real name, alias, postal address, unique personal identifier, online identifier, internet protocol address, email address, account name, social security number, driver’s license number, passport number or other similar identifiers” as well as, “a broad list of characteristics and behaviors, both personal and commercial, as well as inferences drawn from this information” (source).

So from the information your organization collects, you must be able to determine what of it is considered “personal.”

3. Be prepared to be responsible for data collected by third-parties.

The government of California intends to hold the owners of the business responsible for the data collected by third-parties.

This especially holds true for third-party tags, or the Java code generated by ad servers.

If your advertising agencies use such technology, then you need to know what data they are collecting, and how they are using it.

Crucial need-to-know information:

1. What third-party data collectors do you have?
2. What information are they collecting?
3. With whom are they sharing this information?


4. Generate an opt-out policy that is both easy to find and understand.

Having identified all of the previous data-collection information, you need to proceed with a strong opt-out policy. This policy needs to be conspicuous. Users must identify a link where they can expect to opt-out of having their information sold.

Keep in mind that the CCPA outlines what constitutes a proper opt-out policy. Definitely do your research to make sure that your business is compliant. Trying to shirk this requirement is unwise.

5. Protect minors’ rights to privacy by setting up a parental consent procedure.

Minors’ personal information cannot be sold unless they opt-in, and this process needs to be clearly outlined and compliant.

Data sharing cannot take place without the consent of the legal guardian. So, take the time to set in place compliant procedures to avoid fines and penalties.

Is Avoiding Privacy Violations Worth It?

Well, aside from preventing legal woes and fines, the bottom line is yes. California has long set legislative trends when it comes to the rights of individuals, heralding new standards for other governmental bodies to follow.

So, while you may not feel the pressure to comply with this standard now, chances are you will have to in the future.

Furthermore, the unauthorized sale of personal data or the promise to protect such data doesn’t sit well with most American consumers. Being forthcoming and sincere about protecting your customers’ personal data creates a sense of trust that pays off in the long run.

If you’re concerned about protecting your clients’ personal data, contact the security experts at Trustwire today.

Wednesday, June 12, 2019

Ensuring Privacy Online: The Individual’s Dilemma


Ensuring Privacy Online

In order for true online privacy, encryption is used to isolate users’ conversations and data from uninvolved parties. Simple enough, right? Now, when a crime is committed, and law enforcement needs to be involved, this privacy may need to be compromised in service of the law.

That also makes sense. Here’s the rub—customarily, law enforcement agencies have long lobbied for back doors to be built into encryption in the event they need to decrypt data in the course of a criminal investigation. While this doesn’t seem too troubling on the surface, deeper contemplation reveals how this weakens ensuring privacy online for everyone.

The Issue with Backdoors

Firstly, let’s look at what a backdoor is in terms of encryption. This is a purposefully designed weakness in an encryption system. In the event that encrypted data needs to be accessed by law enforcement, the backdoor can be used.

Now the issue with backdoors is pretty simple: they create weaknesses. For this reason, the truly secure-minded online users open-sourced encryption. This is encryption that has no deliberate points of weakness.


Secondly, if government organizations can gain access to your encrypted data, it stands to reason that hackers and other malicious actors can too.

After all, a backdoor isn’t a weakness that only those with good intentions can use. So, that leaves a problem with no acceptable solution, or does it?

A New Solution

The UK’s surveillance agency created what it thinks is a novel solution. Before communications are encrypted, allow the government access to all communications, then apply encryption.

This makes the information both safe from hackers (because strong encryption can be used) and available to government agencies if necessary. Now, while this seems like a perfect solution on paper, it really isn’t.

In the first place, it assumes that government agencies and their employees will always act legally and ethically. No government can provide its citizens this promise with complete assurance.


Furthermore, this strategy won’t work for all encrypted technology, including: email, hard drives, or apps. The inability to apply this in a widescale manner would defeat its purpose in general, necessitating the argument for backdoors yet again.

Ensuring Privacy Online
Finally, many companies are unwilling to consent to such a violation of its users’ privacy. Certainly, we would never grant the government access to our users’ data.

The issue boils down to how much privacy does an individual deserve—and most individual users consider their privacy a fundamental human right.

Ensuring Privacy Online

Reducing the privacy of individuals online in the service of aiding the government doesn’t seem worth it.

Especially when you consider that governmental surveillance hasn’t made any of us that much safer. Ensuring privacy online is the cornerstone of Trustwire’s values. Choose Trustwire because we take your security seriously.

Monday, June 3, 2019

Email Security: Best Practices for Your Organization


From Microsoft to the Democratic National Committee, email security seems to be tenuous, at best. Not only are large-scale organizations vulnerable, but personal email accounts as well.

John Podesta fell prey to a phishing scam in his email, and Colin Powell’s personal opinions became public knowledge after his email was hacked and leaked. 

With email so seemingly open to attack, many wonder what are the best practices for email security for their organizations and personal lives.

Email Is a Target

Many do not consider email as the primary target of hackers looking to access information. Email is the point of entry for something bigger: bank accounts, servers, etc. However, data contained within emails frequently are the target of hackers. 

Think about this: how often does your organization use email to plan or record strategy, culture, and actions? Now, imagine handing this information over to a hacker? 

You wouldn’t do that, yet email susceptible to hacking makes that a very real possibility.

Why Secure Email?

Because email is such a common form of workplace communication, organizations must secure it if they want to secure their data. 

With BYOD becoming more commonplace, and the added issue of IoT, organizations are at a loss to find a simple solution to all their digital security problems.

So, while an organization-owned computer may be secure, an employee’s personal computer may not be. Given how work seems to take place both in and out of the office, secure methods of transferring sensitive files and communications need to be found. 

Historically, the complex nature of email security has muddied the water when it comes to best practices.

Email Security | Best Practices

Strong Security

Email has its advantages for file transfer: it’s portable, easy to use, and ubiquitous. 

Unfortunately, solutions to secure it tend to fail for two reasons: either they’re too difficult to implement or they’re not actually secure. 

Trustwire offers the robust security of AES 256-bit and RSA 4096-bit encryption. We also don’t have the access to or the ability to decrypt the files you send and/or store.

Easy to Use

We wanted to create something that is extremely secure but also easy to use. Our web-based portal keeps things easy. 

Simply create an account, login, and begin sharing files securely. Clients and colleagues do not have to download any apps or programs to access the files.

Use your email, but when the transfer of sensitive or confidential data is required, look to Trustwire.

The Best Secure Dropbox Alternative


It’s become common practice, when we sign up for something, to quickly click that “I agree to the Terms of Service” box.

No doubt the millions of Dropbox users have clicked that little box without thinking of the consequences.

By doing this, you and your organization have agreed to allow Dropbox to access your files, scan, and share them with third parties at their discretion. 

Hardly seems secure, right? Luckily there is a secure Dropbox alternative.

Why Dropbox Can Be Problematic


In its Terms of Service, Dropbox clearly states that:

  • They collect data on how you use their service.
  • They collect your IP addresses, browser and device information, and the webpage you visit before accessing Dropbox
  • And they collect personal data for their “legitimate business needs.”
It’s important to note that Dropbox promises not to sell your data to any third parties. However, its collection suggests that it could be targeted by malicious actors. 

Meaning, if all this valuable information about your usage history and business is stored somewhere, it can become a target for enterprising hackers. 

Clearly there is a need for a secure alternative to Dropbox.

Why Do I Need Secure File Sharing/Storage?


Secure file storage and sharing is important for businesses and individuals. Businesses need to protect customer or client confidentiality and trade secrets and innovations. 

Individuals need to preserve confidential documents online, such as tax returns, pay stubs, health records, and identity records. None of this needs to be vulnerable to malicious people or software.

What to Look for in a Secure Dropbox Alternative


Trustwire provides the ease of use and accessibility of Dropbox but also provides the powerful security you and your organization deserve. 

Let’s take a look at what we offer:

Free
  • 2 GB secure storage space for your files
  • Exchange up to 100 files per month with other Trustwire users
  • True end-to-end encrypted for file exchange and storage
  • Strong AES 256-bit and RSA 4096-bit encryption
  • Incredibly simple-to-use interface
  • Advanced search to find your files quickly
  • Manage your contacts
  • Upload personal files to your account for backup and safekeeping
  • Use tags to easily categorize and identify files
  • Invite unlimited friends and family to join Trustwire and starting exchanging files and messages securely
Business
  • Everything in offered in Basic
  • 2 TB secure storage space for all your files
  • Unlimited file exchange per month
  • Trustwire SecureLink lets you to receive files from anyone securely with same level of encryption, even if the sender is not a Trustwire user
  • Branded site with your logo
  • Unlimited email support with guaranteed 24-hours response time
Sign up today to explore how you can securely transfer and store files with Trustwire!

Is Dropbox Really Secure for Your Business?


When it comes to sharing photos from the big family reunion, Dropbox is great. Most people use it at home, so it makes sense that this translates to work. 

In fact, Dropbox Business has more than 300,000 subscribers. Unfortunately, when you look at how their digital security functions, Dropbox appears to be an inadequate solution for secure file transfer. 

In this post, we explore why.

Data Encryption Insufficient


Dropbox stores your confidential files alongside other users’ data. This means your company’s files on new products and financial reports are in the cloud right next to Grandma’s apple pie recipe. 

Business files need to be properly isolated. In the event of a security breach, your data may not be safe.

No Granular Permission Options


In order to facilitate collaboration from employees at multiple locations, files are often uploaded for editing. 

Currently, there are no options to set permissions for certain groups of users, which is another way in which Dropbox is not secure for business. So, your junior employees will be granted access to the same files as C-level executives. 

This doesn’t mean the files under the purview of your junior employees don’t need to be secure, but the lack of granular permissions can be an issue.

No Passwords for Subfolders


Because Dropbox won’t allow you to password protect subfolders, your business may have to restructure its folders. At best, this is a waste of precious time. 

At worst, some employees will be granted access to information they shouldn’t be privy to. Another way in which Dropbox doesn’t meet the needs of businesses.

No Option for Password-Protected Links


Currently Dropbox doesn’t allow you to share a link to a password-protected link. Furthermore, you cannot add password to a file already uploaded to Dropbox. 

Basically, once it’s uploaded, everyone who has access to the Dropbox account can access the file.

No Involvement from Your IT Department


Another reason Dropbox isn’t secure for business is that your IT department doesn’t have access to an audit log—so they cannot know who has accessed your files. Your IT department cannot wipe a device that has been lost or stolen. 

Additionally, IT staff cannot alter who can sync with particular files. This takes a lot of control away from the professionals you employ to monitor your technology.


You Can’t Lock Editing on Files


During the collaboration process, when you come to a stopping point, you need to lock editing. 

If you don’t do that you can waste a lot of time sorting through different versions, trying to find the final product. 

When the final edits have occurred, you need to halt the process, and you can’t do that with Dropbox.

So, Is Dropbox Secure for Business?


Dropbox is a great app for people to use in their personal lives, but it just doesn’t meet our standards for secure file transfers. 

As we discussed, you can see several areas where Dropbox may leave you wanting. 

If your business is looking for a simple, secure file transfer method, go to Trustwire now and sign up today.

3 Secure Communications Tips for Journalists



In a contentious political climate, it becomes increasingly more important for journalists to secure their online communications.

Sources often provide valuable information, and if they are exposed as sources can face personal or career backlash.

In some cases, as with former Senate aide James Wolfe, the source can face criminal charges. Here are three secure communications tips to help journalists.

Tip 1 – Eliminate Metadata of Photos and Documents


First, sending and receiving files securely is the best secure communication tip for journalists. Then, before journalists use documents and photos sent by sources, these files need to have their metadata removed.

A few great tools for this include: Exiftool for documents and mogrify for photos.

Keep in mind that any tracking pixels from Data Leak Protection software needs to be removed in addition to removing the metadata. For PDF files, which are notorious for phishing scams, we recommend PDF-redact-tools.

Tip 2 – Reduce Instant Messaging Issues


While encrypted instant messaging apps may seem secure, they also leave a trail of metadata. So, while the content of the messages may be encrypted, communications between journalists and sources can still be evident.

Messages can be exchanged along with files via web-based Trustwire.

Tip 3 – Document Exchange Security


First, journalists should receive sensitive documents on a secure file sharing platform, such as Trustwire.

This ensures that documents cannot be accessed at any point in transit, nor can they be accessed from storage on Trustwire.

Furthermore, encryption is rock solid, and the platform can be accessed from anywhere. Trustwire does not track usage, IP addresses, or location info, and doesn’t have access to its users’ files or data.

Other options for secure document transfer exist, but sources may not be willing or able to use the technology, rendering it useless.

Then, the file needs to have its metadata scrubbed as well. Use exiftool <filename> on each document. This may involve converting a Word file to a PDF and then using the pdf-redact-tools to be absolutely sure of sanitation.

Secure Communications Tips for Journalists Takeaways


Journalists have an obligation to protect their sources from unwarranted backlash. Beyond that, these secure communications tips can enable journalists to demonstrate a record of integrity.

Removing metadata from images and files can protect sources. More importantly, providing sources with a secure means of transferring sensitive files and exchanging messages is crucial to maintaining privacy.

Trustwire simplifies the former by allowing you to exchange and store files from sources in a secure location.

We provide powerful encryption technology with none of the hassle. Simply sign up for Trustwire and begin sharing files securely.

Trustwire allows you to use end-to-end encryption to send files, and you can send secure messages along with your file. Trustwire will never access your documents or analyze your data for any purpose at all.

Take the guess work out of file sharing, and sign up with Trustwire today.

The Best Ways to Share Files Securely

In our fast-paced, electronic-device driven world, in-person document delivery rarely occurs. In business situations, we collaborate and ...