Data breaches and cyber-attacks are becoming more and more common, so it’s essential that security measures are put in place to protect our data. One of these measures is using end-to-end encryption products, such as Cyph - a simple and secure encryption app that is extremely easy to use. Capable of securing photos, health data, video calls, cryptocurrency and file transfers, the app provides protection from a multitude of cryptographic attacks. Here we discuss some of its features and benefits: End-to-end encryption End-to-end encryption is a secure communication method that prevents any third parties from accessing...

Why 1Password is a great choice as a Password Manager
Cybercrime is on the rise and one of the main reasons for this is that users are not thinking about security enough. Usernames are fairly easy to discover, with most being related to names/email addresses which can be found with just a simple Google search. So, when combined with a commonly used password, hackers will gain access to private, ‘secure’, files easily. In 2019, the most commonly used password was 123456. This was used by 23.2 million people who had their accounts hacked. The next most popular password was 123456789, which was used by more than 7.7 million hacked...

How to Securely Erase your Computer’s Hard drive
The hard drive or solid state drive of your computer holds a lot of sensitive information. This includes your account passwords, personal details, financial records and personal files and photos that no one but you should see. When you want to sell or dispose of your old computer, you need to wipe out all the sensitive data. This will protect you from identity theft. Simply deleting files and folders and emptying your recycle bin or formatting your computer does not wipe out all the data, however. You may no longer be able to access the deleted data, but...

The Deep Dark Web
The Deep Dark Web It’s very easy to make the comparison between the internet and the ocean: both are expansive bodies, ever evolving and changing. To take the analogy further, right now you are floating out on the very surface in the warm, safe waters. But there are things that lie beneath what you can access on your phone or your laptop, in the part of the internet known as the ‘deep web’ The name ‘deep web’ sounds ominous but, in fact, the term simply refers to sites and pages that cannot be accessed by traditional browsers. Like...