Over 4.2 Billion Records Were Exposed in 2016
The number of reported data breaches exceeded 4,000 and 53.3% of them were the result of hacking.
Multiple mechanisms work together to ensure that you are the only one having access to your sensitive information.
Your data is end-to-end encrypted by design – even Cyclonis staff and servers don’t have access to it.
The same encryption algorithm used by governments, financial institutions, and in military applications.
Your vault is designed so that your personal information can only be accessed with your personal master password.
Our Password Generator is designed to help you strengthen your passwords. The built-in generation algorithm can generate more complex passwords.
This feature is designed to further increase the strength of your vault.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
Laboratory Corporation of America Holdings or LabCorp has 60 thousand employees worldwide, helps with clinical trials in close to 100 countries, and processes around 2.5 million lab tests every week. This means that...Read more
No matter what your Small or Medium Sized Business (SMB) does, there is probably at least one task that is done online. There is at least some data that needs to travel from one computer to another, thanks to the...Read more
Like everything else in this world, backing up data to an external hard drive has both pros and cons. There is an initial investment, but once you've bought the device, you don't need to worry about a monthly...Read more
You must have heard people around you talking about Google Drive, Google's cloud storage service, or you are one of 800 million users who store their passwords, photos, videos, documents, and other important files on...Read more
According to a cybersecurity company, Protenus, there were 477 healthcare information breaches reported to the United States Department of Health and Human Services in 2017. It appears to be the attempts to steal...Read more
There are a few different variants of the so-called 'sextortion' scam, and it's safe to say that some are more disgusting than others. We should note that the one we're about to describe isn't the worst of its kind...Read more
Contactless payment has become a common sight. It's an easy and hassle-free way to pay for goods, but is it as safe as they say? How can we make sure our credit and debit cards won't get hacked and our funds drained...Read more
If you are trying to use the Cyclonis Password manager on Chrome browser, and something doesn't work, the chances are that your browser is simply not compatible with the latest version of the password manager....Read more
It is very likely that you encounter MFA (multi-factor authentication) every single day, but you are not aware of it because it has molded seamlessly into our daily lives. The concept sure does have a fancy name, but...Read more
Any company that manages personal data needs to comply with multiple regulations to keep the personal data safe. There are quite a few ways to secure sensitive personal information. Currently, the most common method...Read more
No doubt those who have seen Perfect Strangers by Paolo Genovese realize how sensitive the information accessible through our mobiles, computers, social media accounts, etc. is, however, unlike in the film, there are...Read more
There are multiple ways to secure your social media account although regular users probably seldom think about their security when they log into their accounts. For them, it is more about sharing the experience and...Read more