Over 4.2 Billion Records Were Exposed in 2016
The number of reported data breaches exceeded 4,000 and 53.3% of them were the result of hacking.
Multiple mechanisms work together to ensure that you are the only one having access to your sensitive information.
Your data is end-to-end encrypted by design – even Cyclonis staff and servers don’t have access to it.
The same encryption algorithm used by governments, financial institutions, and in military applications.
Your vault is designed so that your personal information can only be accessed with your personal master password.
Our Password Generator is designed to help you strengthen your passwords. The built-in generation algorithm can generate more complex passwords.
This feature is designed to further increase the strength of your vault.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
Most office workers will tell you that proper management of a company's digital assets is one of the major problems system administrators face. In theory, a reliable Identity and Access Management (IAM) system is the...Read more
What is Qudos Bank? Qudos Bank is an Australian mutual bank, which provides an assortment of commercial enterprises and financial services such as home loans, private loans, car loans, credit and debit cards, savings,...Read more
What are the similarities between the computer you're using to read this article and the IP camera that you've set up for security reasons? There are more than a few, actually. Both devices are connected to the...Read more
As you well know your computer and your mobile devices can automatically log into your Wi-Fi network because they remember the password. However, any time you wish to connect a new device you will have to manually...Read more
Over the years, Skype has proven to be one of the most effective communication platforms on the Internet. Launched more than 15 years ago, back in 2003, it has registered steady growth ever since it took off, and has...Read more
Last Friday, Outlook users started receiving breach notification emails from Microsoft which, in addition to telling them that an unknown attacker has accessed some of the information in their inbox, informed them...Read more
Movies and, to a certain extent, mainstream media would have us believe that organizing a cyberattack involves a lot of planning, plenty of resources, and a teenage computer geek who's in a bad mood all the time. This...Read more
Why are social networks so successful? Well, in short, they are thriving because people spend quite a lot of time using them. And people do this because they're interested in what the rest of the world thinks about...Read more
If you're told that you've ended up on Instagram's 'Nasty List', you'll likely want to know what the reason for this is. A 'Nasty List' sounds like a list of accounts that have done something wrong, so, especially if...Read more
Like everyone out there I'm sure you have important videos on your PC or Mac that you don't wish anyone else to see. In that case, it's completely logical to put a password on your sensitive videos just in case...Read more
You could argue that Google is the classic Silicon Valley success story. What started off as a useful search engine is now a commanding part of almost everything we do online. Over the years, Google released apps and...Read more
Google's security people reckon that they know a thing or two about Two-Factor Authentication (2FA) or 2-Step Verification, as they like to call it. They think that the most secure 2FA systems are the ones based on a...Read more