Over 4.2 Billion Records Were Exposed in 2016
The number of reported data breaches exceeded 4,000 and 53.3% of them were the result of hacking.
Multiple mechanisms work together to ensure that you are the only one having access to your sensitive information.
Your data is end-to-end encrypted by design – even Cyclonis staff and servers don’t have access to it.
The same encryption algorithm used by governments, financial institutions, and in military applications.
Your vault is designed so that your personal information can only be accessed with your personal master password.
Our Password Generator is designed to help you strengthen your passwords. The built-in generation algorithm can generate more complex passwords.
This feature is designed to further increase the strength of your vault.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
There are a few different variants of the so-called 'sextortion' scam, and it's safe to say that some are more disgusting than others. We should note that the one we're about to describe isn't the worst of its kind...Read more
Contactless payment has become a common sight. It's an easy and hassle-free way to pay for goods, but is it as safe as they say? How can we make sure our credit and debit cards won't get hacked and our funds drained...Read more
If you are trying to use the Cyclonis Password manager on Chrome browser, and something doesn't work, the chances are that your browser is simply not compatible with the latest version of the password manager....Read more
It is very likely that you encounter MFA (multi-factor authentication) every single day, but you are not aware of it because it has molded seamlessly into our daily lives. The concept sure does have a fancy name, but...Read more
Any company that manages personal data needs to comply with multiple regulations to keep the personal data safe. There are quite a few ways to secure sensitive personal information. Currently, the most common method...Read more
No doubt those who have seen Perfect Strangers by Paolo Genovese realize how sensitive the information accessible through our mobiles, computers, social media accounts, etc. is, however, unlike in the film, there are...Read more
There are multiple ways to secure your social media account although regular users probably seldom think about their security when they log into their accounts. For them, it is more about sharing the experience and...Read more
On May 12, 2017, an unprecedented ransomware outbreak infected thousands of computers all around the world and wreaked havoc of unseen proportions. The infamous WannaCry strain hit both regular users and large...Read more
A couple of weeks ago the Wall Street Journal revealed that Google has a 'dirty secret.' The report explained how some third-party applications, as well as their developers, can read the emails in users' Gmail...Read more
The importance of a password generator for a regular user is growing every single day. Every one of us has multiple accounts in various services, and all of those accounts need to be protected. If those accounts...Read more
We recently conducted a survey during which we asked 275 Americans to tell us how they treat their passwords. Among other things, we learned that for most people, passwords are a nuisance. This shouldn't really be a...Read more
You may have heard of two-factor authentication (2FA). It's a fantastic secondary layer of security that prevents unwanted guests who know your password from accessing your accounts from an unverified device by giving...Read more