Over 4.2 Billion Records Were Exposed in 2016
The number of reported data breaches exceeded 4,000 and 53.3% of them were the result of hacking.
Multiple mechanisms work together to ensure that you are the only one having access to your sensitive information.
Your data is end-to-end encrypted by design – even Cyclonis staff and servers don’t have access to it.
The same encryption algorithm used by governments, financial institutions, and in military applications.
Your vault is designed so that your personal information can only be accessed with your personal master password.
Our Password Generator is designed to help you strengthen your passwords. The built-in generation algorithm can generate more complex passwords.
This feature is designed to further increase the strength of your vault.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
What is FileVault? FileVault is Apple's disk encryption app first added in Mac OS X 10.3 and all newer version. It executes immediate encryption with volumes on Macs. The original FileVault was introduced with Mac OS...Read more
On Monday, the Internet Crime and Complain Center (IC3) issued a warning which is supposed to make you more vigilant and help you avoid falling victim to a phishing attack. It says that the decision on whether or not...Read more
You've heard how important it is to be careful with the browser extensions you install, and you know what sort of criteria you need to consider before you decide whether or not a particular addon should be allowed...Read more
System Image Backup is a rather useful Windows tool that allows users to back up a snapshot of their device for later use. The feature creates a copy of everything that the user had stored on their hard drive - from...Read more
Google Chrome, the favorite browser of about 67% of the internet's population, has a new version. Last week, Google announced the availability of Chrome 75 for Windows, Mac, and Linux, and it's currently being rolled...Read more
These days, it is not a matter of whether you have any kind of account online. It's the question of how MANY accounts you have. The more accounts you have, the more bothersome the sign-on processes become because you...Read more
What’s your preferred social networking app when it comes to communicating with your friends and family? If it’s WhatsApp, there are a few privacy concerns. Of course, most apps have a tainted reputation, and we could...Read more
Just about everyone uses the PDF file format. The PDF format is very useful and thus very wide-spread among users and businesses. With the PDF format, you can freely send and receive information, your content, and you...Read more
We recently touched upon the problem of vulnerability management and patching. The fact of the matter is, a very large portion of users and organizations that rely heavily on computers are completely unaware of how...Read more
Those of you who have been interested in the online threat landscape for the last few years probably know what Microsoft's Remote Desktop Protocol (or RDP) is. You've seen it being used in more than a few large-scale...Read more
Nowadays hackers have various methods to steal our sensitive or private information, and so there are lots of safety measures to consider if you want your data to be secured. Users are often recommended to watch out...Read more
How do you deal with security vulnerabilities? Well, for individual users, things shouldn't be too hard. In fact, more often than not, all they need to do is enabled the automatic updates for their software...Read more