Over 4.2 Billion Records Were Exposed in 2016
The number of reported data breaches exceeded 4,000 and 53.3% of them were the result of hacking.
Multiple mechanisms work together to ensure that you are the only one having access to your sensitive information.
Your data is end-to-end encrypted by design – even Cyclonis staff and servers don’t have access to it.
The same encryption algorithm used by governments, financial institutions, and in military applications.
Your vault is designed so that your personal information can only be accessed with your personal master password.
Our Password Generator is designed to help you strengthen your passwords. The built-in generation algorithm can generate more complex passwords.
This feature is designed to further increase the strength of your vault.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
Nowadays, pretty much everyone's on their toes when it comes to real life (IRL) fraudsters. Charlatan tricks, pyramid schemes, television hoaxes, unsolicited and phony services and subscriptions have harmed so many...Read more
People just aren't prepared to face all the online risks they're presented with every day. Don't believe us? Here's an argument. Think about the tools that are supposed to estimate the security of a password or an...Read more
You may have heard about all the hacks and leaks that have happened in the last few years. Many of these include private and government institutions, but it doesn't stop there. Many of these hacks include hospitals,...Read more
Creating software that's easy to use and understand is a fine art, and vendors spend a whole lot of time, money, and effort trying to perfect it. Despite this, it sometimes looks like they haven't bothered at all....Read more
If you've done some research on the subject, you've probably heard security experts describing two-factor authentication (or 2-step verification) as a system that relies on something you know and something you have....Read more
What is Scottrade? Scottrade used to be a discount brokerage company, which operated both in physical branches and online. Scottrade was bought by TD Ameritrade and Toronto-Dominion Bank last year. The firm gained...Read more
Most of you probably know what a secret question is. In essence, it acts as a backup authentication system in case you forget your password. The idea is, upon account registration, you tell the website what your...Read more
A wise person once said that passwords should be like underwear. You shouldn't leave them exposed, you should change them frequently, and last but not least, you should never share them with anybody. Most of you...Read more
A few years ago nobody would have cared if you had lost your Bitcoin wallet's password, probably not even you. After all, there was a time when bitcoins were worth pennies practically. I personally know a man who...Read more
Why is cybersecurity in such a poor state? Companies spend large amounts of money in an attempt to ensure that their systems are as impenetrable as possible. Security experts also invest time and resources into...Read more
So, you locked your PDF with a password to keep it safe from prying eyes but you forgot the password? Don't worry. It's actually pretty common, and there are ways to get around that. These days PDF is one of the most...Read more
'There was a data breach at an online discussion board I was using. The hackers took my password, and because I was using it for the rest of my online accounts, they broke into all of them and made off with a ton of...Read more