How Cyclonis Password Manager Keeps Your Data Encrypted in Your Vault

Multiple mechanisms work together to ensure that you are the only one having access to your sensitive information.

Your data is end-to-end encrypted by design – even Cyclonis staff and servers don’t have access to it.

Encrypted with 256-Bit AES

The same encryption algorithm used by governments, financial institutions, and in military applications.

One Master Password

Your vault is designed so that your personal information can only be accessed with your personal master password.

Generates Complex Passwords

Our Password Generator is designed to help you strengthen your passwords. The built-in generation algorithm can generate more complex passwords.

Two-Factor Authentication

This feature is designed to further increase the strength of your vault.

See How It Works

Latest Posts

Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.

A Data Breach at Desjardins Exposes the Personal Information of 2.9 Million of Its Members screenshot

A Data Breach at Desjardins Exposes the Personal Information of 2.9 Million of Its Members

In the aftermath of a data breach, the affected organizations usually issue official statements which are supposed to give people more information on what has happened. The wording does tend to get a bit fuzzy when...

Read more
June 21, 2019
How the Outdated MD5 Can Put Your Passwords at Risk screenshot

How the Outdated MD5 Can Put Your Passwords at Risk

5F4DCC3B5AA765D61D8327DEB882CF99 – for the vast majority of you, this probably looks like a random string of letters and digits. For cybercriminals going after people's personal data, however, this particular mess of...

Read more
June 21, 2019
How to Spot a Fraudulent Social Security Phone Call screenshot

How to Spot a Fraudulent Social Security Phone Call

In the past, we've warned you of scammers who are trying to steal your Social Security number (SSN). When that happens your SSN could be suspended. Sometimes, the scammers will need you to confirm your number to...

Read more
June 21, 2019
How to Recognize and Prevent Common LinkedIn Phishing Emails screenshot

How to Recognize and Prevent Common LinkedIn Phishing Emails

Recently, we've been getting news of new LinkedIn-related phishing attacks. According to the news, the hackers use an array of assorted schemes in order to pressure their targets into visiting web pages laced with...

Read more
June 20, 2019
Instagram Accounts Can Be Hacked Using a Vicious Ray-Ban Scam screenshot

Instagram Accounts Can Be Hacked Using a Vicious Ray-Ban Scam

Have you seen advertisements posted on Instagram that offers designer sunglasses for practically nothing? Remember that if something sounds too good to be true, it is most likely a scam. The offers we are discussing...

Read more
June 19, 2019
How to Find and Delete Your Old Yahoo! Email Account screenshot

How to Find and Delete Your Old Yahoo! Email Account

If you've been using the Internet for a while, and in this day – who hasn't, chances are that you probably have more than one email account set up in your name. Accounts are made as and when they are needed, and it is...

Read more
June 19, 2019
How to Stop Firefox from Asking for My Master Password screenshot

How to Stop Firefox from Asking for My Master Password

Recently we covered the problem of Mozilla Thunderbird constantly asking you for your password and today we're going to look at a similar problem with Firefox. Mozilla Firefox is a free and open-source web...

Read more
June 19, 2019
What Is a Hacking Tool and How Does It Work? screenshot

What Is a Hacking Tool and How Does It Work?

What comes to mind when you hear the words “hacking tool?” You probably think about sinister computer infection schemes, where cybercriminals barge into vulnerable systems to steal important information. That idea is...

Read more
June 19, 2019
Security Experts Warn About the Increasing Number of Office 365 Phishing Emails screenshot

Security Experts Warn About the Increasing Number of Office 365 Phishing Emails

How many emails do you send out every day? How many do you receive? These numbers vary from person to person, depending on their position, their social life online, their hobbies, and even their attitude towards...

Read more
June 19, 2019
Beware of the Houdini Trojan, or You Might Lose Control over Your Online Banking screenshot

Beware of the Houdini Trojan, or You Might Lose Control over Your Online Banking

For as little as $50 per month, wannabe cybercriminals can go on a popular hacking forum and rent what has been advertised as WSH Remote Access Tool (RAT). As we'll find out in a moment, at least some of them seem to...

Read more
June 18, 2019
What to Do If Mozilla Thunderbird Keeps Asking for a Password screenshot

What to Do If Mozilla Thunderbird Keeps Asking for a Password

As I'm sure some of you know, Mozilla Thunderbird is a free and open-source cross-platform email and news service, RSS feed, and chat client. It was developed by the Mozilla Foundation, naturally. The Thunderbird...

Read more
June 18, 2019
How to Use FileVault Without a Secure Token screenshot

How to Use FileVault Without a Secure Token

What is FileVault? FileVault is Apple's disk encryption app first added in Mac OS X 10.3 and all newer version. It executes immediate encryption with volumes on Macs. The original FileVault was introduced with Mac OS...

Read more
June 14, 2019

View More