Over 4.2 Billion Records Were Exposed in 2016
The number of reported data breaches exceeded 4,000 and 53.3% of them were the result of hacking.
Multiple mechanisms work together to ensure that you are the only one having access to your sensitive information.
Your data is end-to-end encrypted by design – even Cyclonis staff and servers don’t have access to it.
The same encryption algorithm used by governments, financial institutions, and in military applications.
Your vault is designed so that your personal information can only be accessed with your personal master password.
Our Password Generator is designed to help you strengthen your passwords. The built-in generation algorithm can generate more complex passwords.
This feature is designed to further increase the strength of your vault.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
You might think that stealing people's money over the internet isn't that hard. You just compromise some credit card details or some online banking credentials, and you're ready to go. The thing is, it's a bit more...Read more
Far too often, when an online service provider loses your data, you have no hope of receiving any sort of compensation for the damage that's been done to you. In most cases, this sort of thing happens to small...Read more
Do you still submit your tax return forms on paper? If you are up with the times, it is most likely that you have already shifted to doing that online. If that is the case, you must have created an IRS (Internal...Read more
Some people have problems getting their heads around how much damage a cybercrime operation can do. ZDNet's Catalin Cimpanu and SecurityDiscovery.com's Bob Diachenko spent some time looking closely into an...Read more
As cyber-security threats become more and more prevalent, the option for users to use two-factor authentication is becoming more and more necessary. Firefox’s login system allows for syncing bookmarks, passwords, and...Read more
Have you noticed that hotspots seem to be faster than your home Wi-Fi? That's not how it's supposed to work. There are a bunch of reasons why your internet could be slowed down, whether it's wired, wireless, or...Read more
It seems that cybercrime is everywhere these days, but many of us foolishly continue to believe that cybercriminal activity will not affect us. Well, if you live in Canada, there is a very good chance that you have...Read more
Some data leaks are bigger and more impactful than others. But how do we classify them exactly? When can a data security incident be considered a massive problem and when is it not that big of a deal? The sense of...Read more
Many products are put on the market with the idea of improving people's security, and it's always sad to see when one of them has the exact opposite effect. Unfortunately, this isn't such a rare phenomenon. Recently,...Read more
At first glance, Pinterest seems to be one of the safer places on the Internet. It's a place of collaboration and sharing visuals, with everyone who wants to partake in both of those activities having an opportunity...Read more
There are at least a couple of good reasons why you might need to reset your smartphone back to its factory state. For one, although they are nowhere near as expensive as they used to be, smartphones are still...Read more