![7 tips for storing confidential data](https://webcf.waybackmachine.org/web/20220521063734/https://media.kasperskydaily.com/wp-content/uploads/sites/86/2021/08/12132531/7-tips-on-storing-sensitive-data-featured-700x460.jpg)
7 tips for storing confidential data
Loss or leaks of sensitive information can be serious problems for small businesses. Here’s how to keep confidential data safe.
66 articles
Loss or leaks of sensitive information can be serious problems for small businesses. Here’s how to keep confidential data safe.
We explain why secret chats in Telegram are a must, and how to configure security and privacy.
We explain for laypeople what end-to-end encryption is and how it enables private, secure communication for us all.
On this episode of the podcast, Dave and Jeff talk about the recent Garmin hack, four years of No More Ransom, and encryption under fire in US.
We explore how encryption protects your data and why quantum computers might shake things up.
Zoom developers have made their service more secure. We review what’s changed.
Dave and Jeff discuss MI5 pushing for weak encryption, the EU commission telling employees to use Signal, smart pet feeders going offline, and more.
Researcher Fabian Ising, speaking at the Chaos Communication Congress, showed the limits of PDF encryption’s strength.
According to recent news, quantum supremacy is reached. What should we do about it?
Is there Internet on the ISS, what is it like, and how long does it take to get a message from Mars — learn about the networks of today and the future.
Dave and Jeff discuss a number of issues ranging from backdooring encrypted chats to POS malware and more.
Facebook suing developers from Ukraine, Apex Legends’ battle against cheaters, Facebook’s double-edged sword on privacy, and more.
In this episode, Dave and Jeff plus some special guests talk travel and keeping your data safe.
This new version of SynAck ransomware uses sophisticated evasion techniques.
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
How can we get prepared for the decryption capabilities of upcoming quantum computers?
We explain what digital certificates are, what types exist, and what problems are associated with them.
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.