Heartbleed Bug - Operating System fixes available for Cryptshare

Learn how to eliminate the Heartbleed Bug on your Cryptshare system.

Read more

Update: Heartbleed Bug - Operating System update planned for Cryptshare Virtual and Hardware Appliances.

Cryptshare is planning an Operating System update for all Cryptshare Appliances and Virtual Appliances. Get an overview about the Heartbleed Bug and the impact on your Cryptshare System.

Read more

Update: Heartbleed Bug does not affect Cryptshare 3.

Cryptshare 3 systems not affected. Update planned for Cryptshare 2.

Read more

Important Notice: OpenSSL "Heartbleed Bug" vulnerability

A serious security issue referred to as "Hearbleed Bug" has become public recently. Systems using OpenSSL encryption are affected.

Read more

Microsoft lures business files into the cloud

The MS SharePoint Conference 2014 reveals a strategy that increasingly drags corporate data into US-based cloud storages.

Read more

E-mail providers force SSL encryption

A number of e-mail providers demand their users to use SSL connections for sending and receiving message. How big is the gain in terms of security?

Read more

Head of Microsoft Germany demands a 'New Deal' to re-establish trust into IT Security.

Christian P. Illek demands everybody taking part in electronic communication to take action.

Read more

German economy wants to invest more in IT security

Rise of IT security awareness in German Economy.

Read more

U.S. monitoring of data and information creates a stir


In recent days, a wave of indignation was triggered when the Washington Post published information suggesting that U.S. authorities such as the NSA have access to data from large Internet service providers and cloud services under the program called "PRISM".

Even if the affected companies deny that such access to data has occurred doubts remain. Ultimately nobody knows whether his data is copied or read and how the information will be used. Ideally, of course "only" to ward off crimes as terrorist acts. But how far may the analysis of the data go to identify potentially criminal activities in advance?

Another spin on this is the stance of the Chinese Government who appear to sponsor the theft of data wherever it may be found to advance their trade position and improve their competitive position in the world.  There is a deep conflict of philosophy here but for an organisation with private data the challenge is the same.

“This story highlights a real dilemma for business today” states Matthias Kess, Technical Director of email encryption and secure file transfer solutions vendor Cryptshare, he goes on “Whilst there is considerable appeal to some aspects of shared services and the benefits of scale that Cloud vendors offer these are offset for many by the rational desire to keep their data in a place which they know is as secure as it can be and we are not short of threats to our secrets! There is a real tension here between the need to protect information from the myriad of threats to it, and remember there are penalties if we fail to meet the data protection laws in place in our country and the desire for the state to scrutinise data and protect us from threats of one kind or another.”

This debate is causing many to look again at the need to protect core information in files, data stores and when in transit and many are looking to Cryptshare as a key part of a more secure infrastructure for their staff.

With your own installation of Cryptshare your information is protected against external interference of any kind, although it requires you to take some small steps to get started.  Your Cryptshare system can be running in your own IT infrastructure or can be hosted, access is limited in a range of ways which you can control from general access to your systems and using the security systems of your IT infrastructure. Critically the files residing on your Cryptshare server can only be accessed by persons who are in possession of the correct transfer ID and the associated password, the sender and recipient.  No other access is possible, either when in transit or stored.

“We designed our system from the outset to be highly secure but easy to implement” says Kess, “Surely the correct way for Governments to protect us is to encourage organisations of all kinds to protect the information they have to in the strongest ways, it is then up to the companies themselves to ensure proper use policies are adhered to.”


Read more

Cryptshare for Notes unter "den besten Tools für Lotus Notes"