E-Mail Encryption Made Easy

Yesterday a conference concerning the “Digital Agenda" was carried out in Berlin by the German Newspaper “Die Zeit”. In addition to issues such as the digital transformation of enterprises in Germany and the digital infrastructure "as the beating heart of a Revolution" it was also spoken extensively about security in the network.

Read more

Poker playing in the Hall of Mirrors? Don’t let others look into your cards!

British intelligence agencies have for years spied on the communications between lawyers and their clients. So how to protect lawyers and their clients?

Read more

Confidence in US Service Providers' Security down to just 2%

The German daily newspaper "Die Welt" recently reported in an article on findings taken from the Cyber Security Study that the Allensbach Institute has carried out on behalf of the Deutsche Telekom subsidiary T-Systems. The study shows a high degree of scepticism among executives about using US IT companies and providers of cloud services.

Read more

The Danger of exchanging Data using a USB-stick

People and companies who want to exchange data usually are confronted with two basic problems. A: Using a proper email encryption system can be very complicated. B: Sending large files via email is often limited by the provider, software or encryption system. The alternative is to use a USB stick. But this isn’t without risk as recent developments show.

Read more

Safe Exchange of Sensitive Data

The US-American Internet pioneer and book author Jaron Lanier has received the German Book Trade Peace Prize. Lanier criticizes the recent developments of the online world and the impending loss of control over freedom and personal data connected to them.

Read more

The Cost of Cyber Attacks for Companies

Economic consequences of cyber attacks can cost firms up to several hundred thousand U.S. dollars. While there is a difference in the total amount between small and medium enterprises and big companies, it poses an economic threat that should not be underestimated by either one. But what are the expected financial damages and how can Cryptshare help minimizing them?

Read more

Shellshock Bug: Fix available

The recently detected “Shellshock” bug in Linux operating systems could affect Cryptshare 2 Servers. A bugfix is available now to resolve the issue which should be applied to all Cryptshare 2 and Cryptshare 3 Hardware and Virtual Appliances.

Read more

Declining Trust in Online Data Safety can pose a Business Risk

Recent studies have shown that Internet users are increasingly unsettled and mistrusting when it comes to online data safety. With an increasing number of digital espionage incidents consumers lose their trust. This is not only bad for the Internet user but also holds a business risk for enterprises that have to handle and process customer data electronically.

Read more

Industrial Espionage on Demand

When it comes to data security not only hackers and other criminals are potential threats for companies. The United States run an agency where national companies can request espionage of foreign companies when competing for public project for example. This so called Advocacy Center of the U.S. Department of Commerce serves as an interface between US-American intelligence services and companies. Its purpose is to improve the competitive situation for domestic industries internationally. While this can be seen as a positive approach for American companies it poses a threat for all foreign competing industries and calls for better protection of corporate communication and data.

Read more

S/MIME vs PGP - The right way to secure e-mail communication?

Despite increasing awareness of the issue in the media, the rate of encrypted e-mails being sent is dropping. S/MIME vs PGP - What is the right approach to protect electronic communication?

Read more


About this blog

With our software Cryptshare we enable our customers to share e-mails and files of any size securely in an ad-hoc way with a detailed audit trail and a strong ROI.

On our blog we write about email encryption, cybercrime, security gaps, malware, data protection and more. In short, anything about data security.

Follow us