Significance of secure data transfer for German energy suppliers increases

German energy suppliers have been declared as operators of critical infrastructures since the summer of 2015. According to the IT-Security Law they must send data via a secure connection.

Read more

Seven things you should consider when choosing a new software tool

Companies often focus too much on single functions when investing in new technology. Our graphic shows you which points to check before going for it...

Read more

Provide the right business tools – or else…

Companies have to pay more attention to the right software for their employees - not only from an employer’s image point of view but also for good economics and legality.

Read more

Cryptshare for Outlook on Product Hunt

Great news! We are suggested on the influential platform Product Hunt! Please help us by upvoting and sharing it.

Read more

Cryptshare is growing and looking for german speaking Business Development Managers

Über die letzten Jahre konnte Cryptshare erfolgreich expandieren und wachsen. Datenleaks, Ransomware, Cloud-Unfälle und dergleichen rufen Unternehmen ins Bewusstsein, dass sie für die Sicherheit ihrer Daten mehr machen müssen.

Read more

Security issues leave cloud infrastructure vulnerable

A newly discovered weak spot in the technology used to deliver cloud services enables criminals and governments to access information stored and processed in the cloud.

Read more

Lessons to be learnt from Panama Papers

In times of digital communication and the internet many things have changed in our private and corporate life. Among them is the possibility to gather information and organise and share them internationally in a very short amount of time.

Read more

Digital transformation in public authorities

Writing about cyber espionage these days seems almost needless. Not a single day passes without another report of stolen, lost, or unsecured data somewhere around the world. We live in a digital society and much of our private, public, and corporate communication and data storage happens online.

Read more

A vulnerability named "Drown" affects numerous web servers. Please check your Cryptshare Server!

The DROWN (Decrypting RSA using Obsolete and Weakened eNcryption) vulnerability (CVE-2016-0800) not only affects systems using SSLv2. Even servers that are equipped with a certificate, which uses the same private key that has been used to create certificates for other web servers accessible via SSLv2 are at risk.

Read more

How to protect yourself from Ransomware Attacks

A recent worldwide wave of encryption-trojans like “Locky” and “TeslaCrypt” have been keeping companies, private users and the entire security industry on their toes. Experts like the German Federal Office for Information Security (the “BSI”) are now providing recommendations on how to protect private and business data. We have collected some of these recommendations and added our own.

Read more