In this article, we'll show you why you should think carefully when allowing and how to manage permission requests on your device to protect your data . 👇

Wars today are waged in a different theater. Instead of machine guns and tanks, now use viruses and and in our interconnected world, this may be even more dangerous. ⤵️

Student cannot be used, or in any way for commercial purposes and the school must not allow advertising on the instructional software that it assigned to its students 👇

We believe that and are fundamental rights of any individual and we aim to help you that through our end-to-end encrypted email service. 👇

In this article, we'll discuss what is management, what are data security threats, data security best practices, as well as tools that will help you with data security management. ⤵️

if you're an , , or , you might end up on your government's radar and they might be actively you. 🕵️‍♀️

Google makes a lot of money from and giving access to your to its partners. According to @StatistaCharts, they almost 210 billion USD from ad revenue in 2021 alone. 👇

breaches and data are becoming a bigger and bigger problem every year. According to IT Governance, there were 1,243 security incidents in 2021, which included more than 💰5 billion records. 👇

are on the rise and they have doubled in frequency between 2020 and 2021, with as much as 37% of organizations in the world saying they were of ransomware. ⤵️

Most people who use somewhat regularly have heard about and may even have some idea how to protect themselves against it (if you don't here's a good reminder on how to protect from an email-based phishing ).

🪝attacks aren’t going anywhere and as long as people use , there will be phishing attempts and they will keep evolving.The best is to make sure that you are alert and that you don’t fall easy prey to them. 🕵️‍♂️

One of the biggest culprits here is computer , which can be used by the government (read here how the government might track you) and even criminals to access someone’s , including private text messages and .

CTemplar Android and iOS apps both use end-to-end , full , and zero data access, along with code and a simple-to-use interface. Try them out today and start protecting your data.

Web browsing history is often neglected in discussions about . data can be used to identify and you and therefore shouldn't be neglected.

We already know that the browser you're using and how you're using it can reveal a lot about your online behavior through , but did you ever consider how much can mouse movements reveal your behavior?

Show older

The original server operated by the Mastodon gGmbH non-profit