Back to homepage

logo_s4d_sm

The Safety4Data Blog


Subscribe to our newsletter to learn more, or request additional information about data encryption and cyber-security.
INVEST IN YOUR SECURITY

Apriori and Posteriori Security

Strangely enough, more than a hundred years since the Titanic steamship sinking, I still feel the need to explain how...

Default Passwords and the Anatomy of a Cyber Attack

When I was writing about the accessibility of a critical infrastructure with default passwords in the previous chapter of these...

Password Policy

More Restriction Does Not Necessarily Mean More Security

One-time Pad – The Key Management

We concluded the last chapter with a provocative question: If one-time pad is truly an uncrackable cipher (as claimed by...

One-time Pad – The Principle and History of Origin

Today we will focus on one type of cipher, namely a cipher that cannot be decrypted without the knowledge of...

List of 25 most popular passwords you should avoid in 2016

In case you are thinking of changing your passwords, never use on of these listed below. These are 25 most...

Long-Term Archiving Problems

In terms of data security, long-term archiving is a specific problem. Not a problem because a majority of correspondence and...

Safety4Data Helpful Resources for Real Estate Brokers

No matter in which field you work, protecting your client data should be among your top priorities. There is nothing...

Security Level

Here’s some good news for you: we are about to end the flood of newly introduced terms. We just need...

Key Management: Types and the Broken Enigma Cipher Case

As we have shown in previous chapters, once we start thinking about the cryptosystem as a summary of technical and...