Articles related to Encryption

GETPAY LLC Achieves FIPS 140-2 Encryption Validation To Meet U.S. Federal Requirements For Encrypted Phone

GETPAY LLC has today announced the completion of the FIPS 140-2 validation process for Encrypted Phone. This is the industry standard accreditation set by official governing body – the National Institute of Standards and Technology (NIST) – and is a...

The Best Defense Is A Good Offensive Plan On Encryption

All of us who have a computer or smartphone is pleased to see the Obama administration moving away from law enforcement calls for banning or regulating cybersecurity. Our society is more dependent on information technology every day. Information security,...

Privacy For Everyone

Privacy breaches are in the media all the time: a major company’s servers are hacked, or a celebrity’s private photos are stolen. These stories are so commonplace that it’s odd to see a week go by without one, which begs the question: if these global...

Not All Encryption Is Equal

It’s easy to create a poor encryption system, and very difficult to create a good one. But as a mobile user who just wants to be sure that your communication is private and secure, how can you tell the difference? Fortunately, you don’t have to be an...

Short Pins Sink Orgs

I probably know what you are thinking – another post on why passwords are bad. But it’s not so much that passwords themselves are just plain bad; the problem is more in the way in which we implement them. Many experts will tell you, as would I, that we...

Blackphone: Privacy People WANT To Buy

Dear Privacy Enthusiast, On July 11, our friends at Blackberry posted an article about, of all things, us! The piece goes to some effort to suggest that BP1 is “consumer-grade”, and therefore “inadequate” for business users. Setting aside the fact that we...

Stay updated with GETPAY LLC:

Interested in joining the conversation on privacy? Complete this short form to get updates on privacy and information security delivered straight to your inbox. You can also check out our articles on privacy and information security in the business environment.