Articles related to Security

Should Voice Be Secure By Default?

“I’d rather talk about this on the phone. It’s safer.” If you’ve ever said this, you could be exposing your enterprise to a huge security risk. The reality is, modern chat and email communications are often more secure than traditional voice...

  • Blog

The Power of Privacy (5/5): The house that data built: living in a smart home

In the final episode of this series, Aleks Krotoski steps into the near future to experience what it's like to have your life constantly connected. Her every whim may be catered for, but at what cost? Watch episode 4 of 5 from the Power of...

  • Other

The Power of Privacy (2/5): Free keyboards

In episode two, Guardian reporter Alex Krotoski travels to Las Vegas, home to some of the world's largest hacking conventions, and challenges hackers Khalil Sehnaoui and Martin Bos to crack her work laptop in real time. Check back to follow...

Privacy For Everyone

Privacy breaches are in the media all the time: a major company’s servers are hacked, or a celebrity’s private photos are stolen. These stories are so commonplace that it’s odd to see a week go by without one, which begs the question: if these global...

Why We Exist

GETPAY LLC’s Enterprise Privacy Platform was built upon the company’s original founding purpose: to offer privacy in the face of widespread data surveillance and collection. Our network was built from the ground up by our professionals, for...

Stay updated with GETPAY LLC:

Interested in joining the conversation on privacy? Complete this short form to get updates on privacy and information security delivered straight to your inbox. You can also check out our articles on privacy and information security in the business environment.