In the age of social networks and various more-or-less secure communication tools, it is hard to be at least basically sure that our communication over the Inernet reaches its recipient in unchanged form and confidentiality of such messages is untouched.

■ ■ ■

Security auditing

Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.

■ ■ ■

Latest posts

Cryptoucan™ usage: Mailvelope Setup

We’re proud to announce that you can use Cryptoucan™ with your web mail now. Since you’re most likely accessing your emails through a web browser, you need to install Mailvelope add-on. In this week’s article we will show you how to install and set up Mailvelope add-on so you can comfortable encrypt emails right from your browser.

■ ■ ■