Recent Posts
Basics of cryptography keys and about encryptgig algorithm
Goals of cryptographic keys (CIA triad)? Confidentiality: Confidentiality ensures that data remains private in three different situations: when it is at rest, when it is in transit, and when it is in use. Integrity: Integrity ensures that data is not altered without authorization. If integrity mechanisms are in place, the recipient of a message can be certain that the message received is identical to the message that was sent.
Availability: Availability ensures Information is available all time without any alteration or downtime
read more
Secure your data with Encryptgig
I trust my wife with my life but, do I trust her with my computer or phone ?
This question is funny, but it is pointing to a really serious problem these days. Data stored in your computer and mobile ca be sensitive and everyone is not supposed to see it. I call it as common man’s problem of data security.
The concept of data security is not new for enterprise or organizations, but for common man it’s still of no value.
read more
Biometric authentication with encryptgig
Just biometric-based authentication is sufficient for data security? Retinas, irises, voices, and fingerprints-based authentication are widely accepted across payments, mobile, and applications industries.
Unfortunately, many perceived biometric as the only security standard that they can rely on for security. The truth is biometric authentication doesn’t protect the plain data that are stored on mobiles, computers, and servers. When hackers get the access of such data and if start exploiting, it catastrophized the reputation of organization and individuals alike.
read more
CIA - Trilogy
The CIA Trilogy of confidentiality, integrity and availability is core of information security. Most of the security solutions are revolving around these concepts.
What Is Confidentiality ? Our Solution can help individuals and organizations to achieve Confidentiality. Confidentiality means protecting the information from unintended or unauthorized access, or some kind of misuse. Every stored information has some kind of sensitivity. The more sensitive is the information, more valuable it becomes. Hackers are always in hunt for such information, and they try to atack information systems for
read more
What is GDPR ?
GDPR is Europe’s new data privacy and security law includes hundreds of pages’ worth of new requirements for organizations around the world. This GDPR overview will help you understand the law and determine what parts of it apply to you.
Full abbreviation of GDPR is General Data Protection Regulation. It imposes obligations onto organizations anywhere in world. So, if your company wants to collect data from the people of EU, you have to follow GDPR.
read more
Social Media File Sharing and Security
Social media companies are advertising about security and safety, and I am not doubting their security. But can you share your bank account number and password using social media app, even the safest one. Trust me, never do that. Social media can see you data at any time, law enforcement actually can ask them to show your data.
Another thing that I am worried about these companies is, they are storing and running analytics on our data (Even Encrypted Data Headers).
read more