• Skip to content
logo logo
  • Blog
Login SIGNUP

HushApp Tips

How to prevent Google from spying on your information?

October 18, 2018 by HushApp Team

How to prevent Google from spying on your information?

Have you ever happened to visit a place, see a product that catches your attention and minutes later see an advertisement with that same product on your phone? Yes, you’re not the only one who feels spied on. There is no doubt that Google knows more about us than  we know. They have the ability to listen to what you say and even store your password information. To prevent Google from spying on your information, follow some tips and make some simple configuration changes to some of its tools.

How to prevent Google from spying on you: Start with the basics

– You can use an anonymous search engine instead of Google Search, such as DuckDuckGo.

– Log out of your Google account whenever you are not using it (although it can be a bit tedious, this small measure can change your privacy)

– Use an other DNS than Google

– Block Google Adsense ads with an ad blocker.

Protect your passwords: Chrome can also save them 

The version of Chrome 69 not only made aesthetic changes, but automatically starts logging into users’ Google account by saving their passwords. To avoid remaining with your passwords, follow these steps:

– Open Chrome and copy this address in the search bar chrome: // flags /

– Then click on “Enter”

– In the search engine that appears, type: # account-consistency

– In the option “Identity consistency between browser and cookie jar” select the “Disable” drop-down.

– Below, the following message will appear: “Changes will be applied the next time you restart Google Chrome.” Then click on “Relaunch now” and the browser will restart.

Google can spy on you using your microphone: 

The microphone of your mobile is also an open door for the technological giant to hear and spy on you. To further protect your privacy, follow some of these tips:

Disable the “Ok Google”: If you use Google Assistant, it is almost certain that it is activated when you hear “Ok, Google”. For that, it is necessary that the application be 100% alert, always listening. The way to avoid being constantly heard is like this:

– Go to “Settings”.
– Go to “Google”.
– Access the “Search” option.
– Click on “Voice.
– Enter “Voice Recognition”.
– And finally, disable the “Ok, Google” option.

2) Prevent Google from saving your audio history

By authorizing Google to collect your personal information (which you have surely done by accepting, but not actually reading the terms and conditions) you should know that practically all the commands that you dictate to your mobile are registered. It’s like the search history on the Internet but in audio format.

You can also deactivate them in this site, go to the section “Voice and Audio Activity” and finally disable the scroll.

3) Block Google from your microphone:

You can also prevent Google from using the microphone completely by following these steps:-Go to Settings

-Select Applications.
– Scroll until you find the Google app and access it.
– Select Permission and deactivate Microphone.

What to do so that Google Maps does not follow your steps? 

Another way to prevent Google from spying on you is through Google Maps. You can follow your steps to all the places you went thanks to this tool. Although there are many advantages, such as recommending places according to your taste or providing you the most efficient mode of transportation. In actuality, it can be problematic because this method is one of the main tools used to collect your information. To prevent this from happening, you have some options that you can apply:

  • Use the Google Maps offline and download the maps beforehand, this will also help you limit the amount of data you spend.
  1. Open Google Maps
  2. Click on the button of the 3 vertical bars in the upper left corner
  3. Press “your chronology”
  4. Then in the upper right corner, press the button of the 3 vertical bars
  5. Select settings – application settings
  6. Press ” the location is activated “and change it to” NO “

You can also delete the history from the computer: 

Start using HushApp today.
SIGN UP

  1. Enter the google maps website
  2. Enter your email account
  3. Select menu -” Your chronology “
  4. Click on the wheel located at the bottom right
  5. Select “Delete all location history” – Accept

Although many of these tools are mainly designed for the usability and comfort of each person, if you do not take the appropriate measures for their use your information and privacy will be exposed without you noticing.

Filed Under: HushApp Tips Tagged With: Google, Google Assistant, Google Maps, Google spy, ok Google, passwords., privacy

Are you a cybersecurity geek? 10 signs to show that you are becoming one

October 2, 2018 by HushApp Team

Are you a cybersecurity geek? 10 signs to show that you are becoming one

Being a geek is a way of life, it’s about being passionate about what you like the most, keeping up with the latest technology, and watching all the movies and science fiction series. It also is about being aware of all details, forums or blogs that comment on your favorite topics (in addition to buying all possible gadgets and toys). But as a technology lover, you are aware of all the threats that exist on the Internet, and you have so many security measures that- wait, are you becoming a cybersecurity geek?  

We have repeated on several occasions how important it is to protect yourself against a cyberattack, and never to be paranoid enough about cybersecurity, but there may be some exceptions … If you show three or more of these signs when you protect yourself from a cyberattack, you may already be a cybersecurity geek 🙂

Are you becoming a cybersecurity geek?  

  1. Make daily backups of your data or every few hours. 
  2. Do not open attachments from NOBODY.  
  3. Do not use any social network, or if you do, use them with false name and profile photo.
  4. Use more than one antivirus for each device.
  5. Never use Windows, a good cybersecurity geek always knows not to use this operating system, even if he has the best antivirus (or more than one).
  6. Visit pages of companies or computer security organizations daily to be aware of possible threats.
  7. Establish protocols and infrastructure for a Disaster Recovery Plan (DRP) … at home.
  8. Search daily on the Internet to know what information about you is published on the web, there are even some people that have a Google Alert with their name configured. Even think of hiring a company that searches in the most remote corner of the internet to know what  private information is online and can help you erase it.
  9. Protecting your router, but not only with the basic measures such as, passwords, signal range and others. You have to go further, better, think about covering the walls of your house with layers of aluminum foil, this will drastically reduce the intensity of the signal.
  10. Place removable devices (such as USB encrypted) in secret locations that you can use to send to your recipients. Although it is a measure used by cybersecurity experts and hackers, in your day to day life, believe me, you will need to. However we have some better options for you … 

If you do some of these actions I think you better take it easy. It is not necessary for security of your confidential information to be problem for your life, there are much simpler options. We want to make your life easier, with HushApp you can keep your information safe and secured while having peace of mind that your confidential files remain safe. 

 

We invite you to try HushApp …

Filed Under: HushApp Tips Tagged With: cyberattack, cybersecurity, Cybersecurity geek, geek, hacker, hacking, HushApp

9 Tips to protect your router from cyber attacks (and your neighbor)

September 5, 2018 by HushApp Team

9 Tips to protect your router from cyber attacks (and your neighbor)

The Wi-fi signal from our router has become part of the family, how many do not depend on this small device to keep the family happy? We all want it to keep working perfectly, but surely you have not bothered to protect your router until the neighbor manages to connect to it. How he did it?

Imagine that your router is an open door to your home, think of all the devices that are connected to it, if you do not take the necessary security measures, you will not only be leaving the doors open for your neighbors to use your internet connection without paying it, but also you are responsible for the pages that he / she visits, and therefore, you risk being an easy prey to a cyber attack.

How can we prevent intruders from connecting to our Wi-Fi? Although we do not have the magic formula to achieve total security, at least we can help you improve your daily practices and reduce the risk of an attack by following this tips:

First steps to protect your router: Change everything that is by default

  1. The first step is change the user, avoid leaving “admin” and configure something customized.
  2. Second and one of the most important, change the password which comes by default by the manufacturer or operator. Use the strongest passwords you can, with combinations of uppercase, lowercase, numbers and special characters.
  3. Also, change the IP address of the router: it is usually 192.168.1.1, just by changing the last digit and making it difficult for any intruder to enter.
  4. The name of the Wi-Fi: here you can use something simple or easy to remember, but do not put information that refers to you: your name, nickname, physical address or any other unnecessary information.

After making the necessary changes, you can apply other stronger measures to protect your router:

  1. Limit the emission power of the antennas: one of the simplest measures, because if you limit its scope, it will be difficult for others to get connected, only to those who are inside the house. Most routers allow managing the antennas power to limit the radius coverage of the network.
  2. Configure your network with WPA encryption: It is recommended to enable the most current WPA3 WPA configuration with a 192 bits encryption and the ability to individually protect each device that connects to the network. However, most modern versions of WPA like WPA2-PSK can also secure your network, since it offers a high level of protection. Is not recommended to use WEP encryption, since it is not secure enough, modern routers it does not have this option configured, nevertheless, it is worth reviewing it.
  3. Update the firmware: your router has its own operating system like your mobile devices and computers, it should be updated to correct possible bugs and vulnerabilities.
  4. Create different networks: Some new routers can create different networks, this will allow you to have networks for different purposes.
  5. Filter the MAC addresses: the MAC addresses identify every devices, there are not two computers with this identification number. Register the MAC addresses you want on your router, and only they will have access to your home’s internet.

If you want to be aware of other cybersecurity tips, we invite you to visit our Syneidis blog.

Filed Under: HushApp Tips Tagged With: cyber attacks, firmware, IP address, MAC, MAC addresses, password, router, Wi-Fi, WPA, WPA encryption, WPA3

What you need to know to choose a good antivirus

August 17, 2018 by HushApp Team

What you need to know to choose a good antivirus

One of the first steps you must take to protect yourself from a cyber attack is to have an antivirus, the web is full of threats, so we should be prepared for any eventuality of this type. The question is: how to choose a good antivirus between many options that exist in the market? And which one best suits your needs?

The risks of not being protected are very high, the fact of not having a good antivirus, could bring serious consequences just by accessing the most common sites: an infected email or websites with malicious codes, could bring any virus type or malware such as: Trojans, a computer worm or the feared ransomware, which would allow the cybercriminal to take control of your computer and your personal information.

Each user has different needs, so it is important to define which antivirus is the one that suits you best. Follow some basic tips to protect your computer and your most important information.

How to choose a good antivirus for my devices?

Before choosing an antivirus, you must define the use that you give to your computer, so you will know the protection level you need, it is not the same an antivirus for a company to a personal one, also, if you only check the mail or social media, or if on the contrary, you use your computer for downloading videos and entering many unreliable websites. There are risk in both cases, but precaution levels can be adapted.  

Take into account the computer speed, if it is a new and fast computer you won’t have problem using a powerful antivirus, but if it is an old and slow computer, you will need a lighter program, so that it does not affect your PC efficiency.

After you determine these characteristics, you can start to choose features, which can be adapted to the computer and your budget. Also, choose an antivirus compatible with the operating system you are using.

The basics

  1. You can find on internet paid versions or the free ones, generally, the paid versions will give you many more options, analyze if it is worth making the investment. It is best to choose one with a trial version, with you can test antivirus before paying the license.
  2. It is essential that the antivirus you choose has a firewall, this will allow you to protect your device from any unauthorized access to your local network by some cybercriminal.
  3. Consider the product reputation: buy products with have good references in the market, recognized manufacturers will give you credibility and confidence, in some cases you can see awards and recognitions given by associations and specialized media, as well as the opinions of others users through forums or specialized websites.
  4. Make sure buy it at the official store
  5. Even if you have a fast computer, it is advisable to look for an antivirus that consumes few resources. A good antivirus should protect your computer without delaying processes.
  6. Choose an easy-to-use software, an antivirus must perform its work automatically, in real time and almost without you noticing.
  7. A point to value is that the antivirus has customer service, which can provide technical support in case of any problem.

Plus+ to value

  1. Some antivirus programs also offer a multiple devices license, this allows you to protect not only your computer but other devices such as your mobile phone or tablet.
  2. If you have children, you could use an antivirus with parental control, with this you can limit the children access to the internet.
  3. To reinforce your computer security, some antivirus programs bring other advanced features, for example: Protection against ransomware, artificial intelligence that updates defenses while computer attacks evolving, antispam, phishing protection, protection against banking trojans, among others. Depending on your budget, you can add it to improve your security.

HushApp: Another type of information protection

Do not think that just by choosing an antivirus you will be completely safe, the technology advances and with it the cyber attacks, si If you have more security, it will be better for your computer. The good news is there are other solutions to continue protecting your privacy, many of them are free, and will not modify the budget that you have prepared for cybersecurity.

For example HushApp, which in its FREE version allows you to store and share your most important files easily and securely, through end-to-end encryption systems and other features that will help protect your privacy.

We invite you to try HushApp…

Filed Under: HushApp Tips Tagged With: antivirus, computer worm, firewall, HushApp, information protection, multiple devices license, parental control, ransomware, Trojans

17 essential tips for parents on Cybersecurity for children

August 6, 2018 by HushApp Team

17 essential tips for parents on Cybersecurity for children

There is no doubt today that children have the ability to use electronic devices and the internet, even the smallest kids already know how to play their favorite online games. This opens a debate among parents about what age should kids start using technology and how much time they should spend on it. Although there is no precise answer to these questions, here, parents can learn some tips about Cybersecurity for children.

According to a research by Norton, 87% of Spanish parents consider it risky to allow their children to use computers and mobile devices without any supervision; in fact, among the 3 biggest concerns are: children can suffer cyber bullying (92%), spend too much time in front of the screen (88%) and download malicious programs or applications (88%).

Despite the active awareness of these latent dangers, statistics say that most parents are not adjusting their parenting.  The study found that 68% do not limit access to certain websites or applications, 19% allows their children to buy online without surveillance and 57% allows them to use the internet without supervision.

Children on the Internet have a lack of supervision due to many reasons, one being parents not intervening to check the safety of their children.

Therefore, we invite you to read the following basic cybersecurity tips, which you can apply to control and protect your children about the dangers they are exposed to on the web.

Cybersecurity for children: tips for parents and children

  1. Limits how long your children can spend connected to the web, set those limits and make sure they are met.
  2. Watch the pages they visit, who they communicate with and what other actions they do on the web. And if you detect any access to some undesirable content for their age, you can talk with them about the subject and block access to the web or game.
  3. Recommend your kids to not use their real name on the web and never give personal information, such as phone numbers, your address, their school, or where they will go on vacation, etc. to strangers.
  4. Establish a VPN connection in your home to ensure that no online predator will have access into your system.
  5. Teach children to create unique passwords that they can remember or keep in safe places.
  6. It is important for children to understand that the digital world can be as dangerous as the real world. If they are usually taught not to talk to strangers, the same should apply on the web.
  7. Watch who they contact on the web and teach them never to meet a stranger in person they met online.
  8. They should never respond to any threatening messages. Let them know if this happens, they have to discuss it with you or the adult that is in charge.
  9. Try to place the computer in a common area, where you can monitor what they do. This can be challenging by the usage mobile phones or tablets, yet still possible, you have the ability to monitor it other ways.
  10. Bookmark their favorite sites to facilitate access.
  11. Pay attention to any changes or attitudes regarding the time they spend on the web: Do they receive phone calls from people you do not know? Have you noticed any unsolicited gifts that have arrived in the mail? do they not like to talk about their online activities? Although these questions may seem unimportant, they could be signs that your children are being cyber bullied by a criminal.

Cybersecurity for children in Social networks:

12. Show them how to recognize and block unwanted contacts. 

Stay tuned to HushApp's Blog!
SUBSCRIBE

13. Specify that they must only add contacts from people they already know.

14. Monitor their social networks, check who their friends are and what they publish.

How to use parental control

15. Disable online purchases, or set parental controls on their devices to control they use it.

16. Use applications to monitor what your children do online: what do they download? How much time do they spend connected?

17. You can also configure parental control in browsers to be sure which pages they can enter.

Technology is changing our way of life, therefore, encouraging parents to monitor their children online will allow the child to grow up understanding how to navigate the online world in a safe way. The web can be as dangerous as the real world, however they don’t need to stop enjoying it. The important thing is that parents start to implement this change in their daily lives. Cybersecurity for children is important and if done properly can be hassle free.

Filed Under: HushApp Tips Tagged With: cyber bullying, Cybersecurity for children, Cybersecurity Tips, mobile devices, online games, parental control, password, Social networks, VPN

IoT Cybersecurity: 10 tips to protect the security of your home

July 24, 2018 by HushApp Team Leave a Comment

IoT Cybersecurity: 10 tips to protect the security of your home

Talking about IoT Cybersecurity should not be surprising these days. The popularity of the Internet of Things (IoT) has increased dramatically and is taking over our homes, but as the Smart Home trend grows, the possibility of a cyber attack through one of these devices increases.

According to a study by Gartnet, there are more than 5 million devices connected today and the trend is growing. On the other hand, it is estimated that by 2020 the IoT technology will be the target of more than a quarter of all cyber attacks.

To start protecting your devices and prevent a possible cyber attack, just follow these simple IoT cybersecurity tips that we show you below:

10 tips on IoT Cybersecurity

1. Use different passwords for each device. Just like any other service, remember that each password works like a key, you do not use the same key for more than one door. Make sure they are complex enough so that they can not be discovered so easily.

2. If it is possible to use more than one router. Considering that most people generally connect everything to the same network, it means that this one connection has more doors opened through which it might suffer an attack. It also means that once in, the attacker has access to the whole network.

3. Protect your phone, since from there you will access the rest of the devices in the home. Use passwords and any other protection systems that you consider necessary.

4. It is not necessary to connect all the services of the device to the internet if you are not using them. For example in the case of a Smart TV, disconnect the camera or microphone when you
do not need it.

5. Make sure none connect automatically to open Wi-Fi networks. Manually configure them to connect only to the network of your choice, and make sure they are programmed to do it only when you want.

6. It’s much better if there is some way that your IoT devices can send and receive your data in an encrypted way.

7. Do not buy products that are not compatible with one another, or that can no longer be protected.

8. Buy only brands of known manufacturers and have a good reputation in the market. Cheap is expensive and even dangerous.

9. Avoid buying used devices, they can come with some malware installed.

10. Update the software of the devices regularly. In case the devices don’t update automatically, do verify it manually. Do not use equipment that can not be updated.

Cybercriminals have everyday more tools to attack and access our personal information, so we must not make it easy for them. IoT cybersecurity should be as fundamental as in any other device, software or service that you use in your day-to-day life.

Filed Under: HushApp Tips Tagged With: cybercriminals, cybersecurity, encrypted, IoT, IoT Cybersecurity, IoT devices, malware, passwords.

10 Cybersecurity tips for gaming consoles and online video games

July 16, 2018 by HushApp Team 2 Comments

10 Cybersecurity tips for gaming consoles and online video games

Cybersecurity is no game when it comes to the video game world. Like other electronic devices, they run the same risk of suffering from a cyber attack due to their internet connectivity. The following article will offer a few cybersecurity tips so that you can exercise security and caution while playing your favorite video games.

The dangers are the same as those that face any device. Through your video game console an experienced hacker can access personal data, credit card information or even violate your privacy through webcams. The problem is that most users of these devices are unaware of this risk, and do not take the appropriate measures.

Hackers and online video games

Video games allow interaction with other players, a tool that improves the gaming experience through competitiveness, however, this space exposes the user to possible attacks leading to private data and information loss.

Stealing virtual money, stealing player accounts (pishing), theft of personal data/credit cards, or even losing control of one´s device through malwares are the main objectives of a hacker in the world of video games.

Children are the most vulnerable to attract a hacker, they do not maintain the same level of caution and are unaware of where they are clicking. This can lead to downloaded viruses, or worse, data theft.

Cybersecurity tips for  gaming consoles and online video games

Therefore, it is advisable to follow some basic cybersecurity measures for video games and online games. These will allow you to continue enjoying the game with peace of mind. Here are some tips:

  1. Do not reuse passwords used in other games or devices, because if it is compromised, they will have access to other services.
  2. Eliminate the protection measures predetermined by the manufacturer, change them and adjust them to your specifications.
  3. Do not trust any notification that asks you to change your username and password.
  4. Download the games from the official websites.
  5. In the case of computers and mobile phones, always keep an updated antivirus.
  6. Avoid entering your credit card information, unless it is strictly necessary.
  7. As for children, establish strict parental controls to prevent them from entering unknown pages or links.
  8. Inform children of basic notions of cybersecurity that are appropriate to their age.
  9. Monitor and control what the children in your charge access on the internet.
  10. Protect important files that you save on the mobile devices you use to play. You can use HushApp and ensure that your information will be safe.

There is no doubt that these games provide entertainment for the whole family, however, we should not lack awareness when it comes to cybersecurity in video games. We can all be victims of cyber attacks.

Filed Under: HushApp Tips Tagged With: cyber attack, cybersecurity, Cybersecurity Tips, gaming consoles, hacker, online video games, video game

20 basic tips you can follow to protect your mobile

July 6, 2018 by HushApp Team Leave a Comment

20 basic tips you can follow to protect your mobile

Cyberattacks have increased at the same rate that the number of mobile devices users have, and despite this, many users are still unaware of the need for mobile cybersecurity. That’s why we collected 20 basic tips that you can follow to protect your mobile.

How to protect your mobile device?

  1. It is essential not only to install an antivirus on your mobile, but also to keep it updated.
  2. Avoid downloading suspicious applications, especially those that come from advertisements. They often extract personal information.
  3. Backup your files regularly.
  4. Do not store passwords of your credit cards, email, credentials or other sensitive information on your device.
  5. Do not trust phone calls or emails that request passwords or PIN number who pass themselves for banks identities.
  6. Access trusted websites, with secure access (https) or with a small lock in the browser bar.
  7. Close sessions each time you use applications with sensitive information, such as banks or some others with access to medical data.
  8. Like the computer, you can use incognito windows to stop your browser from saving information regarding the pages you are visiting. Your internet provider will still have access to your navigation history, but at least others will not be able to access it.
  9. Beware of open Wi-Fi, they are always useful for an emergency, but anyone can access them and your data. That’s why it is not recommended to make private or sensitive information available to unwanted entities
  10. Always download applications from the official store (Android or iOS), these platforms bring protections designed against malicious software.
  11. Control access requirements, such files, camera, photos, GPS, etc. It is not always necessary to give permission to everything requested.
  12. Install an application to find phones remotely in case of theft or loss of your device.
  13. Use an encryption system for your files, this will protect your information not only in case you lose your mobile phone, but it will also
    Start using HushApp today.
    SIGN UP
    allow you to store and share files easily.

Mobile cybersecurity for the business world:

Companies have changed their work environments, looking to be adaptable and flexible to staff needs. That’s why the use of corporate mobile devices has grown. Employees can use them outside the workplace, and manage their time in a way that best suits them. However, if they do not take the necessary security measures, the company can be exposed to a cyberattack, and if it is not handled properly, the damage can be serious.

  1. To protect company communications, employees must know the VPN connection and how to access it.
  2. In the case of corporate mobile devices, establish cybersecurity policies, infrastructure and resources to fulfill them inside and outside the company.
  3. Do not install applications on the company mobile without the authorization of the technical department.
  4. If the device is used for personal reasons, create separate accounts in order to not mix information.
  5. Use 3G or 4G connections to avoid unknown Wi-Fi, this is ideal for the company when dealing with sensitive data.
  6. The managers and employees of the company must know the risks they are exposed to in the case of a cyberattack. Therefore, blocking protocols and actions must be established in case of emergency.
  7. If you need to send sensitive or confidential information to a client or partner, it is convenient to use encryption systems. It allows you to protect files that you send until they reach the recipient you choose. The HushApp can help companies improve this process. This application protects confidential information by encrypting files sent to third parties in an easy and secure way without the need for the client to sign up.

In addition to the measures listed above, there are many others that can be applied to the business world in order reinforce mobile cybersecurity.

Filed Under: HushApp Tips, Sin categorizar Tagged With: Cyberattacks, Mobile cybersecurity, open Wi-Fi, sensitive information

22 frequently asked questions about how to share and send files in a safe way

June 14, 2018 by HushApp Team Leave a Comment

22 frequently asked questions about how to share and send files in a safe way

Every day new applications are sent to the market that allow us to send files to our contacts in a complete and timely manner, this means that sharing information in digital is part of our day to day. The problem is that we do not always do it the right way.

With the rise of cybercrime, many questions arise about whether we are taking the necessary precautions when sharing information, especially when it comes to confidential data. That is why we decided to answer the most frequent questions that are asked about this topic.

What you need to know about share and send files safely

1. Why is security so important to sending a file?

It is common to hear about large and serious leaks in high confidentiality data companies in the news. Today hackers have more powerful tools than ever that allow them to intercept valuable information. If you do not take the necessary preventative measures, the consequences could not only revolve around reputation but finances as well.

2. Is it wrong to send files by email?

Not bad as long as the information you send is not confidential. Take into account that emails with attachment are a bait used to infect with malwares the computers of the recipient.

3. How safe is it to send files with cloud services?

Cloud services currently have many options that streamline the file-sharing processes. However, we must bear in mind that they are also vulnerable to being intercepted by someone unwanted. It would be advisable to establish strong passwords and, if possible, configure double factor authentication.

4. Is it secure to send files by chats like Facebook Messenger, Telegram or Whatsapp?

Facebook Messenger, Telegram and Whatsapp are some of the most globally used messaging services, but they do not all share the same level of security. The Facebook chat is considered one of the least secure considering that it does not have an encryption system, not to mention that all conversations are stored. Telegram and WhatsApp, although having a strong encryption system, still put information at risk due to ease of use and virality.

5. Are files shared through services like Wetransfer or Mega protected?

These services are useful for fast heavy file transfers, but they do not involve maintain a high security level. Like other cloud services, files are exposed to being intercepted.

6. What applications should I use to send files securely?

We advise that you an application that allows you to encrypt files, while also guaranteeing you that their technology completely protects your files from the moment they arrive up to the point that they reach the chosen recipient.

7. How do I make sure I’m sending files in the right way?

Although there is no infallible system, it is crucial to find one the one that best suits your needs. You must spend time choosing the application that offers the highest security level and ensures protection in all transfer phases.

8. What is file encryption?

An encryption software takes data and creates a shell that makes it inaccessible and illegible for those who want to access without authorization. Encrypted information can only be unlocked with a predetermined password.

9. What is end to end encryption?

It is an encryption system that keeps the content protected in all phases of the process, only the sender and its recipient will have the access code.

10. How does encryption work when sending files?

The file is encrypted with certain encryption protocols in the device that it sends based on unique passwords and transfers it to the addressee. This makes addressee the only person who will be able to decrypt it.

11. What should I consider when choosing a program that protects my files?

The more encryption systems the application integrates, the more effective it will be. End-to-end encryption and zero-knowledge technology are great examples of programming that ensures that developers/hackers can not access your files or passwords.

 

send files safely
The HushApp is an application that is safe and easy to use, while also including end-to-end encryption.

 

12. How do I know that the files will be safe when they reach their recipient?

Ideally, the receiver should use the same security software so that received files will remain encrypted. Even if the receiver does not have a specific software, the file will remain secure until it is decrypted and downloaded by the receiver.

13. Is the server of the program I am using safe?

Depending on what you want to protect, you must increase or not the security level of the server you select. If the one you use works with military level encryption, with multilayer encryption or backup services, you can be sure that your information has the ideal level of security.

14. Is the server located in a secure geographic location (with respect to local information regulation / GDPR)?

If you are sharing documents with your clients, it is necessary to have total transparency of a file’s storage location. The new General Regulation Data Protection (GDPR) this information should be even clearer.

For this reason it is essential to seek local legal advice. This means that when selecting a file exchange provider, ask where those files will be located and which legal regulations they should operate.

15. What applications are recommended to be used in companies?

Adequate encryption systems for the transfer of secure files and servers with the highest level of security. It is important that they allow the participation of several users and that they also comply with local data protection regulations.

16. Is the application to send my files compatible with the workflow of a company?

It is essential that a company manages the information that moves inside carefully. In addition, the program must have multidisciplinary team management systems that can be easily adapted to the constant flow of information that exists in a company.

17. How can I control what is sent and shared within my company?

There are tools adapted to the business environment that allow you to manage the flow of information in the company easily and safely.

The HushApp has a version adapted to companies, with which you can exchange and send files in multidisciplinary teams in a secure way while controlling the access and management of other users’ permissions. In addition to this you are able to access a history of file transfers sent and received, all while complying with the current European legislation.

18. Are they easy to use applications?

It depends. It is important to choose an application that monitors security levels and offers a good user experience and usability. This allows for a simpler implementation and easy learning for employees.

19. Is it safe to work with FTP?

FTP file transfer is a system that many companies still use that allows the uploading of files to a server. This means that whoever needs to access these files can view them from another computer with a username and password. The problem with this is that a password is not as effective as the encryption, since it is only protecting the access and not the file itself. It is ideal to upload already encrypted files, even if it is a little more time consuming.

20. Is there another safer method than encryption?

So far, no, but there are different types of encryption that can vary the level of security and adapt according to what you need.

21. Is a premium account better than a free account?

Everything will depend on what each one offers. It is not necessarily true that a premium account is better than a free one, it must adapt to the needs of the shipment. The important thing to review is the actual security offered by each.

22. Are the documents that are worked on collaboratively safe?

Currently, there are online tools that allow more than one person to edit a document in real time. This type of functionality is very useful for work teams trying to manage time.

However, this type of service does not offer optimal security measures since there is no way to protect them while they are being edited. It is not advisable to work on sensitive information for the company in these type of settings.

Filed Under: HushApp Tips Tagged With: encryption, encryption system, end to end encryption, exchange files, send documents, send files, send files securely, share documents., share files

Encryption for dummies: What is it and what is it for?

June 6, 2018 by HushApp Team Leave a Comment

Encryption for dummies: What is it and what is it for?

Surely you have already heard news of cyber attacks and data leaks as it is becoming increasingly common. Any person or company is exposed to an attack of this type if the necessary security measures are not taken, but what are these measures? What can you do to protect your information?. The most used and effective method to protect your data is a system of encryption with which you can feel secure that your information is completely protected. Have you heard about encryption? Do you know how it works?.

If your answer is no, it is time for you to start taking cybersecurity more seriously and begin learning more about it. That is why we have prepared this post, in hopes that it will help you better understand and apply it in the daily management of your files.

What is encryption?

To explain it in a simple way, encryption is a procedure in which any type of file becomes unreadable thanks to an algorithm that scrambles

Encryption is easy with HushApp!
DOWNLOAD
the files components. This makes it impossible for the file to be opened or decoded if you do not have the key to access the information. This  means that if an unauthorized viewer intercepts an encrypted file they will only be able to see a group of illegible characters, even if they manage to open it.

This system is not something new. Encryption has existed for many centuries, however, its modern use dates back to the First World War. During the conflict different blocks sent illegible messages back and forth to prevent the enemy from deciphering them in the case that they were intercepted in transit.

Encryption, Symmetric and Asymmetric what is it for?

The most common types of file encryption are symmetric and asymmetric.

The symmetric encryption system uses a single key to encrypt or decrypt, while asymmetric data uses two keys: one public to encrypt and one private to decrypt. In this way it is impossible to derive the private key from the public key.  

Advantages and disadvantages

It is important to highlight the level of security offered by data encryption. It is a much more powerful tool than a password (such as the start of the mobile or email), since they only protect access. Once the password is discovered, anyone with it has full access to the contents of the files. Encryption protects data directly, making it impossible to see the contents of files.

The only disadvantage to consider is the importance of not losing your password. After it is lost, all access to the data will be lost completely, as there is no way to change it. So all things  considered, the only additional requirement of encryption is greater protection of your passwords.

How is a file encrypted?

There are different levels of security that depend on the complexity of the algorithm used. Different encryption methods contain greater and lesser levels of sophistication and complexity.

At the user level, it is not necessary to use such complex tools. Currently there are applications that can help you encrypt your files both easily and quickly, while also to share them with your contacts in a secure way. This allows them to remain protected from the moment they are sent to the moment they are received.

We are the only ones responsible for ensuring the security of our information, so taking protective measures as a habit will help us avoid future problems.

Encryption is easy, check it with HushApp!

Filed Under: HushApp Tips Tagged With: algorithm, asymmetric encryption, cyber attacks, Cybersecurity Tips, encryption, file encryption, key, password, protect information, symmetric encryption

  • « Previous Page
  • Page 1
  • Page 2
logo HushApp made in EU

HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.


Product
Features Pricing Android App iOS App coming soon Web App
Users
Book a demo FAQ Guide Support
Business
Hush for Business GDPR Use cases
About
About us Jobs Terms of Use Privacy Policy Legal
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy
Necessary Always Enabled