• Skip to content
logo logo
  • Blog
Login SIGNUP

confidential information

How to use a public WiFi without compromising your security

November 6, 2018 by HushApp Team

How to use a public WiFi without compromising your security

One of the basic measures to protect yourself from a cyber attack is to avoid connecting to public networks. Often times they lack security whatsoever and can be an open door for cyber attackers. However, sometimes there is no choice but to connect to a public WiFi, in that case, you can take some precautionary measures that will allow you to navigate in a more secure way with this type of connection.

10 Tips for using public WiFi securely

  • Make sure you connect to networks with WPA security or WP2, avoid networks with WEP security, as they are not secure enough.
  • Use a VPN: If possible use a virtual private network (Virtual Private Network), so the IP address of your devices will be hidden from the websites you visit, your browsing is completely anonymous. Web traffic is also encrypted, which means that even your Internet service provider can not see your activity online.
  • Keep all the software and applications on your devices and mobile devices updated.
  • Always try to navigate through secure pages, where data travels encrypted (with the URL that starts in HTTPS).
  • Disable the synchronization processes of your equipment by connecting only what is necessary when you use the public WiFi
  • Avoid logging into any service or website where you need to place your username and password. Avoid making banking transactions, online purchases or other tasks that involve exchanging sensitive data through this type of network.
  • After you have connected to a public WiFi network, it is convenient to delete from the memory of your devices the list of old SSIDs or public networks to which you have previously connected.  
  • It is essential that you have installed security solutions for your equipment, which can keep viruses and malware away. There are also other options for mobile devices that analyze the existence of possible connections, alert, and ask for confirmation when you want to connect to one of them.
  • Encrypt your files and avoid sharing sensitive information through such networks: In addition to adding security solutions to prevent any potential cyber attack, you should make sure your files do not reach unwanted hands. Using the HushApp Hushbox you can keep your files safe, as they will remain encrypted on your mobile device. You can also share your files with your contacts (even if they do not have the application) and they will remain protected, from the moment you send them until your recipients receive it.
  • Disable the automatic connection: Generally we have activated this option, to be able to search for a Wifi and thus avoid spending our data. It would be advisable to disable this option,  and make the connection manually to ensure that when you need to connect you can simply check if you meet the security measures mentioned above.

The criminals will take advantage of any small oversight to access your equipment and finally to your most private information. You must follow all possible security measures that you can take to avoid a cyber attack.

Filed Under: HushApp Tips Tagged With: confidential information, cyber attack, cybersecurity, HTTPS, HushApp, HushBox, network, public Wifi, VPN, Wifi, WPA, WPA2

Cybersecurity tools to improve the work of a private detective

July 11, 2018 by HushApp Team Leave a Comment

Cybersecurity tools to improve the work of a private detective

The work of a private detective is no longer as it was before. With the rise of information technology and, in turn, of cyber attacks, research professionals must employ cybersecurity tools that help their clients obtain and protect their information.

Beyond the typical image that the cinema sells about private detectives and their grand adventures, in their day to day they also carry out simple research work for companies, professionals and individuals. For all three, the level of confidentiality and sensitivity of the information they handle is quite high.

Suspicious behavior, false statements in an insurer, and robberies by fellow employees, are just some examples of cases that are handled daily by a company’s private detective. If these situations are not handled correctly, they can be discovered by a third party and have far reaching consequences from reputation to finances.

What a private detective needs today

The main thing a private detective needs is right skill and attitude to help their client make the right decision, even when cases are complex.

Being observant, meticulous, discreet, patient and having a strong ethical background, are undoubtedly fundamental when practicing this profession. The researcher must also be able to treat information as confidential, in addition to having knowledge of the laws and procedures associated with the protection of customer data. This is where it is very important to use the correct cybersecurity tools to manage of data.

Part of a detective’s job is to analyze people and evaluate the information obtained about them. This work should be reinforced with technological skills and the proper use of electronic equipment, taking into account that digital files may be vulnerable to possible cyber attacks.

Accuracy is an additional skill that a private detective must possess. Keeping detailed records of his work and protecting it is essential, especially when considering his work will generate a large number of reports and documents.

Most of the cases of private researchers require field work, that is, moving is part of their day to day. This makes it necessary to use technology to send information to their customers and securely store photographs or videos made with their mobile devices, among other things.

Cybersecurity tools to improve the work of the detective

There are basic tools for a private detective to perform their work effectively, such as: a computer, a mobile phone, a camera, etc. It is important that the technology is up to date, and that the information store within is protected.

Using encryption systems can be a great option when protecting the information of a case, both on the part of the detective and the client.

Applications such as HushApp can help private detectives protect the confidential information of clients in an easy and safe way. It allows the sending of encrypted files in an agile manner without requiring client having to register in the application.

A private detective, like other professionals who handle highly confidential information, must have certain special attitudes and abilities. Adding technology and the best tools will improve the effectiveness of their investigations for their clients.

Filed Under: Cybersecurity Business Tagged With: confidential information, cyber attacks, Cybersecurity tools, encrypted files, private detective

logo HushApp made in EU

HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.


Product
Features Pricing Android App iOS App coming soon Web App
Users
Book a demo FAQ Guide Support
Business
Hush for Business GDPR Use cases
About
About us Jobs Terms of Use Privacy Policy Legal
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy
Necessary Always Enabled