• Skip to content
logo logo
  • Blog
Login SIGNUP

HushApp

Encrypting files: What kind of information should your company protect?

June 12, 2019 by HushApp Team

Encrypting files: What kind of information should your company protect?

Every time it becomes more common to hear that a company must pay a fine for not complying with data protection regulations in Europe in particular, the GDPR has become one of the major concerns of organizations. It is clear that data should be protected, the question is, what should we protect? And also, why encrypting files is the best way to protect your company?

Frauds, phishing, cyber attacks, data leaks, malware, among others, are terms that are becoming increasingly common; they are attacks to which any company or person is exposed to suffer at any time. To understand the consequences of this type of attack, you have to understand the causes of the problem, the information that the company deals with and how it is handled.

Personal data and privacy

Although it is not the only information that a company should protect, it can be considered the most valuable and at the same time vulnerable data that an organization manages. It is about everything that concerns the identity of a person, whether public or private, and each one decides whether it can be shared or not.

Everything that refers to personal data such as: contact data, physical characteristics, data related to your assets, biometric information, professional training, including ideological information, sexual life or ethnic origin, among others, refers to information that if reach the wrong hands, It could affect their reputation or safety.

It is not only about personal information but also about confidential information of the company that is also susceptible to a security breach and could cause serious financial problems.

What should be done with the information obtained?

It is the responsibility of the company to safeguard the integrity of the people from whom it handles such information. This refers to any type of action taken with these data: the way it is collected, processed, stored, transferred or even destroyed.

Therefore, the procedure should be:

  • Know the type of information handled.
  • Classify it according to its value, if it should be public, private and above all, who will have access or not.
  • Identify which are the possible threats and the possible consequences.
  • Apply the necessary tools for the protection of information, especially the most confidential one. In this step is where encrypting files is useful.

Encrypting files: Classification and examples of information that must be protected

Some examples of information that must be protected with encryption systems can be:

– Company files: sensitive data for the company such as business secrets, bank documents, including passwords that give access to confidential documents, corporate devices, credit cards, market studies, etc.

In the case of personal files could involve employees, customers or any other person related to the company. Some examples include:

– Employee files: personal data of employees (such as those mentioned above), identification documents, medical reports, etc.

– Client files: Identification documents, payment data, contact data, among others.

In the case of clients, it is important to understand the obligation to protect the data they are offering and should be used only for the purpose they decided. Therefore, if you are requesting a client’s email to subscribe to the company’s newsletter, it should be used only for that and not for other purposes. For example, to promote other products of another company, since this can be sanctioned in many countries.

Why encrypt the files?

Encrypting your files can be one of the best options to protect the sensitive information of a company. Nowadays, the most used and effective method to protect your data is an encryption system, in which you can secure that information is completely protected.

It is important to highlight the level of security offered by an encryption system. It is a much more powerful tool than a password since they only protect access. Encryption protects data directly, making it impossible to see the contents of files.

Encrypting files easily with HushApp

To comply with all data protection regulations that each country requires, it is important to use the appropriate security tools.

That’s why we introduce you the HushApp. It is a safe alternative to other file submission services, since it facilitates the daily protection of company data and helps safeguard your customer’s sensitive information.

How? Implementing high-level encryption methods in a simple and transparent way for the user without affecting the efficiency of business processes. Security, usability and a good user experience are all our priorities.

Using HushApp you will have the opportunity to offer additional value to your customers, protect your own confidential information and allow your work team to perform easily and safely actions.

We invite to try HushApp …

Filed Under: Cybersecurity Business Tagged With: confidential files, cybersecurity, data protection, encrypting, encryption, GDPR, HushApp, personal data, privacy

Cybersecurity for remote workers: benefits, risks and how to solve them

May 3, 2019 by HushApp Team

Cybersecurity for remote workers: benefits, risks and how to solve them

Remote workers are already a business reality, and all companies should know how to manage them. Undoubtedly, this way of work brings benefits for both parties: the employee earns labor flexibility, and the employer can save on expenses that require having more employees.

The statistics confirm these benefits, according to a study carried out by the cybersecurity company OpenVPN, in which 250 IT managers were interviewed, 82% claim to have less stress working in this way, and 30% acknowledge that it allows them to do more work in less time.

Despite the benefits that the home office brings, this method has its disadvantages and can be very dangerous. 90% of IT managers recognize that having remote workers can be a risk to the security of the company. Furthermore, 54% consider that they represent a greater security risk than employees who work in the company itself. Even more alarming, 36% of organizations admit that they have suffered a security incident due to the actions of a remote worker.

It is possible to continue maintaining the benefits that home office brings us in a secure way, as long as the company follows some cybersecurity measures.

Cybersecurity measures for companies with remote workers

1) As with all IT security issues, the main thing is to know the risks to which they are exposed. Therefore, education in cybersecurity for employees should be fundamental, especially for remote workers and it should be part of the corporate culture.

Security policies must be established that clearly explain to employees how to handle sensitive information, especially those that are not within the workplace.

2) Establish basic measures of information security: using VPN, which will also allow the company to monitor who is connected, from where and what they have done. Teaching employees to use strong passwords or avoid using public Wi-Fi networks while they are connected from company devices. in case they have to, following the necessary security measures.

3) Classify the information that requires most protection: the company should review what type of information is accessible according to the profile of the worker, and if it is really necessary to have permission to modify it or it is enough to be allowed to view it.

4) Control devices that store sensitive information: the company must restrict access to information from devices that do not have the security tools established for their protection.

5) Install and maintain updated security solutions on all devices, in order to protect the company from possible malware or other types of cyber threats.

6) It is also important to avoid using computers or personal devices inside or outside the company since these are not controlled by the established security measures.

7) It is advisable to use remote desktops since it allows the employee to connect directly with the company’s servers.

8) Of course, all sensitive information must remain encrypted, this adds a layer of greater security and prevents a possible data leak, even when sharing it with remote workers, customers, suppliers, etc.

That’s why HushApp is the ideal option to manage communication with remote workers, it is a tool that allows you to share files in an easy and totally secure way, even without it being necessary to sign up in the application. It does not require installation since you can access it through its website or through the Android app.

HushApp is thinking to facilitate teamwork protecting the sensitive information of companies.

 

We invite you to try HushApp …

Filed Under: HushApp Tips Tagged With: cyberattack, cybersecurity, data leak, encryption, HushApp, information security, IT, Remote workers, VPN

We have news in HushApp that we want to tell you!

April 17, 2019 by HushApp Team

We have news in HushApp that we want to tell you!

We have news in HushApp! Yes, because every day we work hard to make your experience better and better, so we decided to take this space to tell you about all the improvements we have made to our web version until today.

We are constantly changing, always looking for HushApp to be easy to use and at the same time secure enough to protect the privacy of your files. That’s why our team is committed to making this app as user-friendly as possible and our mission is to keep your information safe.

What’s the news in HushApp?

Here is a summary of what we have improved for you …

  • Some changes in the transfer process: as part of the progress in the user experience, we have improved this functionality, since it is one of the most features of the app. Now the send button is active from the moment you add a file. If you click on it, it will validate the recipients and show you some warnings and indications in case they are necessary, so you know at all times what you have to do.
  • Messages at the beginning and at the end of the encryption process: When you make a transfer, a message will appear at the beginning and at the end of the process, indicating the number of files you are sending and the number of recipients that you chose. A way to better visualize what you send and who you send it to.
  • We improved the password field to transfer to unregistered users: As you know, in Hushapp you can send your files even to people who do not use the application and are still protected. To do this, you must create a password and send them by other means, so that they can receive your files securely. We have facilitated this process in several aspects:
  • Now you can see an information button, which opens a drop-down and explains what you should do when you send a message to unregistered users.
  • We also have a more descriptive placeholder, so you know where and what you should enter in this field.
  • We also added an eye icon that allows you to hide or show the password, so you can see what you write, if you are in a secure environment.
  • The history of transfers received shows you the expiration of each transfer: now you know how much time you have left to download the files that were sent to you.
  • The clickable area to add files to a transfer: A larger space to click and add your files, which makes the sending process faster and easier.
  • Improvements for companies and work teams: On this issue, at Hushapp we are working hard to improve the experience for work teams. One of the improvements is now you can send a reminder to a colleague to complete the registration process.

To explain it in simpler words, if in a company all employees use HushApp and someone tries to send a file to a colleague who has not yet completed the registration process, HushApp will send a reminder to them to activate their account, thus they will be able to receive the files in a secure way.

Take a look at our web version and feel free to leave comments on what you think about this news in HushApp!

Filed Under: HushApp News, Sin categorizar Tagged With: cybersecurity, encryption, HushApp, password, send files, send files securely, Syneidis

Ransomware: What your company needs to know to prevent and combat them

March 22, 2019 by HushApp Team

Ransomware: What your company needs to know to prevent and combat them

Have you ever heard about the Ransomware? Surely you have heard about them in your workplace and also how dangerous they can be. More than a computer technician can tremble only to hear the word, and no wonder, since it is considered one of the most dangerous malwares that exist today. Why? Here we explain it to you.

What is a Ransomware and how does it work?

It is a kind of digital hijacking with a type of malware that blocks users from accessing their system or files, and the only way to access them again is through a rescue requested by cybercriminals.                                                                                                        

This type of malicious software has existed since the 80s, and in its early days, they demanded rescues via postal mail, nowadays the payments work through cryptocurrencies or credit cards.

Their way of operating is usually through malicious spam, which can appear as advertising or email with infected attachments and often deceive users by posing as recognized institutions (for example the FBI) to click on their contents.

Once it arrives on the system, the ransomware contacts the central server to obtain the information it needs to activate, there it can block or encrypt the files, and thus indicate the rescue instructions.

Generally, cybercriminals threaten to erase information or raise the price of rescue if it is not paid in the estimated time. The ransomware can affect any type of operating system: Windows, Mac or Linux.

Types of Ransomware according to its complexity:

Scareware: Despite the fact it seems dangerous nevertheless it is less fearsome. It generally uses pop-up messages from “supposed” fake security programs or a false offer of technical support reporting that a malware has been “detected” and that the only way to get rid of it is to pay. If the payment is not made, it will continue to issue pop-up messages, however the files are not affected.

Screen blockers: In this case, the malware is more complex because it blocks the computer screen, preventing its use completely. The files are there but there is no way to access them, unless the computer is restored, which will lose all the information you have if there is no previous backup.

Encryption Ransomware: It is the most dangerous of all and, therefore, the most known, as it steals the files and the numbers, demanding a payment to re-decrypt and return them. By using encryption, it is impossible for a common security or restore software to return these files, unless the ransom is paid, which will not guarantee that the cybercriminal will return them.

Some prevention tips against Ransomware:

  1. Start by using (and updating) an antimalware, which includes firewalls.
  2. Update the system and all applications for any operating system, Mac, Windows or Linux.
  3. You can add a specific anti-ransom tool for this type of attack.
  4. Use antispam filters where these malwares usually arrive.
  5. There are applications that block the execution of some suspicious JavaScript code that could be harmful to the computer. If you install any, you can minimize the risk of infection through the web.
  6. Review the extensions of the files, to identify files that are passed by others (for example if you see a Word file with the extension .exe)
  7. Administrator accounts are the most sought after by hackers, they know they are those who have greater access to the system. That is why it is recommended to do daily tasks in other accounts and use administrator account only for system manipulations.
  8. Limit network access to sensitive files in terms of editing, share them so they can be read and give permission to edit only to those who need it.
  9. Make backups and save and keep the most sensitive information handly in secure applications such as Hushapp.

After the attack:

If, unfortunately, you were already a victim of a Ransomware, the first thing you should do is to keep calm, avoid as much as possible to pay, this will not ensure anything, and finally, follow these steps:

  • Disconnect the internet device quickly before the malware can access the server. Isolates the device from all the rest of the network.
  • Some large cybersecurity firms offer free solutions such as web pages and software to decipher ransomware and search for solutions to damages.
  • The idea is to call the relevant authorities so they can help.

Cyber attacks by Ransomware are increasingly sophisticated and can cause large losses to companies (and also to people). Therefore, it is important to take all necessary preventive measures to protect sensitive information of the company.

Filed Under: Cybersecurity Business Tagged With: ciberattack, hacker, hackers, HushApp, malicious software, malware, pishing, Ransonware, spam, virus

Love vs cybersecurity: How to use dating apps and protect your privacy?

March 7, 2019 by HushApp Team

Love vs cybersecurity: How to use dating apps and protect your privacy?

Are you looking for love? Or rather an adventure? Whatever your preferences you surely want to take advantage of a large number of apps that exist in the market to facilitate or improve your search for the right person. Nowadays you can look for someone because of their tastes, their location, or whatever. The question is how secure are these dating apps? Can you protect your privacy enough by using them?

Like almost everything in the digital and interconnected world, these dating apps are also vulnerable to cyber attacks, and many people have suffered consequences, either because they have leaked files of their intimate life that have been exchanged through these applications, or worse, have been the victim of some fraud or criminals that are not the people who claim to be in these apps. So, how to balance your love or sexual life without endangering your security or privacy?

We do not want you to stay single for fear of being victim to an attack like these. If you follow some security measures in the digital or physical world, you can reduce the chances that your information will be used for other purposes than what you are looking for.

Advantages and disadvantages of dating apps and how to use them safely

  1. The duality between privacy and the veracity of information: One of the main problems that arise in these dating applications is knowing if the person is really who they say they are. Some of these apps allow users to register with Facebook, place work or study site, so this could allow the other person to see if this person, in a certain way, is “real”. The counterpart: the person being investigated, how can we know if they are really looking for an “appointment”? Our advice: limit information about yourself on the Internet to the one you want others to know about you, and with whom you want them to know about you, then you can introduce yourself as you like.
  2. The ideal, in this case, is to have common sense and not to share personal information immediately, as well as it is advisable to have the first dates in public places. Moreover not to give money: it is important to note that there are even people who have been victims of fraud, where their alleged “dates” have asked for money and for some reason there are those who have agreed.
  3. Another common feature of these applications is that they allow you to locate a person close to you, thanks to geolocation, there are also much more accurate, as they indicate how many times you have crossed with that person. It can be an advantage if you want to look for someone in your area, but also it is a disadvantage due to the fact that you are making it clear where you are, and even worse if you indicate each step you take. It is preferable to opt for applications that do not use this modality, which would only allow users to communicate directly so that they define where to find each other. Although it is not so exact, you have the power to determine where and when you want to meet that person.
  4. Secure communications: The problem with many of these dating apps is that they do not have secure communication channels between their users, and therefore they are victims of data leakage. When choosing the application, take into account that your app use encryption in your system to protect the privacy of its users.

For your part, add all the necessary layers of protection, connect to secure networks, use a VPN and an antivirus to protect the device you use.

Protect these photos that should not be exposed for any reason 🔥😈 using HushApp, there you can keep them protected in your Hushbox, without anyone else but you can access them, or sending it to your date in an easy and completely safe way. Nobody who you do not want can be able to access your privacy.

In HushApp we do not want to know about your private life, we want to help you to protect it.

We invite you to try Hushapp …

Filed Under: HushApp Tips Tagged With: ciberattack, cibersecurity, data breach, HushApp, HushBox, privacy, private life, Tags: dating apps

5 reasons why Hushapp can be useful if you are freelance

January 16, 2019 by HushApp Team

5 reasons why Hushapp can be useful if you are freelance

We have mentioned before how useful Hushapp for your day to day can be. Now, we want to dedicate this space for freelancers, those people who work in the creative world: designers, photographers, editors, copywriters and other professionals who use their creativity for their daily work. Here we give you 5 reasons to use Hushapp if you are a freelance.

We know how difficult it is to be a freelancer today, plus add the fact that you must protect your files, there are several possible scenarios that you must consider: that they get into the hands of some disloyal agency that takes advantage of your work, or to become a victim of some malware because you forgot to update the antivirus, and even worse, the confidential data of your clients is leaked.

Do not suffer anymore! With Hushapp you can streamline your work and at the same time add the necessary protection for your files.

Here are 6 reasons to make you feel safer using Hushapp as a freelance:

  1. Protect the intellectual property of your creation: we know that as a creator, one of your main concerns is that your work is  copied or used without your permission. Keep your work protected in the Hushbox of your mobile device and access them easily and safely. 
    Encryption is easy with HushApp!
    DOWNLOAD
  2. Send your protected files to customers: Within the creative process it is common to make different transfers to your customers, they will be approving or asking for modifications all throughout the creative process which must be protected from the beginning of the conception of the idea, to the final work. With the end-to-end encryption we use in Hushapp, you can share as many times as you want safely, even with those customers who do not have the application, as they will remain protected.
  3. Use the best technology to protect your files: Technology advances in leaps and bounds, and as a freelance you must be up to date with all the necessary technological tools to optimize your work to facilitate daily actions such as sending files to your clients in a safe way.There is no need for complex computer programs to protect your information, which will only take away more time than you need for your work. With Hushapp you have the ideal combination of usability and protection for your files, since we use military-grade encryption standards (AES-256 and RSA-2048) to protect your files and it is also very easy to use.
  4. Zero knowledge technology: To further strengthen the protection of your creations, we use zero knowledge technology, so us from Hushapp have no way of knowing anything about your private information: we can not access your files or your passwords.
  5. Work from home safely: As a freelance you do not have a schedule, you work countless hours from the office, from home, or even a local coffee shop. Feel safe by sharing the files you need from where you are using Hushapp.

We want to make your work easy and safe.

We invite you to try Hushapp …

Filed Under: HushApp News Tagged With: copywriters, creative process, designers, editors, encryption, freelance, freelancers, HushApp, intellectual property, photographers, zero knowledge technology

10 tips to avoid being a victim of a spyware

December 4, 2018 by HushApp Team

10 tips to avoid being a victim of a spyware

Did you know that there are applications that allow you to spy on your mobile devices? Yes, they are called spyware or software to spy on devices. They are applications that can be downloaded by anyone for free with a simple search on the Internet. All you need to do is simply install it on your victim’s device and begin spying!

The capability of these applications might be shocking to learn. They can access all the conversations that are carried out by WhatsApp or other social media, intervene the microphone of your device, know the geolocation, and even activate remote camera to see what happens around the phone at all times.

Imagine a scenario where a guy gives his girlfriend a cell phone, but without informing her, installed a spy application. Through this spyware they can monitor all online activity without the user being aware. Despite this being an extreme example,  in general, people should be aware of their privacy and understand how easily it can be compromised

These types of applications are usually offered to parents to “monitor” their children’s mobile devices, or for a boss who wants to monitor employees. This can undoubtedly generate a great debate regarding privacy.

The only thing we can do is protect our devices from these type of applications, and here we explain how.

How to avoid being spied on with spyware applications?

  1. There are simple signals that can alert you if something strange happens on your cell phone. One of them is the performance of your battery, although it can be due to many causes, if you detect an unusual battery consumption, it is possible that there is an app of this type.
  2. Check the list of applications, if there is any unknown, You can uninstall if you do not need it.
  3. Do not lend your cell phone to strangers, although it seems obvious, it needs to be said. A spyware can be installed very quickly and silently.
  4. One of the easiest and most effective ways is to install anti-spyware applications, these will allow you to detect if the device has installed malicious software. You can also install an antivirus, some computers already come with anti-spyware installed.
  5. Only install applications that come from official stores.
  6. If you already have the suspicion that you are being spied on and you have not managed to eliminate the spyware, a preventive measure is to have the device in airplane mode which will cancel any type of connection to the outside.
  7. Avoid using public Wi-fi: These are an open door for an intruder to access your information. If you need to, here are ways to use a public network more securely.
  8. Check the permission you are giving to each application: Check what permission you give to each application, and if you really need access to the camera or microphone.
  9. If after you have performed all the previous actions you still have suspicions that you are being spied on, you can restore the phone to the factory state.
  10. If the situation is already delicate enough, it will be necessary to report the incident to the police.

Avoid spies of flesh and blood

Even when we apply all security measures to protect your mobile devices, there will always be “spies of flesh and blood”, those who like to take a look (without permission) and review the information in your cell phone. And for this type of spy there is no anti-spy app or sanction.

But if you can make their life more difficult in a very simple way, add and combine more complex authentication patterns, use the actions that are recorded in the device’s sensors as fingerprint or facial recognitions, among other things that hinder access from an intruder trying to spy on your device.

Finally, encrypt your files, keep them safe in applications such as HushApp, so you can access and view the contents on your cell phone. Your files will remain protected within your HushBox.  

Filed Under: HushApp Tips Tagged With: anti-virus, applications, cybersecurity, encryption, HushApp, mobile devices, spy, spyware

8 reasons why you should use HushApp in your day to day

November 27, 2018 by HushApp Team

8 reasons why you should use HushApp in your day to day

We have talked a lot about Hushapp and how it can help you in different aspects of your work. Now we want to show you that our application not only serves for labor issues, it can also be present in your day to day activities to add more protection and security to your digital life in a very simple way. Therefore, here are 8 very simple examples of how you can use HushApp in your everyday.

Basic uses: easy and safe

  1. Every day we accumulate more and more information, and need to find a safe place to store it. With HushApp this problem is easily solved because you can store data on your mobile device, keeping it handy and protected. HushApp easily secures all your files with important information, such as bank data, passwords, personal documents, etc. If you need to send a file to someone, you can do it from the app and they will be protected from the time you send them until your recipients receive it.  
  2. It is not only about protecting what we commonly consider confidential information, in HushApp you can store and send any type of file including photographs, videos, audio, etc. Remember that cyber attacks are becoming increasingly popular and anyone can be a victim. Suppose you lose your phone, if someone unwanted manages to access your device, they can not see anything within your HushBox, so your personal memories will be safe.

HushApp to protect your family:

  1. If we talk about photographs and privacy, surely the first thing that comes to mind are your precious family pictures. It is very common for parents to share those special moments with their little ones in social media for their birthdays, their first steps, when they said their first words and many more things. The issue lies in who can access the image of your kids, and what could they do with those files. When children have access to the internet, the danger is greater, since criminals take advantage of their innocence, they could contact them. Do not neglect yourself! Take charge and keep your minors safe by using safer alternatives like Hushapp to share these special moments.
  2. Children are getting smarter every day and frequently learning new ways to accessing your device. To prevent your children from accessing important files (for example your work documents and deleting them by mistake), keep them safe in your Hushbox and this will not cause you a unneeded headache with your boss 🙂
  3. As you take care of your children, you also can take care of your friends and aditional family, by capturing those special moments. Your Christmas photos, photographs, memories, etc. everything you can store and share with them (even if they do not have the application) is easily secured.

We do not want to know about your private life, we just want to protect it:

  1. Let’s be honest, everyone has secrets that they desire to be kept hidden. We are not all saints and we have a dark side, whatever it is, nobody can force you to expose your privacy. At HushApp we want to protect your private life, regardless what you do, because we have no way of knowing. We use zero knowledge technology therefore we can not access your files or your passwords.

Facilitate your work from home: 

  1. As mentioned previously, HushApp is clearly not just a business tool, however for the many times work does accompany us home, 
    Encryption is easy with HushApp!
    DOWNLOAD
    you might be asked to send documents to customers or suppliers. Or maybe you forgot something and decided to finish it out of the office. Or even you might be self-employed and work from home. HushApp is there to accompany you at all times. 
  2. If you are a fan of technology, and want to be at the forefront of everything that is the digital world, do not get stuck in the past. It is no longer necessary to have complex programs that only computers know how to use. Hushapp uses military grade encryption and even with such a complex system it remains super easy to use!

Encryption is easy …

We invite you to try Hushapp …

Filed Under: HushApp News Tagged With: encryption, HushApp, privacy, secure send files, send documents, send files, send files securely, share documents., share files, share files securely

What is a VPN connection and why should you use it on your devices?

November 20, 2018 by HushApp Team

What is a VPN connection and why should you use it on your devices?

VPN connections are becoming increasingly popular, they are no longer tools only used  in the business world, now, many people concerned about their security have begun to use this type of connection to protect themselves from cyber attacks. What is a VPN connection and what can it do for you?  

A Virtual Private Network, is a type of network in which an extension of a private network is created for access to the Internet. To explain it in a simple way, it could be said that it is an “invisible cable” that joins the user with another location, this cable is called a “tunnel”, and it is the channel where the information will travel when encrypted.

How does it work?

Normally when you connect to the internet, you do it with your service provider which will take you to the website you want to visit, but this information always goes your provider’s servers who have access to this information.

The VPN will allow you to connect with an encrypted connection, so the data you view can not be seen or decrypted by your provider, in this case it will appear that the VPN is the one that is connected to those sites, not your device.

Types of VPN networks

There are two types of VPN networks: client-based and network-based.

– Client-based VPN: Allows the user to connect to a remote network through an application. They create a username and password, next an encrypted channel is automatically created between the computer and the network, where the data exchange is executed.

– Network-based VPN: It allows the user to connect different networks to each other through the Internet. This type of VPN network is used by companies that have offices in different cities and parts of the world, in order to connect with each other and share information in a secure way.

Advantages of using it:

  1. You can access your company’s network safely if you are traveling, for example if you are at home you can see the company’s shared files from your device safely.
  2. With the VPN you can hide and protect your data because the data travelling is encrypted, therefore there will be no way to track your activity. It is ideal when you need to make a banking transaction where sensitive data is  handled. This option is the reason why it is recommended to have a VPN when it is necessary to connect to a public Wifi.
  3. Avoid censorship and geographic blocking: In many countries restrictions are placed on Internet information. It is possible that a web page only allows access if you are browsing from a particular country, and if you are not there you can not visit the site. With a VPN hosted in that country, it will appear that you are browsing from the same place where the website is located, so you can access the content without any problem. Similarly, if in the country where you are there are censored pages, you can connect to the VPN of another country to access that information.
  4. It works for all applications and websites, since it directs all internet traffic through its own channel.

Not everything that shines is gold …

Certainly the VPN network adds a layer of security that gives greater protection to your Internet connection, however, not everything that shines is gold. While browsing with a VPN, your browsing data remains incognito for your provider, but not for the company that manages the VPN.

Therefore you should not trust the security of your information only to this type of connection because if you fall into a dishonest company, they could keep records of your information or even sell it to the highest bidder. Therefore, the ideal action is to select the a VPN with the best reputation on the market.

There are many types of VPN connections on the web, while some are free others payment. To choose the proper one, it is important to take into account the speed, reliability and security offered by the service.  

Add more security to your files

No system is foolproof, the only thing you can do is add additional security layers to further protect your information. You can use other applications such as Hushapp when you want to share important documents through the internet. This application allows you to protect each file individually and easily. We also work with Zero Knowledge Technology, so we have no way to know your information or your passwords.

We invite you to try Hushapp …

Filed Under: HushApp Tips Tagged With: encryption, geographic blocking, HushApp, public Wifi, Virtual Private Network., VPN, VPN connection, VPN network, zero knowledge technology

How to use a public WiFi without compromising your security

November 6, 2018 by HushApp Team

How to use a public WiFi without compromising your security

One of the basic measures to protect yourself from a cyber attack is to avoid connecting to public networks. Often times they lack security whatsoever and can be an open door for cyber attackers. However, sometimes there is no choice but to connect to a public WiFi, in that case, you can take some precautionary measures that will allow you to navigate in a more secure way with this type of connection.

10 Tips for using public WiFi securely

  • Make sure you connect to networks with WPA security or WP2, avoid networks with WEP security, as they are not secure enough.
  • Use a VPN: If possible use a virtual private network (Virtual Private Network), so the IP address of your devices will be hidden from the websites you visit, your browsing is completely anonymous. Web traffic is also encrypted, which means that even your Internet service provider can not see your activity online.
  • Keep all the software and applications on your devices and mobile devices updated.
  • Always try to navigate through secure pages, where data travels encrypted (with the URL that starts in HTTPS).
  • Disable the synchronization processes of your equipment by connecting only what is necessary when you use the public WiFi
  • Avoid logging into any service or website where you need to place your username and password. Avoid making banking transactions, online purchases or other tasks that involve exchanging sensitive data through this type of network.
  • After you have connected to a public WiFi network, it is convenient to delete from the memory of your devices the list of old SSIDs or public networks to which you have previously connected.  
  • It is essential that you have installed security solutions for your equipment, which can keep viruses and malware away. There are also other options for mobile devices that analyze the existence of possible connections, alert, and ask for confirmation when you want to connect to one of them.
  • Encrypt your files and avoid sharing sensitive information through such networks: In addition to adding security solutions to prevent any potential cyber attack, you should make sure your files do not reach unwanted hands. Using the HushApp Hushbox you can keep your files safe, as they will remain encrypted on your mobile device. You can also share your files with your contacts (even if they do not have the application) and they will remain protected, from the moment you send them until your recipients receive it.
  • Disable the automatic connection: Generally we have activated this option, to be able to search for a Wifi and thus avoid spending our data. It would be advisable to disable this option,  and make the connection manually to ensure that when you need to connect you can simply check if you meet the security measures mentioned above.

The criminals will take advantage of any small oversight to access your equipment and finally to your most private information. You must follow all possible security measures that you can take to avoid a cyber attack.

Filed Under: HushApp Tips Tagged With: confidential information, cyber attack, cybersecurity, HTTPS, HushApp, HushBox, network, public Wifi, VPN, Wifi, WPA, WPA2

  • Page 1
  • Page 2
  • Page 3
  • Next Page »
logo HushApp made in EU

HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.


Product
Features Pricing Android App iOS App coming soon Web App
Users
Book a demo FAQ Guide Support
Business
Hush for Business GDPR Use cases
About
About us Jobs Terms of Use Privacy Policy Legal
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy
Necessary Always Enabled