1. blogpost-image of Jooble website with search field: Cybersecurity

    The Rise in Cybersecurity Jobs

    It seems as though new cyberattacks are reported every week. Since the pandemic began and companies were forced to move online, network security has been a paramount concern of both businesses and governments. It makes perfect sense, then, that hiring cybersecurity professionals has been a global focus and demand for cybersecurity professionals continues to rise.

  2. blogpost-image of a laptop displaying StartMail's release notes

    Release Notes November 2021

    What's new? Join our team! As StartMail and its customer base are growing, so is the StartMail team! We are currently searching for candidates that fit different positions which include a Content and Community Coordinator [...]

  3. blogpost-image of a laptop displaying StartMail's release notes

    Release Notes October 2021

    We hope you are all doing well! Here you can find an overview of the new features and bug fixes for 
    the month of October. What´s new? Come join our team! As StartMail and its customer base are growing, so is the StartMail team! [...]

  4. blogpost-image of a laptop displaying StartMail's release notes

    Release Notes July 2021

    Welcome to this month’s release notes! Below you’ll find the latest product improvements and news. We wish everyone a happy (and healthy) summer holidays! What’s New Performance Optimization We upgraded our servers backed by faster storage, which reduces overall latency with any content in your inbox by approximately 30%! This results in an overall enhanced […]

  5. blogpost-image of a laptop displaying StartMail's release notes

    Release Notes June 2021

    Welcome to this month’s release notes! Below you’ll find the latest product improvements and news. What’s New Promotional Partners We are on a mission to empower people to take back their online privacy. StartMail would like to say thank you to our promotional partners that have helped us spread the word about StartMail, and how […]

  6. blogpost-image of a laptop displaying StartMail's release notes

    Release Notes May 2021

    Welcome to this month’s release notes! Below you’ll find the latest product improvements and news. What’s New Improved Sign-up Flow: Recovery Code It can occur that you either forget or lose your account password. To ensure you don’t lose all access when this happens, we added an additional recovery method for you: the recovery code. […]

  7. blogpost-image of a laptop displaying StartMail's release notes

    Release Notes April 2021

    Welcome to this month’s release notes! Below you’ll find the latest product improvements and news. What’s New Reskin After listening to your suggestions on how to improve your StartMail experience, we are happy to announce that we implemented the full reskin! This includes a new design with tool tips that will guide you and provide […]

  8. blogpost-image of a laptop displaying StartMail's release notes

    Release Notes March 2021

    There’s no better way to kick off spring, than with some product updates. Below you’ll find the latest product improvements, promos, and news. What’s New HTTP/2 & TLS 1.3 support We now support HTTP/2 reducing bandwidth usage to make your webmail service faster & TLS 1.3 helping protect your account from attacks and the use […]

  9. blogpost-image of the Egyptian statue of the great Sphinx of Giza with an 'I love privacy' sticker

    An Introduction to Cryptography History

    The history of cryptography can be traced down nearly 4,000 years ago with hieroglyphs in ancient Egypt. Although these inscriptions were not completely secret, they incorporated one of the essential elements of cryptography: a deliberate transformation of the writing. (Kahn, 1967) As the need for secrecy and privacy grew, cryptography became a political technology, where […]

  10. blogpost-image of a laptop screen being hooked by a fishing lure

    Quick Guide to Phishing

    It all starts with an email from something that appears to be from a trustworthy source designed to lure a victim. The message could look like a request from the bank, your Internet provider, or even the company you work for or follow. They usually contain a link to click or an attachment to download.