1. Photograph of a laptop computer from a eagles eye perspective. There are two hands covering part of the keyboard. The left hand is holding a phone displaying a shopping card icon with a lock inside, indicating safe and secure online shopping. The right hand is holding a credit card. The image represent safe online shopping and provides tips for secure online transactions.

    10 Tips for Safe Online Shopping

    Trillions of dollars are spent on online shopping each year while online scams and identity theft are on the rise. Here are ten tips to help you stay safe when shopping online.

  2. Why you should protect your emails

    Why You Should Protect Your Emails

    Email is still one of the most widely used forms of communication but it's not as safe as we think it is. Here are 4 reasons why you should protect your emails.

  3. A computer screen with a StartMail brand style illustration of a warning sign with the text “hacking attempt blocked!”.

    4 Steps to Prevent Your Email From Getting Hacked

    You may think you’ll never be hacked, but every 39 seconds, there is a new attack somewhere on the internet.  According to recent statistics, email is responsible for over 90% of all cyber threats. While this may sound alarming, changing just a few daily habits can significantly reduce the risks of your accounts being hacked.

  4. blogpost-image of binoculars reading a confidential email

    5 Tips to Keeping Your Email Private

    Email was one of the first modes of online communication, and arguably, the most successful. Even with the introduction of other messaging applications such as WhatsApp or Signal, the number of global email users has continued to steadily increase. In 2020, there were four billion users, and this is expected to grow to 4.6 billion by 2025. 

  5. blogpost-image of Jooble website with search field: Cybersecurity

    The Rise in Cybersecurity Jobs

    It seems as though new cyberattacks are reported every week. Since the pandemic began and companies were forced to move online, network security has been a paramount concern of both businesses and governments. It makes perfect sense, then, that hiring cybersecurity professionals has been a global focus and demand for cybersecurity professionals continues to rise.

  6. blogpost-image of the Egyptian statue of the great Sphinx of Giza with an 'I love privacy' sticker

    An Introduction to Cryptography History

    The history of cryptography can be traced down nearly 4,000 years ago with hieroglyphs in ancient Egypt. Although these inscriptions were not completely secret, they incorporated one of the essential elements of cryptography: a deliberate transformation of the writing. (Kahn, 1967) As the need for secrecy and privacy grew, cryptography became a political technology, where […]

  7. blogpost-image of a laptop screen being hooked by a fishing lure

    Quick Guide to Phishing

    It all starts with an email from something that appears to be from a trustworthy source designed to lure a victim. The message could look like a request from the bank, your Internet provider, or even the company you work for or follow. They usually contain a link to click or an attachment to download.

  8. blogpost-image of a desktop screen with the facebook logo and a lock

    Quick Guide to Social Media Privacy

    When used correctly, social media can be used for good; it can help promote business, build and maintain connections to family, friends, coworkers, and potential business associates, and provide endless hours of entertainment. By nature, social media sites are used to share user-generated content; it is central to the function of these sites. While this sharing may not necessarily be a bad thing, it is important to be aware of the privacy concerns.

  9. blogpost-image of a laptop displaying a facebook log in screen and a tumbs up icon

    Seventeen Years of Facebook

    Seventeen years ago, roommates Mark Zuckerberg, Eduardo Saverin, Andrew McCollum, Dustin Moskovitz and Chris Hughes published thefacebook.co. Nobody could have foreseen the impact this would bring, having today over 2.5 billion monthly active users worldwide.

  10. blogpost-image of a laptop displaying Privacy Policy and a checkmark

    Read Between the Privacy Policies Lines

    As a citizen of the 21st century, it’s most likely that you have browsed the Internet, shopped online, or even binged on a “television” series. If you have done any of these activities online, you probably have been asked to agree on Terms of Use and Privacy Policies.