1. The Rise in Cybersecurity Jobs

    It seems as though new cyberattacks are reported every week. Since the pandemic began and companies were forced to move online, network security has been a paramount concern of both businesses and governments. It makes perfect sense, then, that hiring cybersecurity professionals has been a global focus and demand for cybersecurity professionals continues to rise.

    Read more
  2. An Introduction to Cryptography History

    The history of cryptography can be traced down nearly 4,000 years ago with hieroglyphs in ancient Egypt. Although these inscriptions were not completely secret, they incorporated one of the essential elements of cryptography: a deliberate transformation of the writing. (Kahn, 1967) As the need for secrecy and privacy grew, cryptography became a political technology, where […]

    Read more
  3. Quick guide to phishing

    It all starts with an email from something that appears to be from a trustworthy source designed to lure a victim. The message could look like a request from the bank, your Internet provider, or even the company you work for or follow. They usually contain a link to click or an attachment to download.

    Read more
  4. Quick Guide to Social Media Privacy

    When used correctly, social media can be used for good; it can help promote business, build and maintain connections to family, friends, coworkers, and potential business associates, and provide endless hours of entertainment. By nature, social media sites are used to share user-generated content; it is central to the function of these sites. While this sharing may not necessarily be a bad thing, it is important to be aware of the privacy concerns.

    Read more
  5. Seventeen Years of Facebook

    Seventeen years ago, roommates Mark Zuckerberg, Eduardo Saverin, Andrew McCollum, Dustin Moskovitz and Chris Hughes published thefacebook.co. Nobody could have foreseen the impact this would bring, having today over 2.5 billion monthly active users worldwide.

    Read more
  6. Read between the privacy policies lines

    As a citizen of the 21st century, it’s most likely that you have browsed the Internet, shopped online, or even binged on a “television” series. If you have done any of these activities online, you probably have been asked to agree on Terms of Use and Privacy Policies.

    Read more
  7. Tips on creating a strong password

    Upper case, lower case, numbers, symbols, the tears of your enemies…a strong password creation sometimes requires thought and patience, and even though we have been using the internet for quite a while, most people still struggle with this task.

    Read more
  8. What is PGP Encryption? An inside look with Phil Zimmermann & Phil Dunkelberger

    PGP encryption is a critical security feature of StartMail’s email service – it scrambles the contents of your messages so that it can’t be read by anyone other than the sender and the intended recipient. And they really mean no one can read it, not even them! Though technologically complicated, they made it extremely user-friendly for StartMail users, ensuring that there are no obstacles to your email privacy.

    Read more
  9. New Year’s Online Safety Commandments

    If you are into privacy like we are, these online privacy commandments are for you! Plus they’re way easier and more fulfilling than diets and excercise!

    Read more
  10. Things we love about StartMail

    We, as StartMail employees, are also StartMail users, which helps us understand our product in the best way possible and adapt it into something functional and practical for our daily activities

    Read more