• Skip to content
logo logo
  • Blog
Login SIGNUP

VPN

Cybersecurity for remote workers: benefits, risks and how to solve them

May 3, 2019 by HushApp Team

Cybersecurity for remote workers: benefits, risks and how to solve them

Remote workers are already a business reality, and all companies should know how to manage them. Undoubtedly, this way of work brings benefits for both parties: the employee earns labor flexibility, and the employer can save on expenses that require having more employees.

The statistics confirm these benefits, according to a study carried out by the cybersecurity company OpenVPN, in which 250 IT managers were interviewed, 82% claim to have less stress working in this way, and 30% acknowledge that it allows them to do more work in less time.

Despite the benefits that the home office brings, this method has its disadvantages and can be very dangerous. 90% of IT managers recognize that having remote workers can be a risk to the security of the company. Furthermore, 54% consider that they represent a greater security risk than employees who work in the company itself. Even more alarming, 36% of organizations admit that they have suffered a security incident due to the actions of a remote worker.

It is possible to continue maintaining the benefits that home office brings us in a secure way, as long as the company follows some cybersecurity measures.

Cybersecurity measures for companies with remote workers

1) As with all IT security issues, the main thing is to know the risks to which they are exposed. Therefore, education in cybersecurity for employees should be fundamental, especially for remote workers and it should be part of the corporate culture.

Security policies must be established that clearly explain to employees how to handle sensitive information, especially those that are not within the workplace.

2) Establish basic measures of information security: using VPN, which will also allow the company to monitor who is connected, from where and what they have done. Teaching employees to use strong passwords or avoid using public Wi-Fi networks while they are connected from company devices. in case they have to, following the necessary security measures.

3) Classify the information that requires most protection: the company should review what type of information is accessible according to the profile of the worker, and if it is really necessary to have permission to modify it or it is enough to be allowed to view it.

4) Control devices that store sensitive information: the company must restrict access to information from devices that do not have the security tools established for their protection.

5) Install and maintain updated security solutions on all devices, in order to protect the company from possible malware or other types of cyber threats.

6) It is also important to avoid using computers or personal devices inside or outside the company since these are not controlled by the established security measures.

7) It is advisable to use remote desktops since it allows the employee to connect directly with the company’s servers.

8) Of course, all sensitive information must remain encrypted, this adds a layer of greater security and prevents a possible data leak, even when sharing it with remote workers, customers, suppliers, etc.

That’s why HushApp is the ideal option to manage communication with remote workers, it is a tool that allows you to share files in an easy and totally secure way, even without it being necessary to sign up in the application. It does not require installation since you can access it through its website or through the Android app.

HushApp is thinking to facilitate teamwork protecting the sensitive information of companies.

 

We invite you to try HushApp …

Filed Under: HushApp Tips Tagged With: cyberattack, cybersecurity, data leak, encryption, HushApp, information security, IT, Remote workers, VPN

How to protect your privacy from spies in electronic devices

February 20, 2019 by HushApp Team

How to protect your privacy from spies in electronic devices

When we talk about spies you probably think about typical movie characters who take photos secretly from afar, but the reality is different. Spies can be very close to you, in your electronic devices which you use daily. The internet of things has come to solve many of our day-to-day activities, the problem is that any device connected to the Internet, no matter how harmless it may seem, can be an open window to access your information. So, how to protect your privacy from spies? protecting your information does not only have to do with installing an antivirus on your computer or mobile when even your smart refrigerator could also be vulnerable to a data leak.

It’s not just about protecting your information from potential hackers or cybercriminals, but from companies that want to obtain your data and then offer you products in a personalized way, without your consent.

Televisions, refrigerators, lamps, thermostats, voice assistants such as Alexa or Siri, and an endless number of appliances that need to be connected to the Internet, collect your personal information, use cameras or information from your home to work properly.

Tips to protect your privacy in technology and on the internet

  1. Let’s start with the basics: it is essential to read the terms and conditions of each service that we use, although they may seem long and incomprehensible, it is the only way to know what type of data the device collects and how it uses it.
  2. The most common victim of a spy is on mobile devices, through Spyware, but do not worry, there are always ways to control them, and here you can know how.
  3. If it is about spies, we can not leave out the ability of Google services to make you feel spied on. Here you can read how to control the access they have to your information and continue to use them.
  4. Generally, at home, we have a router to provide a connection to all the devices you have connected and which are in use. This means that if it is not well protected, this could be the first access to the information stored by ALL your devices. So the first device to protect your privacy is your router.
  5. The voice assistants are those that have caused more controversy, due to their powerful sensors and the capacity they have to listen and keep information since they are always in search of a command that orders some action. Therefore it is important to deactivate that constant listening and activate it only when necessary.
  6. The vast majority of these devices allow you to erase the data that you have been storing. In the case of Google, for example, your devices and applications have an activity page that allows you to delete them, as well as to register what interests you. That will make it possible for you to eliminate clues about your actions on these devices.
  7. Although we know that the only way that these devices are 100% secure and that they can not be accessed, is that they are disconnected from the Internet, but in this way, it does not make sense to use them. However, it is not necessary to connect every application the device has, all applications can be connected at the time of use, or only the applications or accessories needed or most used.
  8. You can add some of the firewalls created especially for the internet of things, these are small devices designed so that everyone who is connected can protect themselves from cyber attacks.
  9. Do not forget, of course, the need to protect our devices such as: mobiles, computers or tablets, which have a greater capacity to store data, either with their respective antivirus, using VPNs to connect or protecting your files in applications like HushApp that allow you to store and send your files easily and safely.

It is not necessary to go back to the past and reuse the old devices and home appliances to protect your privacy, there are ways to take advantage of the technology by using them in a responsible and safe way.

Filed Under: HushApp Tips Tagged With: cibersecurity, data protection, firewalls, hackers, privacy, spies, spyware, terms and conditions, voice assistants, VPN

How to succeed in choosing a secure VPN connection?

January 10, 2019 by HushApp Team

How to succeed in choosing a secure VPN connection?

Previously we had commented in one of our post what is a VPN, its functions and the advantage of having it when using the Internet safely. However, this system may also have its cons that you should consider when making sure to choose a secure vpn.

As mentioned above, these networks allow the web browsing data remain incognito for the internet provider, but not for the company that manages the VPN. This means that we must trust whoever offers us this connection. How to know what service we can trust? Although the question seems difficult to answer, there are some tips that you can take into account to choose the most appropriate VPN, as well as the best quality.

Secure VPN: Free or paid version?

One of the main characteristics to take into account when choosing a secure vpn is to know if it is free or paid. Obviously, our first option will be free version, however, these versions usually have certain limitations, and although they cost nothing, the rest there is much to say …

Generally the speed is not adequate, they are also unreliable in terms of privacy. Since some VPN store data and the activity of its users, which can then be used to display personalized advertising or for illegitimate purposes.

Therefore, if what concerns you is security and confidentiality, it is better to make the investment in a paid version, with which you will have a range of options on the web.

Other aspects to consider

We are clear that we will have to invest to have a secure VPN, now the task is to define which fits our needs:

You can start by evaluating the reputation of the company behind the VPN, review user comments, blog or specialized forums , etc.

Take into account the location of your servers: as well as the laws that exist in the country where you are located and if they could affect your privacy. It is advisable to look for those that have a great worldwide presence.

Another basic point to choose a vpn is the speed: Generally the paid versions do not limit in this, however, it is important to consider the latency, rise and fall speed.

The type of data stored: Even if it is paid, it is possible to store some data such as the source IP or the time to which you have connected.

The protocols used by the VPN, since not all are equally safe. The most common are: PPTP, L2TP / IPSec, OpenPVN and SSTP. The PPTP is perhaps the least secure with some vulnerabilities discovered.

Of course, it does not hurt to compare prices and the forms of payment they offer, to know which one suits your pocket better.

Filed Under: HushApp Tips Tagged With: cybersecurity, Cybersecurity Tips, privacy, Secure VPN, VPN, VPN connection

What are the cybersecurity measures to carry out your Christmas shopping safely?

December 18, 2018 by HushApp Team

What are the cybersecurity measures to carry out your Christmas shopping safely?

Christmas is a time to share with your family, and to celebrate your appreciation you buy gifts for your loved ones. The races begin between preparations for Christmas dinners and hurried purchases, without a doubt we decided to make purchases via internet. The cybercriminals are aware of your Christmas stress and will take advantage to access your information. There is no need to be a victim of stress! Follow these basic cybersecurity measures to carry out your Christmas shopping safely so you can enjoy this time of year peacefully.

Make your Christmas shopping online safely:

One way to save time for our Christmas shopping is to buy items online. This allows us to avoid travelling to shopping centers that are full of people as you look for gifts that can cost you hours out of the day. If you decide to do your shopping online, follow these recommendations below:

  1. No matter how hurry you are, do not connect with a public Wi-Fi to make purchases, it is preferable to do so from a secure network with your devices or with a trusted one. If it is extremely necessary, do it using a VPN.
  2. Choose websites from well-known and reputable brands, one way to find out if the site is credible is to review the comments of other users who have made purchases on the site before. In addition, if you follow these tips you can identify a secure web page to make your purchases.
  3. It is also important to check that they have a transparent system for tracking orders.
  4. Use prepaid cards: Some banks offer virtual prepaid cards, these provide greater security because they can be charged with the exact amount you need for your purchase.

Christmas shopping physical stores with a credit card

With the rise of cyber attacks, every day they become more serious and more complex. It is not surprising that large numbers of the population resist shopping online, the problem is that the dangers are also present in the purchases we make in physical stores, so we must be cautious at all times.

Beware of Skimmers:

One of the ways that criminals have to attack is through “skimmers”. These are devices very similar to the usual payment terminal but they are designed to read the card when passing scanning it. They capture your PIN number and bank details when a simple card transaction is made.

If the establishment says they have had problems with the payment terminal all day or very often, it may be because a “Skimmer” has been implanted in the reader, making it necessary for you to swipe your card more times than usual for it to capture the data.

Keep distance when you pay with contactless payment systems:

The contactless payment system are in danger too, there is a technology called “near-field communications”, which can be controlled or captured remotely. For this, the person who tries to intercept the payment information needs to be close to the victim. So if you are using this payment system, look around and insist that no one is by your side when you go to pay.

Avoid using the magnetic stripe of the card:

It is unusual to use magnetic stripe cards because almost all have chips instead. However, cybercriminals can disable the chip reader or cause an error message to appear, thus forcing you to re-pass the card using the magnetic stripe. If the payment device has been enabled to read chips, but still shows an error message, you should consider another form of payment.

We must be aware that cybersecurity is present at all times and all areas of our lives, if we take the proper precautions each day, we can enjoy our holidays in peace.

Filed Under: HushApp Tips Tagged With: Christmas shopping, Christmas shopping online, contactless payment systems, cybercriminals, cybersecurity, ecommerce, magnetic stripe, Skimmers, VPN

What is a VPN connection and why should you use it on your devices?

November 20, 2018 by HushApp Team

What is a VPN connection and why should you use it on your devices?

VPN connections are becoming increasingly popular, they are no longer tools only used  in the business world, now, many people concerned about their security have begun to use this type of connection to protect themselves from cyber attacks. What is a VPN connection and what can it do for you?  

A Virtual Private Network, is a type of network in which an extension of a private network is created for access to the Internet. To explain it in a simple way, it could be said that it is an “invisible cable” that joins the user with another location, this cable is called a “tunnel”, and it is the channel where the information will travel when encrypted.

How does it work?

Normally when you connect to the internet, you do it with your service provider which will take you to the website you want to visit, but this information always goes your provider’s servers who have access to this information.

The VPN will allow you to connect with an encrypted connection, so the data you view can not be seen or decrypted by your provider, in this case it will appear that the VPN is the one that is connected to those sites, not your device.

Types of VPN networks

There are two types of VPN networks: client-based and network-based.

– Client-based VPN: Allows the user to connect to a remote network through an application. They create a username and password, next an encrypted channel is automatically created between the computer and the network, where the data exchange is executed.

– Network-based VPN: It allows the user to connect different networks to each other through the Internet. This type of VPN network is used by companies that have offices in different cities and parts of the world, in order to connect with each other and share information in a secure way.

Advantages of using it:

  1. You can access your company’s network safely if you are traveling, for example if you are at home you can see the company’s shared files from your device safely.
  2. With the VPN you can hide and protect your data because the data travelling is encrypted, therefore there will be no way to track your activity. It is ideal when you need to make a banking transaction where sensitive data is  handled. This option is the reason why it is recommended to have a VPN when it is necessary to connect to a public Wifi.
  3. Avoid censorship and geographic blocking: In many countries restrictions are placed on Internet information. It is possible that a web page only allows access if you are browsing from a particular country, and if you are not there you can not visit the site. With a VPN hosted in that country, it will appear that you are browsing from the same place where the website is located, so you can access the content without any problem. Similarly, if in the country where you are there are censored pages, you can connect to the VPN of another country to access that information.
  4. It works for all applications and websites, since it directs all internet traffic through its own channel.

Not everything that shines is gold …

Certainly the VPN network adds a layer of security that gives greater protection to your Internet connection, however, not everything that shines is gold. While browsing with a VPN, your browsing data remains incognito for your provider, but not for the company that manages the VPN.

Therefore you should not trust the security of your information only to this type of connection because if you fall into a dishonest company, they could keep records of your information or even sell it to the highest bidder. Therefore, the ideal action is to select the a VPN with the best reputation on the market.

There are many types of VPN connections on the web, while some are free others payment. To choose the proper one, it is important to take into account the speed, reliability and security offered by the service.  

Add more security to your files

No system is foolproof, the only thing you can do is add additional security layers to further protect your information. You can use other applications such as Hushapp when you want to share important documents through the internet. This application allows you to protect each file individually and easily. We also work with Zero Knowledge Technology, so we have no way to know your information or your passwords.

We invite you to try Hushapp …

Filed Under: HushApp Tips Tagged With: encryption, geographic blocking, HushApp, public Wifi, Virtual Private Network., VPN, VPN connection, VPN network, zero knowledge technology

How to use a public WiFi without compromising your security

November 6, 2018 by HushApp Team

How to use a public WiFi without compromising your security

One of the basic measures to protect yourself from a cyber attack is to avoid connecting to public networks. Often times they lack security whatsoever and can be an open door for cyber attackers. However, sometimes there is no choice but to connect to a public WiFi, in that case, you can take some precautionary measures that will allow you to navigate in a more secure way with this type of connection.

10 Tips for using public WiFi securely

  • Make sure you connect to networks with WPA security or WP2, avoid networks with WEP security, as they are not secure enough.
  • Use a VPN: If possible use a virtual private network (Virtual Private Network), so the IP address of your devices will be hidden from the websites you visit, your browsing is completely anonymous. Web traffic is also encrypted, which means that even your Internet service provider can not see your activity online.
  • Keep all the software and applications on your devices and mobile devices updated.
  • Always try to navigate through secure pages, where data travels encrypted (with the URL that starts in HTTPS).
  • Disable the synchronization processes of your equipment by connecting only what is necessary when you use the public WiFi
  • Avoid logging into any service or website where you need to place your username and password. Avoid making banking transactions, online purchases or other tasks that involve exchanging sensitive data through this type of network.
  • After you have connected to a public WiFi network, it is convenient to delete from the memory of your devices the list of old SSIDs or public networks to which you have previously connected.  
  • It is essential that you have installed security solutions for your equipment, which can keep viruses and malware away. There are also other options for mobile devices that analyze the existence of possible connections, alert, and ask for confirmation when you want to connect to one of them.
  • Encrypt your files and avoid sharing sensitive information through such networks: In addition to adding security solutions to prevent any potential cyber attack, you should make sure your files do not reach unwanted hands. Using the HushApp Hushbox you can keep your files safe, as they will remain encrypted on your mobile device. You can also share your files with your contacts (even if they do not have the application) and they will remain protected, from the moment you send them until your recipients receive it.
  • Disable the automatic connection: Generally we have activated this option, to be able to search for a Wifi and thus avoid spending our data. It would be advisable to disable this option,  and make the connection manually to ensure that when you need to connect you can simply check if you meet the security measures mentioned above.

The criminals will take advantage of any small oversight to access your equipment and finally to your most private information. You must follow all possible security measures that you can take to avoid a cyber attack.

Filed Under: HushApp Tips Tagged With: confidential information, cyber attack, cybersecurity, HTTPS, HushApp, HushBox, network, public Wifi, VPN, Wifi, WPA, WPA2

17 essential tips for parents on Cybersecurity for children

August 6, 2018 by HushApp Team

17 essential tips for parents on Cybersecurity for children

There is no doubt today that children have the ability to use electronic devices and the internet, even the smallest kids already know how to play their favorite online games. This opens a debate among parents about what age should kids start using technology and how much time they should spend on it. Although there is no precise answer to these questions, here, parents can learn some tips about Cybersecurity for children.

According to a research by Norton, 87% of Spanish parents consider it risky to allow their children to use computers and mobile devices without any supervision; in fact, among the 3 biggest concerns are: children can suffer cyber bullying (92%), spend too much time in front of the screen (88%) and download malicious programs or applications (88%).

Despite the active awareness of these latent dangers, statistics say that most parents are not adjusting their parenting.  The study found that 68% do not limit access to certain websites or applications, 19% allows their children to buy online without surveillance and 57% allows them to use the internet without supervision.

Children on the Internet have a lack of supervision due to many reasons, one being parents not intervening to check the safety of their children.

Therefore, we invite you to read the following basic cybersecurity tips, which you can apply to control and protect your children about the dangers they are exposed to on the web.

Cybersecurity for children: tips for parents and children

  1. Limits how long your children can spend connected to the web, set those limits and make sure they are met.
  2. Watch the pages they visit, who they communicate with and what other actions they do on the web. And if you detect any access to some undesirable content for their age, you can talk with them about the subject and block access to the web or game.
  3. Recommend your kids to not use their real name on the web and never give personal information, such as phone numbers, your address, their school, or where they will go on vacation, etc. to strangers.
  4. Establish a VPN connection in your home to ensure that no online predator will have access into your system.
  5. Teach children to create unique passwords that they can remember or keep in safe places.
  6. It is important for children to understand that the digital world can be as dangerous as the real world. If they are usually taught not to talk to strangers, the same should apply on the web.
  7. Watch who they contact on the web and teach them never to meet a stranger in person they met online.
  8. They should never respond to any threatening messages. Let them know if this happens, they have to discuss it with you or the adult that is in charge.
  9. Try to place the computer in a common area, where you can monitor what they do. This can be challenging by the usage mobile phones or tablets, yet still possible, you have the ability to monitor it other ways.
  10. Bookmark their favorite sites to facilitate access.
  11. Pay attention to any changes or attitudes regarding the time they spend on the web: Do they receive phone calls from people you do not know? Have you noticed any unsolicited gifts that have arrived in the mail? do they not like to talk about their online activities? Although these questions may seem unimportant, they could be signs that your children are being cyber bullied by a criminal.

Cybersecurity for children in Social networks:

12. Show them how to recognize and block unwanted contacts. 

Stay tuned to HushApp's Blog!
SUBSCRIBE

13. Specify that they must only add contacts from people they already know.

14. Monitor their social networks, check who their friends are and what they publish.

How to use parental control

15. Disable online purchases, or set parental controls on their devices to control they use it.

16. Use applications to monitor what your children do online: what do they download? How much time do they spend connected?

17. You can also configure parental control in browsers to be sure which pages they can enter.

Technology is changing our way of life, therefore, encouraging parents to monitor their children online will allow the child to grow up understanding how to navigate the online world in a safe way. The web can be as dangerous as the real world, however they don’t need to stop enjoying it. The important thing is that parents start to implement this change in their daily lives. Cybersecurity for children is important and if done properly can be hassle free.

Filed Under: HushApp Tips Tagged With: cyber bullying, Cybersecurity for children, Cybersecurity Tips, mobile devices, online games, parental control, password, Social networks, VPN

logo HushApp made in EU

HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.


Product
Features Pricing Android App iOS App coming soon Web App
Users
Book a demo FAQ Guide Support
Business
Hush for Business GDPR Use cases
About
About us Jobs Terms of Use Privacy Policy Legal
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy
Necessary Always Enabled