Blog:
Behind Lock and Key
WEBSITE SECURITY: 5 WAYS TO SECURE YOUR ONLINE DONATIONS
Reposted from givewp.com One of the primary goals for your nonprofit website is to gain the confidence and trust of your donors. The best way to build that trust is to show them you take their online privacy and security seriously. Security should not be underestimated. Many nonprofits underestimate the likelihood and magnitude of an attack…
Read MoreTHE IMPORTANCE OF DATA SOVEREIGNTY
One of the most unifying aspects of the Internet is the fact that it has no bounds. Once published, information is available anytime and anywhere. Yet, while the Internet knows no borders or boundaries, the data it contains and the users who provide this data to service providers fall under a wide range of jurisdictions.…
Read MoreSMALL BUSINESSES NEED KEY MANAGEMENT TOO
We’ve posted on the blog previously explaining the process and benefits of API key management as a security solution. But as a refresher…your data is collected, encrypted, and stored online. This data, though encrypted, is only as secure as the API keys which allow access to it. It is the case, then that, your encrypted data is…
Read MoreENCRYPTING DATA AT REST & DATA IN MOTION
Not all data is created equal. When thinking about protecting your data it can be easy to assume that all data is the same and that it requires the same sort of encryption. In reality, though, the data you interact with can be separated into two general categories: data in motion and data at rest.…
Read MorePART 2: MORE VULNERABLE THAN WE THINK
This is the second in a two part series in which we explore the vulnerability that our increasingly technological and interconnected world presents us with. The first post outlined a presentation by Avi Rubin who outlines some the broad “hackability” of our lives and some of the technological developments which will add a new level of risk…
Read MorePART 1: MORE VULNERABLE THAN WE THINK
This is the first in a two part series in which we’re exploring the vulnerability that our increasingly technological and interconnected world presents us with. This first post outlines the highly creative presentation of Avi Rubin who points to the broad “hackability” of our lives. In the following post we’ll take a step back and…
Read MoreINTRODUCING LOCKR FOR WORDPRESS
We’re excited to announce Lockr’s availability in the WordPress plugin directory, making it the first ever API and Encryption key management service for WordPress. The ease of use and integration of the WordPress platform has made protecting your personal website even easier. Lockr’s plugin is easy to configure and setup and will effectively store keys…
Read MoreTOP 5 TECH/SECURITY PODCASTS
Podcasting as a medium and media industry has changed dramatically over the course of the past ten years. The medium is young and, as of yet, still fairly decentralized. In 2005 Apple added podcasts to its iTunes roster, but in the past three years though, since 2013, the number of podcasts available through iTunes has…
Read MoreWHAT’S WRONG WITH YOUR PA$$WORD?
Our team here at Lockr came across this TED talk the other day, and thought it would applicable to our readers. We tried to pick out the important parts of the talk and highlight some of the best practices, hope you enjoy! During a TED talk in 2014, Lorrie Faith Craner, highlighted her thoughts on…
Read More- « Previous
- 1
- 2
- 3
- 4
- Next »