Personal
Passwords
Files
Pricing
Resources
Help Center
Certifications
Security | Info for CISOs
News
Login
Next
SecureSafe
Post - June 2025
Login
Classic
SecureSafe
Pre - June 2025
Login
Register
Login
Legacy
SecureSafe
Pre - June 2025
Login
All new
SecureSafe
Post - June 2025
Login
Register
Login
Legacy
SecureSafe
Pre - June 2025
Login
All new
SecureSafe
Post - June 2025
Login
Register
Personal
Passwords
Files
Pricing
Resources
Help Center
Certifications
Security | Info for CISOs
News
Login
Get started
Login
Classic
SecureSafe
Pre - June 2025
Login
Next
SecureSafe
Post - June 2025
Login
Register
News
Security blog on password protection & cloud data security
IT & Security
Avoid password pain: How to protect yourself in just a few steps
AI cracks passwords in seconds - protect your accounts with a few simple steps before it hurts.
Read more
IT & Security
Why every company will need a password manager in 2025
Read more
SecureSafe
Swiss data protection and secure data storage with SecureSafe
Read more
IT & Security
The 25 most insecure passwords of all time (yes, "123456" is still there)
Read more
SecureSafe
7 tips for secure passwords and protected accounts
Read more
SecureSafe
Phishing in the boardroom: How managers become a security vulnerability
Read more
IT & Security
Ransomware gangs increasingly threaten small businesses
Read more
SecureSafe
Your data in the mountain - Swiss data center with maximum security
Read more
IT & Security
Zero Knowledge Proof: data protection without compromise
Read more
IT & Security
Digital data inheritance: How to inherit access data & documents securely
Read more
IT & Security
What are zero-day attacks?
Read more
IT & Security
What is a man-in-the-middle attack and how do you recognize it?
Read more
IT & Security
Security tester: vulnerability finder in the service of IT security
Read more
News
Cyber warfare: invisible threat to states and companies
Read more
News
How online platforms regulate the digital estate
Read more
IT & Security
What is social engineering and how does it work?
Read more
IT & Security
13 practical tips for more protection against malware
Read more
SecureSafe
DoubleSec: The secure login system with smartphone & PIN
Read more
SecureSafe
System Engineers: The invisible architects behind your data security
Read more
IT & Security
20 tips against social engineering - how to protect yourself against manipulation
Read more