News on SecureSafe functions, privacy protection, and safety
Ransomware gangs target SMEs
Today, criminals hardly need any expertise for ransomware. Like other software, "blackmail Trojans" are offered as a bookable service. Smaller organisations are therefore now also increasingly at risk.
Read moreSecureSafe browser extension: Log in quickly and securely
With the new SecureSafe browser extension, things can be done quickly and securely: with just two clicks, user name and password are filled in on login pages so that you can log in to a selected online shop, e-mail box or streaming service in no time at all.
Read moreSecureSafe – More than just a password manager
With the SecureSafe password and file manager, password and file management is not only extremely secure, but you can also benefit from numerous additional functions. One function that we would like to introduce to you here is Password Autofill.
Read moreBeware of fake domain names
When logging in via a web browser, always make sure that the correct URL is in the address bar of your browser. Cyber attackers create deceptively realistic copies of web apps, online shops and eBanking systems in order to steal login data. The only correct URL for the SecureSafe web app is: app.securesafe.com.
Read moreSharp rise in cyber attacks
We are currently experiencing an increasing number of cyber attacks. Please choose a strong password with at least 12 characters to protect your account.
Read moreLog in to SecureSafe securely and conveniently with Touch ID
We already learned at school that every fingerprint is unique. And that is exactly why Touch ID or a fingerprint is one of the most secure methods when it comes to securing and unlocking digital accounts. On top of that, this method is also very practical, because we always have our index finger with us. Now this secure and practical method has also found its way into the SecureSafe Desktop App for MacOs.
Read moreThe data in the mountain
Whenever you store your files, photos, documents, or films in the SecureSafe, they make their way in encrypted form to our data centres, where they are secured multiple times. One of these data centres is located in a former military bunker in the Swiss mountains.
Read moreData Inheritance: Correctly inheriting access data and digital documents
Apple is the latest example of a rising trend: more and more providers are adding a "data inheritance" function. This allows you to designate people who will have access to information, data and profiles after your death. Even better than such provider functions, however, are overarching services that often cover more than the company's own ecosystem.
Read moreHow to make passwords more secure and less stressful
In many cases passwords are the key security factor standing between valuable data and an attacker. Making it all the more important to choose them wisely. On occasion of Data Privacy Day, we have some good tips for secure passwords.
Read moreZero Knowledge Proof – protecting your own privacy
Zero knowledge proof is a method of proving knowledge about something without revealing the knowledge itself. This can be used, for example, to log in to a service without having to transmit the password. We explain how this works here.
Read moreHighly secure file manager
Every SecureSafe account includes a highly secure and privacy-protected file manager for your personal use. Here, you can upload and manage identity papers, contracts, insurance policies, certificates, wedding images and other files, which deserve special protection.
Read moreSecure file synchronization
With the SecureSafe Desktop App you can sync all team files between your personal computer and SecureSafe, ensuring all shared files are always up to date.
Read moreSend large files securely online
The SecureSend feature is included in every SecureSafe account and enables you to send files up to 2GB in size to any recipient of your choice. The recipient does not need to have a SecureSafe account to receive and download the files sent.
Read moreYour secure password manager
To stay safe online, you need a strong, unique password for each and every online account that you create. Use the SecureSafe password manager to keep track of your ever-growing list of passwords and avoid the risk of reusing weak passwords.
Read moreTeam safes for secure business file sharing
Use our uniquely secure team safes to store, share and sync files with your team, company or organization. Team safes are shared workspaces, which you can access via any browser of your choice or directly from a dedicated folder on your work computer. Open as many team safes as you need to share files online with different teams, customers or external partners.
Read moreSecureSafe mobile app: Your digital vaccination certificate. Anytime. Anywhere.
Imagine being regularly asked about your vaccination status and how convenient it would be to have it close to hand at all times. That's exactly what your SecureSafe offers you. With just one tap on the login page, you can easily access your vaccination certificate – and it's absolutely secure.
Read moreTips and tricks for a successful home office
More people than ever before are currently working from home. We too, the employees of SecureSafe, have moved from our office in the heart of Zurich to our desks at home. After just over a month working by remote, we decided to share a few ideas within our team and put together a few valuable tips that help us start the day with plenty of structure and motivation.
Read moreEdit PDFs online in the browser, direct purchase of Team Safes
The SecureSafe web and desktop app got updates with neat features for you. Here's your quick overview of the enhancements.
Read morePassword autofill
There’s a new version of the SecureSafe app out and that means safer, simpler ways to manage your passwords. In particular, the password autofill feature has been greatly enhanced for iPhone users that have installed iOS 12 on their mobile.
Read moreCyber war: The invisible opponent
It’s like the plot of a bad crime novel. A series of crimes occur and the police always come across the same suspect at the scene of the crime. He would definitely have a motive, but constantly asserts his innocence and no one can prove he did anything.
Read moreFile encryption for cloud synchronisation – SecureSafe
After two years of intense development, our team is proud to present an absolutely unique security feature, currently one of a kind worldwide: local encryption for file synchronization.
Read moreData inheritance on different online platforms
The topic of data inheritance is young and many online service providers have yet to present their policies on it. Some of the heavyweights have, however, already put various options in place for their users to pass on important data or rights to online accounts. We give you an overview here.
Read moreWhat are DDoS attacks?
In the last days numerous online shops were hit by DDoS attacks. The attackers sent countless data packages to the server systems of the affected companies causing their online shops to be completely down at times.
Read moreWhat is ransomware?
Ransomware is malicious software used by cyber-attackers in order to blackmail their victims. Successful attackers can make millions of dollars extorting money from a large number of private individuals as well as businesses.
Read more20 tips to fight against social engineering
Industry spies aim to get access to sensitive business data through so-called social engineering attacks. The attackers confuse the employees with misleading information to reach their goals. These 20 tips help to better protect your company.
Read moreThe early riser
Tobias Christen is the CEO and co-founder of the company DSwiss, which stands behind SecureSafe. In this interview, he explains how the importance of privacy protection has changed.
Read moreWhat are bitcoins really?
8 years ago an unknown person, who uses the pseudonym Satoshi Nakamoto invented an alternative means of payment – the so-called bitcoin. Untraditionally, this digital currency is not printed by governments but “mined” on computers.
Read moreSecurity-Tester – Sherlock Holmes of the IT-Branche
Tobias Ospelt checks IT solutions for security vulnerabilities and consults companies about the topic of IT security.
Read moreWhat are Man-in-the-Middle Attacks?
Man-in-the-middle attacks are a specific type of hacker attack: the attacker reads or manipulates unencrypted data shared between the victim’s computer and the server.
Read moreHere security is preprogramed
Michael Tschannen is the Chief Technical Officer at SecureSafe. In collaboration with our developer team, he is responsible for our own cloud storage solution as well as eSafe solutions for banks, insurance companies and other large customers.
Read moreWhat is social engineering?
Social engineering is a simple yet very effective form of industrial espionage. The attackers steal important company data or exploit human error to introduce viruses to a system.
Read moreWhat are zero day exploits?
Zero day exploits are very dangerous hacker attacks, which take advantage of unknown security breaches in software programs.
Read moreSaaS, PaaS or IaaS – which is right for my company?
If you consider using a cloud solution for your company, you will have 3 different models to choose from. But which is best suited for your company?
Read moreSystem engineers: the architects of the data highway
In this interview, Pascal Weller (43) explains how data from a PC reaches the cloud and what role servers play in this process.
Read moreThe invisible side of the Internet
More than 3 billion people surf the net tapping more than 50,000 search request into Google’s search engine per second.
Read more13 tips to protect you against malware
Whether viruses, trojans or spyware: malicious programs are designed to attack computer systems and endanger the security of your personal data. These guidelines will help you to protect yourself against unwanted attacks.
Read moreDoubleSec – the unique secure login feature
High security login technology using 2-factor authentication on an iPhone or Android Phone - but as easy as standard username/password!
Read more