News

SecureSafe – More than just a password manager

SecureSafe – More than just a password manager

With the SecureSafe password and file manager, password and file management is not only extremely secure, but you can also benefit from numerous additional functions. One function that we would like to introduce to you here is Password Autofill.

Read more
Beware of fake domain names

Beware of fake domain names

When logging in via a web browser, always make sure that the correct URL is in the address bar of your browser. Cyber attackers create deceptively realistic copies of web apps, online shops and eBanking systems in order to steal login data. The only correct URL for the SecureSafe web app is: app.securesafe.com.

Read more
Sharp rise in cyber attacks

Sharp rise in cyber attacks

We are currently experiencing an increasing number of cyber attacks. Please choose a strong password with at least 12 characters to protect your account.

Read more
Log in to SecureSafe securely and conveniently with Touch ID

Log in to SecureSafe securely and conveniently with Touch ID

We already learned at school that every fingerprint is unique. And that is exactly why Touch ID or a fingerprint is one of the most secure methods when it comes to securing and unlocking digital accounts. On top of that, this method is also very practical, because we always have our index finger with us. Now this secure and practical method has also found its way into the SecureSafe Desktop App for MacOs.

Read more
The data in the mountain

The data in the mountain

Whenever you store your files, photos, documents, or films in the SecureSafe, they make their way in encrypted form to our data centres, where they are secured multiple times. One of these data centres is located in a former military bunker in the Swiss mountains.

Read more
Data Inheritance: Correctly inheriting access data and digital documents

Data Inheritance: Correctly inheriting access data and digital documents

Apple is the latest example of a rising trend: more and more providers are adding a "data inheritance" function. This allows you to designate people who will have access to information, data and profiles after your death. Even better than such provider functions, however, are overarching services that often cover more than the company's own ecosystem.

Read more
How to make passwords more secure and less stressful

How to make passwords more secure and less stressful

In many cases passwords are the key security factor standing between valuable data and an attacker. Making it all the more important to choose them wisely. On occasion of Data Privacy Day, we have some good tips for secure passwords.

Read more
Zero Knowledge Proof – protecting your own privacy

Zero Knowledge Proof – protecting your own privacy

Zero knowledge proof is a method of proving knowledge about something without revealing the knowledge itself. This can be used, for example, to log in to a service without having to transmit the password. We explain how this works here.

Read more
Highly secure file manager

Highly secure file manager

Every SecureSafe account includes a highly secure and privacy-protected file manager for your personal use. Here, you can upload and manage identity papers, contracts, insurance policies, certificates, wedding images and other files, which deserve special protection.

Read more
​Secure file synchronization

​Secure file synchronization

With the SecureSafe Desktop App you can sync all team files between your personal computer and SecureSafe, ensuring all shared files are always up to date.

Read more
Send large files securely online

Send large files securely online

The SecureSend feature is included in every SecureSafe account and enables you to send files up to 2GB in size to any recipient of your choice. The recipient does not need to have a SecureSafe account to receive and download the files sent.

Read more
Your secure password manager

Your secure password manager

To stay safe online, you need a strong, unique password for each and every online account that you create. Use the SecureSafe password manager to keep track of your ever-growing list of passwords and avoid the risk of reusing weak passwords.

Read more
Team safes for secure business file sharing

Team safes for secure business file sharing

Use our uniquely secure team safes to store, share and sync files with your team, company or organization. Team safes are shared workspaces, which you can access via any browser of your choice or directly from a dedicated folder on your work computer. Open as many team safes as you need to share files online with different teams, customers or external partners.

Read more
SecureSafe mobile app: Your digital vaccination certificate. Anytime. Anywhere.

SecureSafe mobile app: Your digital vaccination certificate. Anytime. Anywhere.

Imagine being regularly asked about your vaccination status and how convenient it would be to have it close to hand at all times. That's exactly what your SecureSafe offers you. With just one tap on the login page, you can easily access your vaccination certificate – and it's absolutely secure.

Read more
Tips & tricks for a successful home office

Tips & tricks for a successful home office

More people than ever before are currently working from home. We too, the employees of SecureSafe, have moved from our office in the heart of Zurich to our desks at home. After just over a month working by remote, we decided to share a few ideas within our team and put together a few valuable tips that help us start the day with plenty of structure and motivation.

Read more
Edit PDFs online in the browser, direct purchase of Team Safes

Edit PDFs online in the browser, direct purchase of Team Safes

The SecureSafe web and desktop app got updates with neat features for you. Here's your quick overview of the enhancements.

Read more
Password autofill

Password autofill

There’s a new version of the SecureSafe app out and that means safer, simpler ways to manage your passwords. In particular, the password autofill feature has been greatly enhanced for iPhone users that have installed iOS 12 on their mobile.

Read more
Cyber war: The invisible opponent

Cyber war: The invisible opponent

It’s like the plot of a bad crime novel. A series of crimes occur and the police always come across the same suspect at the scene of the crime. He would definitely have a motive, but constantly asserts his innocence and no one can prove he did anything.

Read more
File encryption for cloud synchronisation

File encryption for cloud synchronisation – SecureSafe

After two years of intense development, our team is proud to present an absolutely unique security feature, currently one of a kind worldwide: local encryption for file synchronization.

Read more
Data inheritance on different online platforms

Data inheritance on different online platforms

The topic of data inheritance is young and many online service providers have yet to present their policies on it. Some of the heavyweights have, however, already put various options in place for their users to pass on important data or rights to online accounts. We give you an overview here.

Read more
What are DDoS attacks?

What are DDoS attacks?

In the last days numerous online shops were hit by DDoS attacks. The attackers sent countless data packages to the server systems of the affected companies causing their online shops to be completely down at times.

Read more
What is ransomware?

What is ransomware?

Ransomware is malicious software used by cyber-attackers in order to blackmail their victims. Successful attackers can make millions of dollars extorting money from a large number of private individuals as well as businesses.

Read more
20 tips to fight against social engineering

20 tips to fight against social engineering

Industry spies aim to get access to sensitive business data through so-called social engineering attacks. The attackers confuse the employees with misleading information to reach their goals. These 20 tips help to better protect your company.

Read more
The early riser

The early riser

Tobias Christen is the CEO and co-founder of the company DSwiss, which stands behind SecureSafe. In this interview, he explains how the importance of privacy protection has changed.

Read more
What are bitcoins really?

What are bitcoins really?

8 years ago an unknown person, who uses the pseudonym Satoshi Nakamoto invented an alternative means of payment – the so-called bitcoin. Untraditionally, this digital currency is not printed by governments but “mined” on computers.

Read more
Security-Tester – Sherlock Holmes of the IT-Branche

Security-Tester – Sherlock Holmes of the IT-Branche

Tobias Ospelt checks IT solutions for security vulnerabilities and consults companies about the topic of IT security.

Read more
What are Man-in-the-Middle Attacks?

What are Man-in-the-Middle Attacks?

Man-in-the-middle attacks are a specific type of hacker attack: the attacker reads or manipulates unencrypted data shared between the victim’s computer and the server.

Read more
Here security is preprogramed

Here security is preprogramed

Michael Tschannen is the Chief Technical Officer at SecureSafe. In collaboration with our developer team, he is responsible for our own cloud storage solution as well as eSafe solutions for banks, insurance companies and other large customers.

Read more
What is social engineering?

What is social engineering?

Social engineering is a simple yet very effective form of industrial espionage. The attackers steal important company data or exploit human error to introduce viruses to a system.

Read more
What are zero day exploits?

What are zero day exploits?

Zero day exploits are very dangerous hacker attacks, which take advantage of unknown security breaches in software programs.

Read more
SaaS, PaaS or IaaS – which is right for my company?

SaaS, PaaS or IaaS – which is right for my company?

If you consider using a cloud solution for your company, you will have 3 different models to choose from. But which is best suited for your company?

Read more
System engineers: the architects of the data highway

System engineers: the architects of the data highway

In this interview, Pascal Weller (43) explains how data from a PC reaches the cloud and what role servers play in this process.

Read more
The invisible side of the Internet

The invisible side of the Internet

More than 3 billion people surf the net tapping more than 50,000 search request into Google’s search engine per second.

Read more
13 tips to protect you against malware

13 tips to protect you against malware

Whether viruses, trojans or spyware: malicious programs are designed to attack computer systems and endanger the security of your personal data. These guidelines will help you to protect yourself against unwanted attacks.

Read more
DoubleSec – the unique secure login feature for smartphones

DoubleSec – the unique secure login feature for smartphones

High security login technology using 2-factor authentication on an iPhone or Android Phone - but as easy as standard username/password!

Read more
Cookies – please make your selection
Cookies
This website uses cookies to ensure you get the best experience on our website.

Essential cookies – essential for the use of the website
Off On
Preference cookies – enable the website to remember the user preferences of the user, such as language and region
Off On
Statistical cookies – anonymised gathering of information to evaluate the use of the website by the visitor
Off On