Posts by Category: Privacy Resources

GhostVolt – Smart Encryption Built for Teamwork

March 06, 2019

GhostVolt – Smart Encryption Built for Teamwork

https://ghostvolt.com/

Set up encrypted shared team folders and decide who can manage, add, edit or view your data with advanced user permissions, reporting and asset tracking. GhostVolt encryption if fully automated ensuring data security at every point in your workflow. Automated encryption not only saves time and cost but eliminates the threat of human error and helps to maintain your data loss prevention policies without intervention. 256 bit AES encryption is the most advanced security standard to date and is trusted by enterprise and governments worldwide in mitigating data breach threats and is proven to be uncrackable. Also there are no back doors, so you can be sure your data is invisible to any hacker, law enforcement agency or even to us. Features include: a) Collaboration – Invite everyone on your network to join your GhostVolt Team and enjoy the seamless secure workflow your business depends on; b) End-to-end encryption – Your files are secured during transit and at rest with enterprise level 256 bit AES encryption; c) Asset Restriction – Grant, monitor, and revoke access to your secured files with advanced asset controls, d) User Control – Assign special user access permissions for your teams or create your own for each member, and give them controlled access to the folders of your choice; e) Auditing and Reports – To provide visibility into data usage, GhostVolt tracks and logs all user activity and gives you full access to advanced reporting capabilities; and f) Grows with your business – GhostVolt is fully scalable. Just add more users to your team as you grow, or add servers to meet the needs of your expanding business, whatever the size. This will be added to Privacy Resources Subject Tracer™. This will be added to World Wide Web Reference Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

219 views

LockDown – Take Back Your Privacy

February 07, 2019

LockDown – Take Back Your Privacy
https://www.lockdownfiles.com/

LockDown is the powerful file protection and control system that anyone can use. Every day, billions of digital files are shared through email and the cloud. Your files can easily be copied, forwarded, read by unauthorized parties, and synced to unsecured devices. o one is safe from the data breach epidemic. 61% of breach victims are businesses with fewer than 100 employees. Often the private, confidential information that is stolen resides in files – such as spreadsheets, pictures, PDF’s and other documents. LockDown creates an encrypted copy of your file that you can safely share. You control permissions – such as watermarks, printing, copying and viewing time limits. Your file is securely sent to intended recipients for viewing on their devices within the LockDown app. Only your intended recipients can view your file and you can revoke access at any time. More than 80% of data breaches involve stolen or misused passwords. Passwords can be forgotten, shared or stolen. Instead of passwords, LockDown’s scan-in technology ensures that only your intended recipients can access your files. You don’t have to be a computer expert to use LockDown. You’ll be up and running in minutes. Download the app on your phone to get started. This will be added to Privacy Resources Subject Tracer™. This will be added to World Wide Web Reference Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

256 views

Be Safe On the Internet

January 31, 2019

Be Safe On the Internet
https://securitycheckli.st/

An open source checklist of resources designed to improve your online privacy and security. Check things off to keep track as you go. This is an excellent resources and thanks to Sabrina I. Pacifici for the excellent find! This will be added to Privacy Resources Subject Tracer™. This will be added to World Wide Web Reference Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

216 views

Internet Privacy Guide – Keeping Your Data Safe Online by Christian Stewart

January 03, 2019

Internet Privacy Guide – Keeping Your Data Safe Online by Christian Stewart
https://hackernoon.com/internet-privacy-guide-keeping-your-data-safe-online-be3d823f05f5


Privacy and security on the internet are constantly evolving. What keeps you safe now may totally change tomorrow. Because the internet is an open platform, new threats emerge all the time. Technology and opinions surrounding it are constantly changing. It’s important to get second (and third) opinions on the products you use and the protection measures you take. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

230 views

SafeShare – The Right Way To Share Private Information

December 11, 2018

SafeShare – The Right Way To Share Private Information
https://www.safeshare.io/

Send notes and get notified when they are read or shred. Request information and get notified when it is made available to you. Share code snippets in any programming language, syntax highlighting included. Features include: a) Send and track notes – See when your notes were viewed and from where in the world with geo-coded activity information. Know exactly when your information reaches its destination and when it has been destroyed; b) Share with anyone – Even if they do not have an account, the password is all that is required to decrypt and view a note. View all previous notes that have been sent to you through the user dashboard for easy access; c) Request information – Need information from a customer? Send them an information request and be notified once they have sent you back the information you need. They don’t even need a SafeShare account; and d) Share code snippets – Easily create code snippets for a variety of programming languages, share them with your peers and select when you want them shredded. Syntax highlight and geo-info included. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

258 views

Awareness Watch Talk Show for Wednesday October 3, 2018 at 2:00pm EDT – 2019 Guide to Privacy Resources

October 03, 2018

Awareness Watch Talk Show for Wednesday October 3, 2018 at 2:00pm EDT – 2019 Guide to Privacy Resources
http://www.BlogTalkRadio.com/AwarenessWatch/

This program will be featuring my recently updated white paper titled 2019 Guide to Privacy Resources. We will be highlighting the latest and greatest resources and sources covering privacy resources, tools, sources, search engines, subject directories, articles, guides and tracers….literally everything on the Internet covering PRIVACY RESOURCES!! We will also be discussing my latest freely available Awareness Watch Newsletter V16N10 October 2018 featuring 2019 Guide to Privacy Resources as well as my freely available October 2018 Zillman Columns highlighting 2019 Artificial Intelligence (AI) Resources. You may call in to ask your questions at (718)508-9839. The show is live and thirty minutes in length starting at 2:00pm EDT on Wednesday, October 3, 2018 and then archived for easy review and access. Listen, Call and Enjoy….

381 views

ProtonVPN

September 24, 2018

ProtonVPN
https://www.protonvpn.com

ProtonVPN is a virtual private network service produced by the company that runs the ProtonMail high-security email service. ProtonVPN is similarly designed to be a high-security VPN suitable for journalists and political activists. The service exclusively uses ciphers designed for Perfect Forward Secrecy, which means that a compromised encryption key cannot be used to decrypt past sessions. ProtonVPN’s parent company is based in Switzerland, a country with famously strict privacy laws. Switzerland is not a member of either the five eyes or the fourteen eyes global surveillance networks. ProtonVPN also includes a kill switch feature that will disable internet service entirely when the VPN connection unexpectedly drops. Many other VPN systems react to a connection drop as if it were a deliberate shutdown of the VPN and begin sending traffic over the regular internet. ProtonVPN’s free tier allows access from a single device from up to 3 countries. Paid plans offer more devices and higher speeds. Client software is available for Windows, macOS, and Linux computers as well as Android and iOS mobile devices. This will be added to World Wide Web Reference Subject Tracer™. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™. Copyright © 2017 Internet Scout Research Group – http://scout.wisc.edu

487 views

Awareness Watch Newsletter V16N10 October 2018

September 20, 2018

Awareness Watch Newsletter V16N10 October 2018
http://AwarenessWatch.VirtualPrivateLibrary.net/V16N10.pdf
Awareness Watch™ Newsletter Blog and Archives
http://www.AwarenessWatch.com/

The October 2018 V16N10 Awareness Watch Newsletter is a freely available 69 pages .pdf document (578KB) from the above URL. This month’s featured report covers 2019 Guide to Privacy Resources on the Internet and is a comprehensive listing of privacy tools and resources including search engines, directories, subject guides and index resources and sites on the Internet available for the 2019 year. The below list of sources is taken from my Subject Tracer™ white paper titled Privacy Resources 2019 and is constantly updated with Subject Tracer™ bots at the following URL: http://www.PrivacyResources.info/. These resources and sources will help you to discover the many pathways available through the Internet to find the latest privacy research resources, sources, tools and sites. As this site is constantly updated it would be to your benefit to bookmark and return to the above URL frequently. The true way to search the Internet and social media for privacy research resources and tools is to use the below listed tools and resources and include the deep web. These resources will be your pathfinder to all the important and ever changing new economy resources! The Awareness Watch Article Review covers Facial Recognition, Emotion and Race in Animated Social Media by Luke Stark.

391 views

Guide to Privacy Resources 2019

September 13, 2018

Guide to Privacy Resources 2019
http://www.StealthMode.info/

The Guide to Privacy Resources 2019 is a comprehensive listing of privacy resources currently available on the Internet. These include associations, indexes, search engines as well as individual websites and sources that supply the latest technology and information about privacy and how it relates to you and the Internet. The comprehensive list of sources is taken from my Subject Tracer™ Information Blog titled Privacy Resources and is constantly updated with my Subject Tracer™ bots. These resources and sources will help you to discover the many pathways available to you through the Internet to find the latest privacy sources and sites. [This has been updated on September 1, 2018 and is 48 pages PDF 339KB]

422 views

Teen Internet Safety: A Parents Guide by Elody Furni

September 11, 2018

Teen Internet Safety: A Parents Guide by Elody Furni
https://www.top10vpn.com/guides/teen-internet-safety-a-parents-guide/

The internet and smartphones are such a ubiquitous part of teen life, yet are part of a technology landscape that’s evolving so rapidly that it can feel completely alien to parents. From the dangers of screen addiction to cyberbullying and sexting, today’s teenagers have so much more to deal with than ever before. Parents please read and share this comprehensive guide to keeping your teenagers safe online so you can understand the issues and know how to help. This will be added to Privacy Resources Subject Tracer™ This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.

320 views