• Skip to content
logo logo
  • Blog
Login SIGNUP

HushApp Tips

10 Cybersecurity measures to use Instagram safely without compromising your privacy

May 17, 2019 by HushApp Team Leave a Comment

10 Cybersecurity measures to use Instagram safely without compromising your privacy

Recently we discussed the influence that social media have on our daily lives, particularly on Facebook. Instagram is a social media that has become increasingly popular, and the more popular it becomes, the more security risks we have when using it. Therefore, before starting to publish your favorite photos of your trips and your favorite dishes, take into account some security measures to use Instagram safely.

Instagram is undoubtedly the social media preferred by young people today, for the large amount of visual content that is published, as well as the immediacy of their publications, especially on the Stories. However, it does not stop being a focus of attention for hackers if it is not used correctly.

How could the misuse of an Instagram account affect your security? Small details such as simply having an open account, or connecting from a public Wi-Fi can bring you serious consequences, such as being a victim of fraud or data leakage.

Therefore, it is better to take security measures, from the most basic to some specific settings of the application.

How to use Instagram safely?

  1. If you do not have an Instagram yet and you are thinking about having it on your mobile, the first thing you should do is to download it from the official stores (Play Store, Apple Store, etc). Avoid downloading it from another site.
  2. After having your account, or if you already have it, the basic rule to use Instagram safely is to use the private account mode, so only those who want you choose can access you. If you want to leave it public because you want to promote it, make sure you do not publish any personal information that could compromise your security such as travel photos where you and/or your relatives appear, photos of children, etc.
  3. As in other social media (and in real life), if your account is personal and not for any promotional purpose, just accept to be followed by people you know, remember there are false accounts. In the same way, these false accounts will try to write you by direct messages to try to connect with you, if you do not recognize them, you can reject the request and they won’t be able to contact you.
  4. This privacy option is also available for Stories, Instagram allows you to create a group called “Close friends”, with that option you can select who of your followers will be able to see your Stories.
  5. We have repeated many times how dangerous it can be to connect to a public Wi-Fi without taking the appropriate security measures. Avoid doing it this way, since this is the easiest way for hackers to steal your user and password and access your account.
  6. It is important to be careful with third-party apps, if you want to know is a third-party app is reliable, you should consider some important details, for example: when you register with third-party app, it must show you a URL like this “https://instagram.com/, as well as show you the typical Instagram form to enter username and password (it must be the same as the login of the original app). Do not enter anything if you do not comply with these conditions.
  7. To add more security and using your Instagram safely, activate two-factor authentication, so every time you log in your account, you must enter in addition to your username and password, a code that will be sent to your mobile.
  8. Check the information of doubtful accounts: one of the security options that Instagram has recently added is to be able to review information about accounts with very large audiences (not necessarily public brands or personalities). When entering the profile of these accounts you just have to click on the three points that are in the upper right corner, and there you can click on “About this Account” and access to this information.

This option is not available for all accounts, but those that do have it allow you to verify things like the country (which can help you know if it shows a false location in their posts) date joined, or former usernames.

  1. The blue checkmark is also a way of knowing that the account is verified and that it is indeed the personality or brand they claim to be.
  2. If, on the other hand, you would like to verify an account, you must send a request through Instagram, but take into account that sending the request will not guarantee that it will be verified. After your application has been reviewed, you will receive a confirmation or rejection notification in the notifications tab. Instagram will never request payment for verification or contact you in any way for you to confirm it.

If you still have doubts it is always good to consult the Instagram help center. The important thing is to know the risks to which you are exposed to using this network and how to use it responsibly to enjoy its advantages.

Filed Under: HushApp Tips Tagged With: cybersecurity, Facebook, Instagram, Instagram safely, privacy, social media, two factor authentication

Cybersecurity for remote workers: benefits, risks and how to solve them

May 3, 2019 by HushApp Team Leave a Comment

Cybersecurity for remote workers: benefits, risks and how to solve them

Remote workers are already a business reality, and all companies should know how to manage them. Undoubtedly, this way of work brings benefits for both parties: the employee earns labor flexibility, and the employer can save on expenses that require having more employees.

The statistics confirm these benefits, according to a study carried out by the cybersecurity company OpenVPN, in which 250 IT managers were interviewed, 82% claim to have less stress working in this way, and 30% acknowledge that it allows them to do more work in less time.

Despite the benefits that the home office brings, this method has its disadvantages and can be very dangerous. 90% of IT managers recognize that having remote workers can be a risk to the security of the company. Furthermore, 54% consider that they represent a greater security risk than employees who work in the company itself. Even more alarming, 36% of organizations admit that they have suffered a security incident due to the actions of a remote worker.

It is possible to continue maintaining the benefits that home office brings us in a secure way, as long as the company follows some cybersecurity measures.

Cybersecurity measures for companies with remote workers

1) As with all IT security issues, the main thing is to know the risks to which they are exposed. Therefore, education in cybersecurity for employees should be fundamental, especially for remote workers and it should be part of the corporate culture.

Security policies must be established that clearly explain to employees how to handle sensitive information, especially those that are not within the workplace.

2) Establish basic measures of information security: using VPN, which will also allow the company to monitor who is connected, from where and what they have done. Teaching employees to use strong passwords or avoid using public Wi-Fi networks while they are connected from company devices. in case they have to, following the necessary security measures.

3) Classify the information that requires most protection: the company should review what type of information is accessible according to the profile of the worker, and if it is really necessary to have permission to modify it or it is enough to be allowed to view it.

4) Control devices that store sensitive information: the company must restrict access to information from devices that do not have the security tools established for their protection.

5) Install and maintain updated security solutions on all devices, in order to protect the company from possible malware or other types of cyber threats.

6) It is also important to avoid using computers or personal devices inside or outside the company since these are not controlled by the established security measures.

7) It is advisable to use remote desktops since it allows the employee to connect directly with the company’s servers.

8) Of course, all sensitive information must remain encrypted, this adds a layer of greater security and prevents a possible data leak, even when sharing it with remote workers, customers, suppliers, etc.

That’s why HushApp is the ideal option to manage communication with remote workers, it is a tool that allows you to share files in an easy and totally secure way, even without it being necessary to sign up in the application. It does not require installation since you can access it through its website or through the Android app.

HushApp is thinking to facilitate teamwork protecting the sensitive information of companies.

 

We invite you to try HushApp …

Filed Under: HushApp Tips Tagged With: cyberattack, cybersecurity, data leak, encryption, HushApp, information security, IT, Remote workers, VPN

Do we protect our children from the internet dangers?

March 14, 2019 by HushApp Team Leave a Comment

Do we protect our children from the internet dangers?

We invite you to read SecureKids’ post, our special guests:

Smartphones, as well as many other devices, are already fully in the daily lives of people of all ages. They are very useful tools for many things, but they can also become very dangerous if they are not used properly.

Nowadays, it is very common that children receive their first smartphone during the 8 or 9 years, this age is sometimes reduced a little more when we talk about tablets. What many fathers and mothers are not aware of is that while they are being given a very powerful tool that opens the door to many possibilities for development and also many possible dangers.

And is that according to a study prepared by S2 Group, a company specialized in cybersecurity. In this study, we conclude that 75% of the parents did not implement any type of parental control in the mobile of their children. This percentage is alarming, parents cannot forget their role of educating and protecting their children against new technologies.

Most importantly, before being a parental control it is that parents should educate them and tell them about the potential dangers and misuses that may be given to the connected devices. The best way to prevent this from happening is the dialogue of parents with children. This work can then be supported with parental control tools, which can block access to dangerous content or even regulate the number of hours that can use it to prevent some addiction.

If you choose to use a parental control tool, it is equally important to explain to the little ones that they have it installed, that will give them security, and that step by step, as they are learning and reaching their age, they will have increasing access to more uses of the device. Since a child who is hiding all this information, will end up trying to remove it by force, or even access that content, even by other means. They have to understand the danger!

Nowadays, there is a great variety of very competent parental control programs, and among these is SecureKids. The philosophy of SecureKids is nothing more than transparency between parents and children, that is, the parent can manage and monitor the device remotely. In addition, the children will know at all times that they have put parental control and what configurations have put, as well as request permissions.

What features does SecureKids have?

Some of the features that SecureKids offers are:

  • STATS: The parent will be able to see which applications the child uses the most.
  • ALARMS: This functionality is designed so that alarms can be programmed remotely in the devices.
  • APP CONTROL: This is one of the most important modules of the service, due to its great utility in mobile devices. Here you will be allowed to block the use of certain applications, or even set a time of daily use.
  • BREAKS: It is designed so that parents can schedule breaks in which the child can not use the device.
  • EMERGENCIES: This module is composed by a widget that can be added in the device. This widget is a button that can be pressed by the child when they are in danger, and will automatically send the parents their location, an image captured at that time and the exact date you pressed.
  • CALL CONTROL: Designed so that parents can see the contacts in your child’s agenda and block those numbers that are not to your liking. Also, block calls from any unknown number.
  • WEB CONTROL: Another of the most important features of SecureKids. With the web control, parents can manage what content the child can see on the internet.

From SecureKids we encourage you to try our tool or any other, in order that you can create a safe environment for your children.

There are many dangers on the Internet

Another fact that is of great concern to parents is a large number of cases of cyberbullying that is occurring in recent times. Adding some of these applications can alleviate some of the harassment that your child may be subjected to. It is also clear that you should always talk to them and educate them in every way so they have the ability to know where they can navigate and where not.

I hope this serves to awaken some parents who live asleep and oblivious to all these technological advances.

The Internet is the largest library in the world, let’s use it with head, both old and young!

Filed Under: HushApp Tips Tagged With: app control, control de aplicaciones, cybersecurity, internet dangers, parental control, securekids

Love vs cybersecurity: How to use dating apps and protect your privacy?

March 7, 2019 by HushApp Team Leave a Comment

Love vs cybersecurity: How to use dating apps and protect your privacy?

Are you looking for love? Or rather an adventure? Whatever your preferences you surely want to take advantage of a large number of apps that exist in the market to facilitate or improve your search for the right person. Nowadays you can look for someone because of their tastes, their location, or whatever. The question is how secure are these dating apps? Can you protect your privacy enough by using them?

Like almost everything in the digital and interconnected world, these dating apps are also vulnerable to cyber attacks, and many people have suffered consequences, either because they have leaked files of their intimate life that have been exchanged through these applications, or worse, have been the victim of some fraud or criminals that are not the people who claim to be in these apps. So, how to balance your love or sexual life without endangering your security or privacy?

We do not want you to stay single for fear of being victim to an attack like these. If you follow some security measures in the digital or physical world, you can reduce the chances that your information will be used for other purposes than what you are looking for.

Advantages and disadvantages of dating apps and how to use them safely

  1. The duality between privacy and the veracity of information: One of the main problems that arise in these dating applications is knowing if the person is really who they say they are. Some of these apps allow users to register with Facebook, place work or study site, so this could allow the other person to see if this person, in a certain way, is “real”. The counterpart: the person being investigated, how can we know if they are really looking for an “appointment”? Our advice: limit information about yourself on the Internet to the one you want others to know about you, and with whom you want them to know about you, then you can introduce yourself as you like.
  2. The ideal, in this case, is to have common sense and not to share personal information immediately, as well as it is advisable to have the first dates in public places. Moreover not to give money: it is important to note that there are even people who have been victims of fraud, where their alleged “dates” have asked for money and for some reason there are those who have agreed.
  3. Another common feature of these applications is that they allow you to locate a person close to you, thanks to geolocation, there are also much more accurate, as they indicate how many times you have crossed with that person. It can be an advantage if you want to look for someone in your area, but also it is a disadvantage due to the fact that you are making it clear where you are, and even worse if you indicate each step you take. It is preferable to opt for applications that do not use this modality, which would only allow users to communicate directly so that they define where to find each other. Although it is not so exact, you have the power to determine where and when you want to meet that person.
  4. Secure communications: The problem with many of these dating apps is that they do not have secure communication channels between their users, and therefore they are victims of data leakage. When choosing the application, take into account that your app use encryption in your system to protect the privacy of its users.

For your part, add all the necessary layers of protection, connect to secure networks, use a VPN and an antivirus to protect the device you use.

Protect these photos that should not be exposed for any reason 🔥😈 using HushApp, there you can keep them protected in your Hushbox, without anyone else but you can access them, or sending it to your date in an easy and completely safe way. Nobody who you do not want can be able to access your privacy.

In HushApp we do not want to know about your private life, we want to help you to protect it.

We invite you to try Hushapp …

Filed Under: HushApp Tips Tagged With: ciberattack, cibersecurity, data breach, HushApp, HushBox, privacy, private life, Tags: dating apps

How to protect your privacy from spies in electronic devices

February 20, 2019 by HushApp Team Leave a Comment

How to protect your privacy from spies in electronic devices

When we talk about spies you probably think about typical movie characters who take photos secretly from afar, but the reality is different. Spies can be very close to you, in your electronic devices which you use daily. The internet of things has come to solve many of our day-to-day activities, the problem is that any device connected to the Internet, no matter how harmless it may seem, can be an open window to access your information. So, how to protect your privacy from spies? protecting your information does not only have to do with installing an antivirus on your computer or mobile when even your smart refrigerator could also be vulnerable to a data leak.

It’s not just about protecting your information from potential hackers or cybercriminals, but from companies that want to obtain your data and then offer you products in a personalized way, without your consent.

Televisions, refrigerators, lamps, thermostats, voice assistants such as Alexa or Siri, and an endless number of appliances that need to be connected to the Internet, collect your personal information, use cameras or information from your home to work properly.

Tips to protect your privacy in technology and on the internet

  1. Let’s start with the basics: it is essential to read the terms and conditions of each service that we use, although they may seem long and incomprehensible, it is the only way to know what type of data the device collects and how it uses it.
  2. The most common victim of a spy is on mobile devices, through Spyware, but do not worry, there are always ways to control them, and here you can know how.
  3. If it is about spies, we can not leave out the ability of Google services to make you feel spied on. Here you can read how to control the access they have to your information and continue to use them.
  4. Generally, at home, we have a router to provide a connection to all the devices you have connected and which are in use. This means that if it is not well protected, this could be the first access to the information stored by ALL your devices. So the first device to protect your privacy is your router.
  5. The voice assistants are those that have caused more controversy, due to their powerful sensors and the capacity they have to listen and keep information since they are always in search of a command that orders some action. Therefore it is important to deactivate that constant listening and activate it only when necessary.
  6. The vast majority of these devices allow you to erase the data that you have been storing. In the case of Google, for example, your devices and applications have an activity page that allows you to delete them, as well as to register what interests you. That will make it possible for you to eliminate clues about your actions on these devices.
  7. Although we know that the only way that these devices are 100% secure and that they can not be accessed, is that they are disconnected from the Internet, but in this way, it does not make sense to use them. However, it is not necessary to connect every application the device has, all applications can be connected at the time of use, or only the applications or accessories needed or most used.
  8. You can add some of the firewalls created especially for the internet of things, these are small devices designed so that everyone who is connected can protect themselves from cyber attacks.
  9. Do not forget, of course, the need to protect our devices such as: mobiles, computers or tablets, which have a greater capacity to store data, either with their respective antivirus, using VPNs to connect or protecting your files in applications like HushApp that allow you to store and send your files easily and safely.

It is not necessary to go back to the past and reuse the old devices and home appliances to protect your privacy, there are ways to take advantage of the technology by using them in a responsible and safe way.

Filed Under: HushApp Tips Tagged With: cibersecurity, data protection, firewalls, hackers, privacy, spies, spyware, terms and conditions, voice assistants, VPN

How to succeed in choosing a secure VPN connection?

January 10, 2019 by HushApp Team Leave a Comment

How to succeed in choosing a secure VPN connection?

Previously we had commented in one of our post what is a VPN, its functions and the advantage of having it when using the Internet safely. However, this system may also have its cons that you should consider when making sure to choose a secure vpn.

As mentioned above, these networks allow the web browsing data remain incognito for the internet provider, but not for the company that manages the VPN. This means that we must trust whoever offers us this connection. How to know what service we can trust? Although the question seems difficult to answer, there are some tips that you can take into account to choose the most appropriate VPN, as well as the best quality.

Secure VPN: Free or paid version?

One of the main characteristics to take into account when choosing a secure vpn is to know if it is free or paid. Obviously, our first option will be free version, however, these versions usually have certain limitations, and although they cost nothing, the rest there is much to say …

Generally the speed is not adequate, they are also unreliable in terms of privacy. Since some VPN store data and the activity of its users, which can then be used to display personalized advertising or for illegitimate purposes.

Therefore, if what concerns you is security and confidentiality, it is better to make the investment in a paid version, with which you will have a range of options on the web.

Other aspects to consider

We are clear that we will have to invest to have a secure VPN, now the task is to define which fits our needs:

You can start by evaluating the reputation of the company behind the VPN, review user comments, blog or specialized forums , etc.

Take into account the location of your servers: as well as the laws that exist in the country where you are located and if they could affect your privacy. It is advisable to look for those that have a great worldwide presence.

Another basic point to choose a vpn is the speed: Generally the paid versions do not limit in this, however, it is important to consider the latency, rise and fall speed.

The type of data stored: Even if it is paid, it is possible to store some data such as the source IP or the time to which you have connected.

The protocols used by the VPN, since not all are equally safe. The most common are: PPTP, L2TP / IPSec, OpenPVN and SSTP. The PPTP is perhaps the least secure with some vulnerabilities discovered.

Of course, it does not hurt to compare prices and the forms of payment they offer, to know which one suits your pocket better.

Filed Under: HushApp Tips Tagged With: cybersecurity, Cybersecurity Tips, privacy, Secure VPN, VPN, VPN connection

What are the cybersecurity measures to carry out your Christmas shopping safely?

December 18, 2018 by HushApp Team Leave a Comment

What are the cybersecurity measures to carry out your Christmas shopping safely?

Christmas is a time to share with your family, and to celebrate your appreciation you buy gifts for your loved ones. The races begin between preparations for Christmas dinners and hurried purchases, without a doubt we decided to make purchases via internet. The cybercriminals are aware of your Christmas stress and will take advantage to access your information. There is no need to be a victim of stress! Follow these basic cybersecurity measures to carry out your Christmas shopping safely so you can enjoy this time of year peacefully.

Make your Christmas shopping online safely:

One way to save time for our Christmas shopping is to buy items online. This allows us to avoid travelling to shopping centers that are full of people as you look for gifts that can cost you hours out of the day. If you decide to do your shopping online, follow these recommendations below:

  1. No matter how hurry you are, do not connect with a public Wi-Fi to make purchases, it is preferable to do so from a secure network with your devices or with a trusted one. If it is extremely necessary, do it using a VPN.
  2. Choose websites from well-known and reputable brands, one way to find out if the site is credible is to review the comments of other users who have made purchases on the site before. In addition, if you follow these tips you can identify a secure web page to make your purchases.
  3. It is also important to check that they have a transparent system for tracking orders.
  4. Use prepaid cards: Some banks offer virtual prepaid cards, these provide greater security because they can be charged with the exact amount you need for your purchase.

Christmas shopping physical stores with a credit card

With the rise of cyber attacks, every day they become more serious and more complex. It is not surprising that large numbers of the population resist shopping online, the problem is that the dangers are also present in the purchases we make in physical stores, so we must be cautious at all times.

Beware of Skimmers:

One of the ways that criminals have to attack is through “skimmers”. These are devices very similar to the usual payment terminal but they are designed to read the card when passing scanning it. They capture your PIN number and bank details when a simple card transaction is made.

If the establishment says they have had problems with the payment terminal all day or very often, it may be because a “Skimmer” has been implanted in the reader, making it necessary for you to swipe your card more times than usual for it to capture the data.

Keep distance when you pay with contactless payment systems:

The contactless payment system are in danger too, there is a technology called “near-field communications”, which can be controlled or captured remotely. For this, the person who tries to intercept the payment information needs to be close to the victim. So if you are using this payment system, look around and insist that no one is by your side when you go to pay.

Avoid using the magnetic stripe of the card:

It is unusual to use magnetic stripe cards because almost all have chips instead. However, cybercriminals can disable the chip reader or cause an error message to appear, thus forcing you to re-pass the card using the magnetic stripe. If the payment device has been enabled to read chips, but still shows an error message, you should consider another form of payment.

We must be aware that cybersecurity is present at all times and all areas of our lives, if we take the proper precautions each day, we can enjoy our holidays in peace.

Filed Under: HushApp Tips Tagged With: Christmas shopping, Christmas shopping online, contactless payment systems, cybercriminals, cybersecurity, ecommerce, magnetic stripe, Skimmers, VPN

10 tips to avoid being a victim of a spyware

December 4, 2018 by HushApp Team Leave a Comment

10 tips to avoid being a victim of a spyware

Did you know that there are applications that allow you to spy on your mobile devices? Yes, they are called spyware or software to spy on devices. They are applications that can be downloaded by anyone for free with a simple search on the Internet. All you need to do is simply install it on your victim’s device and begin spying!

The capability of these applications might be shocking to learn. They can access all the conversations that are carried out by WhatsApp or other social media, intervene the microphone of your device, know the geolocation, and even activate remote camera to see what happens around the phone at all times.

Imagine a scenario where a guy gives his girlfriend a cell phone, but without informing her, installed a spy application. Through this spyware they can monitor all online activity without the user being aware. Despite this being an extreme example,  in general, people should be aware of their privacy and understand how easily it can be compromised

These types of applications are usually offered to parents to “monitor” their children’s mobile devices, or for a boss who wants to monitor employees. This can undoubtedly generate a great debate regarding privacy.

The only thing we can do is protect our devices from these type of applications, and here we explain how.

How to avoid being spied on with spyware applications?

  1. There are simple signals that can alert you if something strange happens on your cell phone. One of them is the performance of your battery, although it can be due to many causes, if you detect an unusual battery consumption, it is possible that there is an app of this type.
  2. Check the list of applications, if there is any unknown, You can uninstall if you do not need it.
  3. Do not lend your cell phone to strangers, although it seems obvious, it needs to be said. A spyware can be installed very quickly and silently.
  4. One of the easiest and most effective ways is to install anti-spyware applications, these will allow you to detect if the device has installed malicious software. You can also install an antivirus, some computers already come with anti-spyware installed.
  5. Only install applications that come from official stores.
  6. If you already have the suspicion that you are being spied on and you have not managed to eliminate the spyware, a preventive measure is to have the device in airplane mode which will cancel any type of connection to the outside.
  7. Avoid using public Wi-fi: These are an open door for an intruder to access your information. If you need to, here are ways to use a public network more securely.
  8. Check the permission you are giving to each application: Check what permission you give to each application, and if you really need access to the camera or microphone.
  9. If after you have performed all the previous actions you still have suspicions that you are being spied on, you can restore the phone to the factory state.
  10. If the situation is already delicate enough, it will be necessary to report the incident to the police.

Avoid spies of flesh and blood

Even when we apply all security measures to protect your mobile devices, there will always be “spies of flesh and blood”, those who like to take a look (without permission) and review the information in your cell phone. And for this type of spy there is no anti-spy app or sanction.

But if you can make their life more difficult in a very simple way, add and combine more complex authentication patterns, use the actions that are recorded in the device’s sensors as fingerprint or facial recognitions, among other things that hinder access from an intruder trying to spy on your device.

Finally, encrypt your files, keep them safe in applications such as HushApp, so you can access and view the contents on your cell phone. Your files will remain protected within your HushBox.  

Filed Under: HushApp Tips Tagged With: anti-virus, applications, cybersecurity, encryption, HushApp, mobile devices, spy, spyware

What is a VPN connection and why should you use it on your devices?

November 20, 2018 by HushApp Team Leave a Comment

What is a VPN connection and why should you use it on your devices?

VPN connections are becoming increasingly popular, they are no longer tools only used  in the business world, now, many people concerned about their security have begun to use this type of connection to protect themselves from cyber attacks. What is a VPN connection and what can it do for you?  

A Virtual Private Network, is a type of network in which an extension of a private network is created for access to the Internet. To explain it in a simple way, it could be said that it is an “invisible cable” that joins the user with another location, this cable is called a “tunnel”, and it is the channel where the information will travel when encrypted.

How does it work?

Normally when you connect to the internet, you do it with your service provider which will take you to the website you want to visit, but this information always goes your provider’s servers who have access to this information.

The VPN will allow you to connect with an encrypted connection, so the data you view can not be seen or decrypted by your provider, in this case it will appear that the VPN is the one that is connected to those sites, not your device.

Types of VPN networks

There are two types of VPN networks: client-based and network-based.

– Client-based VPN: Allows the user to connect to a remote network through an application. They create a username and password, next an encrypted channel is automatically created between the computer and the network, where the data exchange is executed.

– Network-based VPN: It allows the user to connect different networks to each other through the Internet. This type of VPN network is used by companies that have offices in different cities and parts of the world, in order to connect with each other and share information in a secure way.

Advantages of using it:

  1. You can access your company’s network safely if you are traveling, for example if you are at home you can see the company’s shared files from your device safely.
  2. With the VPN you can hide and protect your data because the data travelling is encrypted, therefore there will be no way to track your activity. It is ideal when you need to make a banking transaction where sensitive data is  handled. This option is the reason why it is recommended to have a VPN when it is necessary to connect to a public Wifi.
  3. Avoid censorship and geographic blocking: In many countries restrictions are placed on Internet information. It is possible that a web page only allows access if you are browsing from a particular country, and if you are not there you can not visit the site. With a VPN hosted in that country, it will appear that you are browsing from the same place where the website is located, so you can access the content without any problem. Similarly, if in the country where you are there are censored pages, you can connect to the VPN of another country to access that information.
  4. It works for all applications and websites, since it directs all internet traffic through its own channel.

Not everything that shines is gold …

Certainly the VPN network adds a layer of security that gives greater protection to your Internet connection, however, not everything that shines is gold. While browsing with a VPN, your browsing data remains incognito for your provider, but not for the company that manages the VPN.

Therefore you should not trust the security of your information only to this type of connection because if you fall into a dishonest company, they could keep records of your information or even sell it to the highest bidder. Therefore, the ideal action is to select the a VPN with the best reputation on the market.

There are many types of VPN connections on the web, while some are free others payment. To choose the proper one, it is important to take into account the speed, reliability and security offered by the service.  

Add more security to your files

No system is foolproof, the only thing you can do is add additional security layers to further protect your information. You can use other applications such as Hushapp when you want to share important documents through the internet. This application allows you to protect each file individually and easily. We also work with Zero Knowledge Technology, so we have no way to know your information or your passwords.

We invite you to try Hushapp …

Filed Under: HushApp Tips Tagged With: encryption, geographic blocking, HushApp, public Wifi, Virtual Private Network., VPN, VPN connection, VPN network, zero knowledge technology

How to use a public WiFi without compromising your security

November 6, 2018 by HushApp Team Leave a Comment

How to use a public WiFi without compromising your security

One of the basic measures to protect yourself from a cyber attack is to avoid connecting to public networks. Often times they lack security whatsoever and can be an open door for cyber attackers. However, sometimes there is no choice but to connect to a public WiFi, in that case, you can take some precautionary measures that will allow you to navigate in a more secure way with this type of connection.

10 Tips for using public WiFi securely

  • Make sure you connect to networks with WPA security or WP2, avoid networks with WEP security, as they are not secure enough.
  • Use a VPN: If possible use a virtual private network (Virtual Private Network), so the IP address of your devices will be hidden from the websites you visit, your browsing is completely anonymous. Web traffic is also encrypted, which means that even your Internet service provider can not see your activity online.
  • Keep all the software and applications on your devices and mobile devices updated.
  • Always try to navigate through secure pages, where data travels encrypted (with the URL that starts in HTTPS).
  • Disable the synchronization processes of your equipment by connecting only what is necessary when you use the public WiFi
  • Avoid logging into any service or website where you need to place your username and password. Avoid making banking transactions, online purchases or other tasks that involve exchanging sensitive data through this type of network.
  • After you have connected to a public WiFi network, it is convenient to delete from the memory of your devices the list of old SSIDs or public networks to which you have previously connected.  
  • It is essential that you have installed security solutions for your equipment, which can keep viruses and malware away. There are also other options for mobile devices that analyze the existence of possible connections, alert, and ask for confirmation when you want to connect to one of them.
  • Encrypt your files and avoid sharing sensitive information through such networks: In addition to adding security solutions to prevent any potential cyber attack, you should make sure your files do not reach unwanted hands. Using the HushApp Hushbox you can keep your files safe, as they will remain encrypted on your mobile device. You can also share your files with your contacts (even if they do not have the application) and they will remain protected, from the moment you send them until your recipients receive it.
  • Disable the automatic connection: Generally we have activated this option, to be able to search for a Wifi and thus avoid spending our data. It would be advisable to disable this option,  and make the connection manually to ensure that when you need to connect you can simply check if you meet the security measures mentioned above.

The criminals will take advantage of any small oversight to access your equipment and finally to your most private information. You must follow all possible security measures that you can take to avoid a cyber attack.

Filed Under: HushApp Tips Tagged With: confidential information, cyber attack, cybersecurity, HTTPS, HushApp, HushBox, network, public Wifi, VPN, Wifi, WPA, WPA2

  • Page 1
  • Page 2
  • Next Page »
logo HushApp made in EU

HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.


Product
Features Pricing Android App iOS App coming soon Web App
Users
Book a demo FAQ Guide Support
Business
Hush for Business GDPR Use cases
About
About us Jobs Terms of Use Privacy Policy Legal
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy
Necessary Always Enabled