Jay Thakkar, Author at Security Boulevard
Graphic representing encryption keys that need to be managed to improve security

12 Enterprise Encryption Key Management Best Practices

From centralization to automation, here’s your 12-step guide to being more proactive with your enterprise’s encryption key management “What’s the first thing I need to protect data stored on our... The post 12 Enterprise Encryption Key Management Best Practices appeared first on Hashed Out by The SSL Store™ ... Read More
Types of encryption graphic: How symmetric encryption works

Types of Encryption: 5 Encryption Algorithms & How to Choose the Right One

We’ll break down the two main types of encryption — symmetric and asymmetric — before diving into the list of the 5 most commonly used encryption algorithms to simplify them... The post Types of Encryption: 5 Encryption Algorithms & How to Choose the Right One appeared first on Hashed Out ... Read More
A graphic illustrating the 3 2 1 backup rule

3-2-1 Backup Rule: The Rule of Thumb to Solve Your Data Loss Problems

Downtime from ransomware attacks results in an average of 16.2 days of downtime for businesses, according to Coveware’s Q4 2019 Ransomware Marketplace report While it may sound like a rule... The post 3-2-1 Backup Rule: The Rule of Thumb to Solve Your Data Loss Problems appeared first on Hashed Out ... Read More
Google Makes Identity Verification Mandatory for All Advertisers

Google Makes Identity Verification Mandatory for All Advertisers

| | SSL Certificates
Google’s latest move will take a few years to fully roll out, but there’s an essential lesson for all of us—online business identity is important. Google, the world’s largest search... The post Google Makes Identity Verification Mandatory for All Advertisers appeared first on Hashed Out by The SSL Store™ ... Read More
Zoom Encryption, Whatsapp Encryption…Wait, Let’s Not Forget About Email Encryption

Zoom Encryption, Whatsapp Encryption…Wait, Let’s Not Forget About Email Encryption

While you try to lock down your windows, your door could be wide open. Many of my friends ask me if I get bored writing about encryption day-after-day. Well, this... The post Zoom Encryption, Whatsapp Encryption…Wait, Let’s Not Forget About Email Encryption appeared first on Hashed Out by The SSL ... Read More
What Is PKI? A Crash Course on Public Key Infrastructure (PKI)

What Is PKI? A Crash Course on Public Key Infrastructure (PKI)

Ever wondered what public key infrastructure (PKI) is and how it works? It’s only one of the most critical systems used to ensure authentication, data integrity, and privacy… The world... The post What Is PKI? A Crash Course on Public Key Infrastructure (PKI) appeared first on Hashed Out by The ... Read More
Graphic of the Chrome 81 - Chrome 86 updates that are planned for release

Browser Watch: Google Chrome to Block HTTP Downloads

Starting mid-2020, you won’t be able to download certain files on Chrome — here’s why Time after time, we’ve witnessed browser giants making security-related decisions that have a significant impact... The post Browser Watch: Google Chrome to Block HTTP Downloads appeared first on Hashed Out by The SSL Store™ ... Read More
Graphic: What is a rootkit? Breaking down the levels of privilege.

What Is a Rootkit and How Does It Work?

Here’s everything you need to know about the most dangerous breed of security threats The cyber security industry might not have perfected the techniques to thwart security threats completely, but... The post What Is a Rootkit and How Does It Work? appeared first on Hashed Out by The SSL Store™ ... Read More
Screenshot: PayPal phishing email scam example from WeLiveSecurity by ESET

The Latest PayPal Phishing Email Goes Beyond Your Login Credentials

Another day and another clever PayPal phishing scam to learn from to better protect yourself and your organization “In this world, nothing can be said to be certain, except death,... The post The Latest PayPal Phishing Email Goes Beyond Your Login Credentials appeared first on Hashed Out by The SSL ... Read More
BIMI and Verified Mark Certificate example on Yahoo Mail

Verified Mark Certificates & the BIMI Standard: Show Your Company Logo in Your Customer’s Inbox

Learn about BIMI — a new email standard that could boost your email visibility, build customer trust, and help fight phishing If your job is related to email marketing, terms... The post Verified Mark Certificates & the BIMI Standard: Show Your Company Logo in Your Customer’s Inbox appeared first on ... Read More