by Jason Niemoth | Sep 15, 2021 | Blog
Are Passwords Encrypted? Passwords are one of the most important security features available today. Creating secure and unguessable passwords is becoming more complex, let alone remembering the many passwords we use daily. Many websites are programmed not to allow...
by Jason Niemoth | Sep 15, 2021 | Blog
What Are Cryptographic Hashes? If you’ve found yourself wondering what exactly hashing is, it’s essentially a mathematical algorithm mapping and compressing data. This can be any data – a name, date of birth, a file, or a transaction. The data can be any size...
by Jason Niemoth | Sep 15, 2021 | Blog
As cyber threats become a daily occurrence, it’s more important than ever to understand the different types of encryption. In past weeks, we’ve covered several topics around encryption, and now we’re going to take a closer look at the various encryption types. Quick...
by Jason Niemoth | Sep 1, 2021 | Blog
Developed in 1998 by Vincent Rijmen and Joan Daemen, two Belgian cryptographers, Advanced Encryption Standard, or AES, has been around for several decades. Originally referred to as Rijndael, AES is symmetric encryption, meaning it uses the same key to encrypt and...
by Jason Niemoth | Sep 1, 2021 | Blog
Encryption is critical to protecting sensitive information. A lack of encryption has led to massive data breaches, including a Microsoft customer support database of over 280 million customer records, a 500K breach of Zoom accounts, and much more. In previous...
by Jason Niemoth | Sep 1, 2021 | Blog
Many people assume that when information isn’t being transmitted, it’s safe. But to effectively encrypt personally identifiable information, many variables must be considered, including the state the data is in. In order to understand how to encrypt data in various...