Work From Home Security and Privacy Online Training

  • On ·
  • By ·

Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance obligations in simplified ways.

If you are working from home, or any other remote location, occasionally or on a long-term basis, you must be aware of the related information security and privacy risks and how to mitigate them.

With what may be the majority of office workers throughout the world now working from home, cybercrooks, business competitors, and nation-state hackers are actively exploiting the vulnerabilities that are present in most home and remote offices.


Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent.
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast

National Cybersecurity Awareness Month

  • On ·
  • By ·

October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have the resources they need to be safer and more secure online.

During National Cybersecurity Awareness Month (NCSAM), the following tip sheets and resources are invaluable tools for reducing cybersecurity risks and protecting yourself online. Use these resources in your communities and share them with your stakeholders throughout the year to encourage strong, nationwide cybersecurity. These materials are free and may be modified to meet your needs.

Topics include:

  • Cybersecurity at Work
  • Cybersecurity While Traveling
  • Identity Theft and Internet Scams
  • E-Skimming
  • Internet of Things
  • Multi-factor Authentication
  • Online Privacy
  • Passwords
  • Phishing
  • Protecting Your Digital Home
  • Social Media Cybersecurity

Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent.
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast

Star Labs Linux Laptops

  • On ·
  • By ·

Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint or Zorin OS pre-installed. They currently offer the Star Lite Mk II and the Star LabTop Mk III at extremely affordable prices.

The Star Lite Mk II delivers up to a 20% performance increase with an Intel® Pentium® N4200 quad-core processor and even faster SSD storage. The low power requirement of this processor and the Type II anodized aluminum chassis eliminate the need for a fan, meaning the Star Lite Mk II is virtually silent.

To the outside world, the Star LabTop Mk III is just an ordinary Linux laptop, but secretly, it is one of the fastest ultrabooks available. The new Star LabTop Mk III delivers up to a 20% performance increase with the new Intel® Core™ i7-8550u quad-core processor and even faster SSD storage. A 45.6-watt-hour battery is housed in the Type II anodized aluminum chassis allowing for a 40% increase in battery life.


Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent.
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast

Little Snitch Firewall for macOS

  • On ·
  • By ·

As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to your benefit. But sometimes, like in case of tracking software, trojans or other malware, they don’t.

But you don’t notice anything, because all of this happens invisibly under the hood.

Little Snitch makes these Internet connections visible and puts you back in control of your Mac!


Orfox is a Tor Browser for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software libraries,
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options
Tutanota is the world's most secure email service, easy to use and private by design. With end-to-end encryption and 2FA, your emails have never been
ProtonVPN is a security focused VPN service, developed by CERN and MIT scientists. Use the web anonymously, unblock websites & encrypt your connection. Unique Features
Linphone is an open source SIP phone for smartphones, tablets and desktop platforms. Linphone provides voice/video calls and instant messaging, and is available for mobile
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
Silent Pocket's flagship Faraday sleeves give anyone the ability to disappear from the grid with our patented radio frequency (RF) Faraday cage. Signal Blocking Device
DuckDuckGo does not store your personal information. Ever. Their privacy policy is simple: they do not collect or share any of your personal information. DuckDuckGo
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Firefox Focus brings added privacy by allowing you to block known website trackers by category: Ads, analytics and social trackersOther content trackers – this category
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Forget about credit card fraud, data breaches, or having to update billing information at all the services you use when a card gets hacked. Foil
The only modern smartphone you can (truly) own. Smartphones have become the single most significant piece of technology in our lives, a gateway to the
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
CryptPad is a private-by-design alternative to popular office tools and cloud services. All the content stored on CryptPad is encrypted before being sent, which means
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Protect your privacy online and access media content with no regional restrictions. Strong encryption and no-log policy with 5000+ servers in 60+ countries. Get secure
Secure messenger for friends, families and small communities. Wire Personal is a secure, privacy-friendly messenger for personal use. It combines useful and fun features, audited
The Mission Darkness FreeRoam Faraday Belt Bag is a stylish waist pack perfect for travel and everyday wear. The large interior compartment is lined with
/e/ OS is a complete, fully “deGoogled” version of Android. /e/OS is an open-source mobile operating system paired with carefully selected applications. They form a
MySudo is your private identity for the digital world. Sudo identities are a digital extension of you that shield your personal and private information from
Stripped down to the basics, the Silent Pocket Napa Leather RFID Blocking Simple Card Wallet is perfect for business travelers and others on the go.
Over the last ten years, mobile phone evolution has made them our daily companions, within reach at all times. But they have also quietly transformed
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
A free, open-source, and completely encrypted notes app. A writing experience unlike any other. Standard Notes is free to use on every platform, and comes
The Firefox Multi-Account Containers extension lets you carve out a separate box for each of your online lives – no more opening a different browser

Nextcloud

  • On ·
  • By ·

Your cloud, your rules!

Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at home, at one of our providers or in a data center you trust.

Nextcloud gives you access to all your files wherever you are. Where are your photos and documents? With Nextcloud you pick a server of your choice, at home, in a data center or at a provider. And that is where your files will be. Nextcloud runs on that server, protecting your data and giving you access from your desktop or mobile devices.

Through Nextcloud you also access, sync and share your existing data on that FTP drive at school, a Dropbox or a NAS you have at home. Nextcloud is free, open source and you can get involved in making it better!


Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent.
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast

Darter Pro Linux Laptop by System76

  • On ·
  • By ·

The Darter Pro by System76 offers an exceptional battery life, thin and lightweight chassis, 15.6″ Matte IPS Display, 8th-Gen Intel Core i5 and i7, and up to 32GB RAM.

The long battery life allows you to bring your personal office on a remote-work excursion and remove outlets from your sightseeing list. Travel light with the ultra-thin, featherweight chassis that won’t weigh you down. Enjoy the vivid graphics, crisp text, and true-to-life color that breathe life into Darter Pro’s 15.6″ Matte IPS display.

Take advantage of a versatile arrangement of ports, such as an SD card slot and microphone jack that are perfect for content creators. An HDMI and Mini DisplayPort bring you from desk to conference room seamlessly, and a variety of different ports will keep you armed for any scenario.

System76 Laptops run on Pop!_OS which is a Linux distribution designed for professionals and is easy to use making the transition from Windows or Mac extremely easy. Pop!_OS features automatic firmware updates on System76 laptops helping keep your pc secure and reliable.

Pop!_OS encrypts your installation by default and is the only distro that enables full-disk encryption out-of-the box from System76. Pop!_OS does not collect or store any information from user installations. Minimal OS and hardware version data is used (but not stored) to provide firmware and software updates and connectivity verification.


Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent.
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast