We are pleased to share that Wickr has been acquired by Amazon and is now part of the Amazon Web Services (AWS) team. We’re proud to have created highly trusted, secure communication solutions for messaging, video conferencing, file sharing, and more. From our founding ten years ago, we have grown to serve organizations across a wide range of industries, all over the world. Together with AWS, we look forward to taking our solutions to the next level for our customers and partners. Learn more here →

Category: Crypto/Security

How to Build a Secure Collaboration Framework for Your Team

Collaboration is essential to any team’s success, and secure collaboration is necessary to protect your organization’s assets and communications. To enable and encourage teamwork within your organization, you need to build a secure collaboration framework for both data and communications. Understanding Collaboration Security Collaboration security is similar to traditional data

Read more →

How to Take On a More Proactive Approach with Data Security

Cybercrime is on the rise. More than 80% of all organizations have been victim to one or more successful cyberattacks in the past twelve months. That’s up from 78% in 2019 and 77% in 2018. It is increasingly important that your organization take a more proactive approach to data security.

Read more →

5 Ways Enterprises Should Communicate and Collaborate Securely with Wickr

The COVID-19 crisis has dramatically changed how enterprises function. More employees are working remotely instead of on-site, but they still need to collaborate with co-workers and team members. Online communication and collaboration platforms like Wickr have helped employees keep in touch and collaborate on group projects, no matter where they

Read more →

A Guide to Threat Intelligence Best Practices

Cyber threats are on the rise globally. News reports of data breaches are becoming more and more common, whether the affected party is a government agency, business, or an individual. If you need some motivation to take these threats seriously, check out these statistics: The average cost of a data

Read more →

Control and Compliance: How to Define Your Security Posture

Your organization’s security posture refers to the overall strength of your cybersecurity. Security posture involves many things, including your organization’s ability to protect data, apps, infrastructure, and more from breaches and cyber attacks. How should you define your organization’s security posture? Put simply: it’s a combination of control and compliance.

Read more →

The Future of Cybersecurity Depends on STEM Education

The cybersecurity industry relies on dedicated people with a specialized skill set. These skills are typically learned as part of a comprehensive Science, Technology, Engineering, and Math (STEM) education. Without a strong STEM educational program, the cybersecurity industry will be unable to fill all of the positions set to develop

Read more →

7 Key Points to Include in Your Company’s Cybersecurity Training

In a world where news of a widespread cyber attack is becoming commonplace, it’s important that your employees receive cybersecurity training regularly. Without proper training, your employees can make innocent mistakes that can have huge consequences for your company’s data security. Why Your Company Needs Cybersecurity Training Your employees need

Read more →

Wickr is the Most Secure Communications Solution — and Here’s Why

Enterprises, government contractors, the military — what do they all have in common? Their success relies on good communication. Employees and consultants need to collaborate with one another wherever they’re located, and they also need to easily communicate with different offices and outside vendors.  But with cybercrime on the rise,

Read more →

7 Steps to Take During a Cyber Attack

If your organization becomes the victim of a cyber attack, what steps should you take? With cyber attacks on the rise and cybercrime expected to cost $6 trillion globally in 2021, it’s important that you have a plan for how to respond if your company is attacked. Detecting a Cyber

Read more →