Cybercrime is on the rise. More than 80% of all organizations have been victim to one or more successful cyberattacks in the past twelve months. That’s up from 78% in 2019 and 77% in 2018.

It is increasingly important that your organization take a more proactive approach to data security. If you wait until you’re attacked to respond, it will be too late.

Why You Need to Be More Proactive to Secure Your Data

When it comes to cybersecurity, you can take a reactive or a proactive approach. With a reactive approach, you wait until your organization experiences a data breach or cyber attack, then you take steps to deal with…


The COVID-19 crisis has dramatically changed how enterprises function. More employees are working remotely instead of on-site, but they still need to collaborate with co-workers and team members. Online communication and collaboration platforms like Wickr have helped employees keep in touch and collaborate on group projects, no matter where they are located.

Why Secure Communication and Collaboration Are Important

Wickr and other collaboration platforms are proving effective in connecting this new remote workforce. A study conducted during the height of the pandemic found that 82% of workers surveyed said their teams have effectively adapted to working remotely. In addition, more than 70% report greater collaboration with their…


Cyber threats are on the rise globally. News reports of data breaches are becoming more and more common, whether the affected party is a government agency, business, or an individual. If you need some motivation to take these threats seriously, check out these statistics:

  • The average cost of a data breach is $3.86 million.
  • It takes an average of 280 days to identify and contain a data breach.
  • 52% of data breaches were caused by malicious attacks, 19% were caused by compromised credentials and cloud misconfigurations, and nation-state attackers caused 13%.

It is no longer optional to prioritize the cybersecurity…


When we launched Wickr in 2012, we set out to put real messaging security in the hands of the average person. We built an app on a strong commitment to user privacy, state-of-the-art end-to-end crypto, and security engineering and made it all easy enough for a 3-year-old to use (one of our early tag lines). We also set out to change the status quo in messaging apps from default save to default delete, and in so doing, introduced the concept of ephemerality as a security control.

Recently, some great lawyers and friends of mine published a public comment version of…


Your organization’s security posture refers to the overall strength of your cybersecurity. Security posture involves many things, including your organization’s ability to protect data, apps, infrastructure, and more from breaches and cyber attacks. How should you define your organization’s security posture? Put simply: it’s a combination of control and compliance.

Why is Your Security Posture Important?

How vulnerable is your organization to outside threats? A strong security posture is necessary to detect and prevent intrusions, data breaches, and the theft of valuable intellectual property.

A weak security posture means that your organization is at undue risk of compromise. It’s important to note that a weak security…


Your organization’s security posture refers to the overall strength of your cybersecurity. Security posture involves many things, including your organization’s ability to protect data, apps, infrastructure, and more from breaches and cyber attacks. How should you define your organization’s security posture? Put simply: it’s a combination of control and compliance.

Why is Your Security Posture Important?

How vulnerable is your organization to outside threats? A strong security posture is necessary to detect and prevent intrusions, data breaches, and the theft of valuable intellectual property.

A weak security posture means that your organization is at undue risk of compromise. It’s important to note that a weak security…


As a Nation, we cannot effectively expand the competitive space to mitigate near-peer competitors from executing large-scale cyber intelligence or attack operations without a “whole-of-society” approach to cyber risk. The recent SolarWinds supply chain compromise — potentially impacting at least 18,000 organizations — has made this clear. We must move beyond simple cyber threat information sharing and take a more real-time, collaborative approach to cyber risk by leveraging the collective authorities, visibility, expertise, and expert capabilities of our entire society: government, academia, and industry.

Many organizations leverage some form of cyber risk analysis to inform their overall risk posture, determine…


The cybersecurity industry relies on dedicated people with a specialized skill set. These skills are typically learned as part of a comprehensive Science, Technology, Engineering, and Math (STEM) education. Without a strong STEM educational program, the cybersecurity industry will be unable to fill all of the positions set to develop over the next several years.

Why STEM Education is Important

STEM represents a cross-disciplinary approach to education. In a STEM program, students take classes that integrate across all four of these areas, then apply what they learn in real-world projects.

STEM education today starts at the elementary school level. Thousands of elementary, middle, and high…


In a world where news of a widespread cyber attack is becoming commonplace, it’s important that your employees receive cybersecurity training regularly. Without proper training, your employees can make innocent mistakes that can have huge consequences for your company’s data security.

Why Your Company Needs Cybersecurity Training

Your employees need training in cybersecurity because they’re not perfect. They may not always be thinking about cybersecurity, or they may get careless. And sometimes, your employees can make mistakes — and employee mistakes can cost your company, in the form of expensive data breaches.

Research shows that 88% of data breaches are caused by employee mistakes. These breaches…


Enterprises, government contractors, the military — what do they all have in common? Their success relies on good communication. Employees and consultants need to collaborate with one another wherever they’re located, and they also need to easily communicate with different offices and outside vendors.

But with cybercrime on the rise, it’s important that these communications are totally secure, without any opportunity for malicious actors to intercept text messages, listen in on voice calls or video conferences, or steal shared files.

Not wanting to become victims of the next headlining breach, organizations are looking for a secure communications solution — and…

Wickr

Secure Ephemeral Communications. Built for the enterprise. End-to-end encrypted messaging. Secure rooms. Peer-to-peer encrypted file sharing. Multi-platform.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store