Tag: Privacy

Reading Time: 6 minutes

Introduction

In this article, we will be exploring GnuPG or GPG as it is more commonly known. We will discuss if this software platform is still needed, if it will still be useful in the future, and how to install and utilize it. 

Continue reading →
Reading Time: 10 minutes
what is blockchain

The idea of blockchain itself may sound complicated, but the premise is simple. Blockchain is a zero-trust, fully decentralized peer-to-peer data storage system that spreads verified information across participants in the chain, referred to as nodes. Blockchain stores this information in blocks that are chained together. As new data arrives, it is recorded into a block. Once a block has been filled with information, it is linked to the previous block. This process allows the data to be bound together in sequential and chronological order. 

Continue reading →
Reading Time: 7 minutes

This article will discuss the methods to send information securely over email using GPG/PGP as the main encryption tool. The difference between PGP and GPG is mainly that PGP is a proprietary solution controlled by Symantec, and GPG is the open-source standard that is defined by RFC 4880. Functionally, each format is virtually identical due to GPG being the offspring of the original PGP standard. Because there are numerous email clients, specific GPG settings will vary. For this tutorial, we will use Gmail and Thunderbird as examples. 

Continue reading →
Reading Time: 7 minutes

What is the Browser Cache?

The browser cache is used for storing website data like HTML, CSS, JavaScript, and images. Caching is a method of storing data that can be used later. Like other programs that you may have installed, browsers use caching to store website data on your computer instead of requesting the data from a web server to make web pages load faster.

Continue reading →
Reading Time: 10 minutes

What is GPG?

GnuPG (or Gnu Privacy Guard) is an adaptation of an earlier encryption standard known as PGP (or Pretty Good Privacy). GPG uses the method of "public" and "private" keys for the encryption and signing of messages or data.

Continue reading →
Reading Time: 6 minutes

HIPAA-Compliant Hosting provides a foundation for healthcare providers to build applications and services that comply with the Health Insurance Portability and Accountability Act (HIPAA) of 1996, which safeguards themselves and their client’s Personal Health Information (or PHI). Anyone who has access to PHI is required by law to follow these rules and regulations to protect the healthcare data's privacy in their charge. 

Continue reading →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434