
Business Continuity by Data Recovery – How the Cloud Helps Securing your Business Data
Business continuity (bcm) and disaster recovery have always been crucial management disciplines. With the increase in importance of data for conducting business, data recovery became a crucial aspect of bcm. We scrutinize security aspects of cloud backups.

GDPR Compliant is Not Enough – Privacy and Data Security at the 3 Biggest Cloud Providers
We compared the security setup and privacy of the three biggest business cloud storages OneDrive for Business, Google Drive and Dropbox Business, especially their server security, encryption, and possible security issues.

Interview with Red Goat Cyber Security Founder Lisa Forte
Boxcryptor interviewed Lisa Forte, founder of Red Goat Cyber Security and winner of the Top 100 Women In Tech Award, on the issues of pen testing, war gaming, social engineering and diversity in the tech industry.

How to Make the Best Out of Microsoft OneDrive - Top 5 Use Cases for Business and Private Users
Microsoft is offering 5GB of free OneDrive storage for every Microsoft account. But OneDrive is much more than your ordinary cloud storage. We explain in our top 5 use cases how OneDrive can be used to share and synchronize files.

Boxcryptor now supports WebAuthn and security keys for 2FA. This article describes how to use a YubiKey or other security keys to secure your Boxcryptor account with 2-factor authentication.

The special electronic lawyer mailbox (beA)
The special electronic lawyer mailbox (short beA for "besonderes elektronisches Anwaltspostfach") is a software, required by German law to be used by lawyers for communication. This mandatory piece of software, however, has some major security flaws.

The American CLOUD Act
With the introduction of the CLOUD Act, the U.S. government is declaring war on European data protection regulations by strongly contradicting the GDPR - encryption protects data from unauthorized access.

Top 5 Causes of Data Loss and How to Protect Yourself
These are the biggest risks for data loss and the strategies to eliminate these risks (with infographic).