March 5, 2018
AxCrypt Business
AxCrypt Business
File security for your team – made easy
Is your company’s personal data stored securely, whether on-premise or cloud-based? AxCrypt now offers file security for businesses – with 256-bit AES encryption. Sharing files with the rest of the team is award-winning easy with our cloud storage awareness and key sharing feature for on-premise files. AxCrypt Business allows you to purchase and manage licenses for your company.
With AxCrypt Business, you also have access to our Password Management – where your team can store and manage passwords and codes securely. AxCrypt is multilingual; currently supporting 12 languages and more to follow. We also offer Mobile Apps for you to open your encrypted files when away. More exclusive Business Features are coming soon. Don’t miss out!
The EU General Data Protection Regulation
Are you ready for the enforcement of the GDPR – May 25th 2018?
“In order to maintain security and to prevent processing in infringement of this Regulation, the controller or processor should evaluate the risks inherent in the processing and implement measures to mitigate those risks, such as encryption.” – GDPR Recital 83
The GDPR was designed to protect and empower all EU citizens data privacy, and to reshape the way organizations across the region approach data privacy. Organizations have to make sure that their personal data is stored securely, whether on-premise or cloud-based. The good thing about using file encryption; secured data that is stolen during a breach will be rendered useless.
We hear about data hacks or leaks daily nowadays. Since 2013, nearly 10 billion data records have been lost or stolen. Only 4% were “Secure Breaches”, where encryption was used and the stolen data was rendered useless. Companies need to rethink their data safety models and plans, in order to minimize the chances of risking the high anti-compliance fines of 4% of their global turnover or €20 million; whichever is greater.
Most breaches were cases of Identity Theft (SSN, ID number, names, medical records, etc.) The sources were mostly malicious outsiders, usually referred to as “hackers”. The industries that suffered the most breaches include healthcare, financial, education, retail and government.
Follow us on social media
Do not hesitate to contact us if you need any further information.
Community forum • FAQ • Support email
Thank You for using AxCrypt!
– The AxCrypt Team