Category: Privacy & Security

Search

6 Things You Might Not Know About Data Privacy But Should

Data privacy, and the sheer volume of data breaches and cyberattacks that prompt much of this coverage, you’d be forgiven for having privacy fatigue. But…

How Your Sudo Profiles Are Like Your ‘Stunt Doubles’

Every great movie star has a stunt double, right? You know, the other guy they send in when the risks are real and the stakes…

Where Do I Start When it Comes to Personal Privacy?

If this is a question that has gone through your mind, don’t worry: you’re not alone. According to the Cisco Consumer Privacy Survey, 43 percent of survey respondents don’t…

The Most Private Way to Use MySudo Virtual Cards

Privacy is primarily about the freedom and ability to exercise control over access to your personal information. In your online activities, two great principles for…

What is Digital Exhaust and Why Does it Matter?

Just as engine exhaust is residue from using a car, digital exhaust (or data exhaust) is residue from using the Internet.   Digital exhaust is all the information or ‘consumer data’ a…

The 7 Big Benefits of Using Virtual Cards in MySudo

We all know using a credit card online is risky business. In fact, using any of our personally identifiable information (PII) online is risky business,…

The 6 Big Benefits of Using the Phone Numbers in MySudo

You know how it goes: You fill in a survey. You give your name and phone number, sometimes even your zip code. Then the phone starts…

Why Your MySudo Virtual Card is More Private than a Bank’s Virtual Card

In an earlier article , you learned the six top privacy benefits when you use MySudo virtual cards: These strong privacy benefits are clearly superior…

Why Logging In With Google Or Facebook Is Never a Good Idea

There’s a tempting login option online called ‘social login’ which allows you to access a third party website using your existing social account IDs.   You’ve seen the buttons: ‘Log in with Google’ or ‘Continue with Facebook’…

The Limitations of Traditional PKIs in Meeting Enterprise Identity Management Needs

Public key infrastructures (PKIs) cover all elements of establishing and managing public key encryption, currently the foundational form of encryption used to communicate securely on…

Business Benefits of Decentralized Identity Tech for Customer Management

Businesses that recognize and seize the opportunity to use emerging standardized decentralized identity technologies for customer identity management will create a long-term competitive advantage that will enable them to leapfrog the competition and maintain their lead…

8 Strong Privacy and Security Features You’ll Find in MySudo

MySudo is a feature-packed privacy app. In fact, it’s the only privacy app on the market with private phone and video calling, text, email, browser, and…

Maintaining Personal Data Control Under the California Consumer Privacy Act

If you live in California or elsewhere in the United States, you may have heard of the California Consumer Privacy Act (CCPA). You might not…

How to be Agile and Resilient With Your Cybersafety Strategy

Picture a large and intricate spider’s web: hundreds of sticky threads, tightly and strategically woven into cross-hatched lines, poised to ensnare unsuspecting prey. Now picture…

How Sudos are Making Decentralized Identity Usable for Most People

Decentralized identity (also known as self-sovereign identity) is the future—and our secure digital identity, the Sudo, is opening up the possibility of decentralized identity for most…

Add Your Heading Text Here

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Add Your Heading Text Here

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Never Miss An Update

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.