top of page
Gold Comet Blog


Cloud Computing Security: Data Protection and Gold Comet's Secure Cloud
Gold Comet: the best cloud security platform solution with quantum secure, patented data storage, data sharing, and messaging services.
Dec 28, 20222 min read
Â


How to Conduct an Email System Security Audit
Have you conducted a security audit to determine how vulnerable your system and communications may be to hacking?
Dec 21, 20223 min read
Â


Telework Security: How Gold Comet Creates a Safer Environment
With remote work becoming a mainstream practice, enterprises must mitigate the risks to telework security with proactive cyber solutions.
Dec 14, 20223 min read
Â


Data Protection and Security: How to Recover from a Security Breach (Part 4 of 4)
In this final article of the Data Protection and Security series, we will share actions you can take to Recover from a Security Breach.
Nov 30, 20224 min read
Â


Data Protection and Security:Â Password Usage and Safety for Emails (Part 3 of 4)
This post on data protection and security (Part 3 of 4-part series) explores best practices for strong password usage and email safety.
Nov 16, 20223 min read
Â


Data Protection and Security: Phishing, Smishing, and Vishing (Part 1 of 4)
Cybercriminals are getting more creative in the strategies they use to interfere with data protection and security.
Oct 25, 20225 min read
Â


How Secure is Your Messaging?
A secure messaging platform is essential for collaborating on proprietary projects, protecting the transfer and storage of sensitive data.
Oct 28, 20203 min read
Â


What Is Social Engineering?
Social engineering - a form of manipulation and psychological trickery to deceive others into divulging sensitive information.
Sep 25, 20203 min read
Â


What Is Two-Factor Authentication?
Two-factor authentication adds an extra security layer, requiring information beyond just your username and password.
Jul 28, 20202 min read
Â


Network Access Control: Blacklisting vs. Whitelisting
A discussion of blacklisting and whitelisting as network access control methods for protecting systems and data from malicious intrusions.
Jul 9, 20204 min read
Â
bottom of page
