Data encryption is still essential part of on-line protection

Data encryption is still essential part of on-line protection

16-05-2012 11:18:00

A summary report of Internet security threats in 2011 reveals that SSL certificates are still accepted by IT specialists as one of the basic elements of e-data protection. Symantec warns: 232 million identity has been stolen in 2011.

Besides identity theft, number of attacks on computer systems is also alarming. 5.5 billion threat coming from websites and e-mails was blocked just in 365 days. Thus, in comparison to 2010 the number of infected sites grew by 81%. Most malware was detected on blogs, personal websites and also business, sales and education services. Symantec experts have found 403 million types of malicious programs.

The report indicates that using SSL certificates for online data transmission protects users against risks above-mentioned and also against the increasing incidence of attacks such as Man In The Middle. https:// protocol has been also listed as one of the main elements of users education for online safety.

In the summary you can find tips for your safety:

  • especially avoid sending sensitive data over unencrypted Wi-Fi networks and public computers,
  • always use the https:// protocol when you log in and use e-mail, social networking sites and pages that require authorized access,
  • look for the green address bar, the https:// protocol and trust signs wherever it is necessary to send sensitive information.

The authors emphasize that the best solution for Internet users and website owners is using 2 options together: Always On SSL and EV SSL. The first one is a solution that connect with all pages site (not just login and registration) using a https:// protocol. In this way, the entire session is protected all the time. EV SSL certificate is the highest level of authorization of the owner. Thanks to this, the name appears in the address bar is highlighted green field.

A Symantec customer survey of internet shoppers in Europe, USA and Australia showed that the green address bar increases the feeling of security for 60% of respondents. In addition, results showed that 90% of Americans would not continue a transaction if they see browser information about insecure connection.

More details about the types of attacks in 2011, advices for owners about trusted e-commerce and more can be found on the Symantec report, "Internet Security Threat Report":

Recent Posts

Comodo / Sectigo is changing its Root CAs
28-12-2018 11:23:52

Sectigo, formerly known as Comodo CA, is entering the next phase of its transition: it’s replacing Comodo CA roots with USERTrust roots on January 14, 2019. Why it happens and what it will mean to Sectigo customers?

Comodo / Sectigo is changing its Root CAs
Comodo is now Sectigo
09-11-2018 12:54:30

According to previous announcements, a year after the acquisition of Comodo Group by Francisco Partners, on November 1 Comodo CA announced that from now on it is changing its brand to Sectigo [pronounced. sec-tee-go]. The goal of rebranding is consistency in company communication and better dedication to what Comodo is doing now.

Comodo is now Sectigo
European Cyber Security Month 2018
27-09-2018 10:46:21

The European Union Agency for Network and Information Security (ENISA), which is the center of knowledge about cyber security in Europe, organizes as every year in October the European Cyber Security Month. The campaign is starting in a few days. What is its purpose and how can you participate in it?

European Cyber Security Month 2018
more posts

cyber_Folks S.A. – Cookie settings

Do you like good cookies? We too! Some cookies are required for the website to function properly. Also accept additional cookies related to service performance, social networking and marketing. Cookies are also used to personalize ads. Thanks to them, you will get the best experience of our website, which we are constantly improving. The consent granted voluntarily may be withdrawn or modified at any time. More information about the cookies used can be found in our privacy policy. If you prefer to specify your preferences precisely - see the types of cookies below.

Functional (always active)

These are cookies that are necessary for the website to function. The website will not function fully properly without accepting these types of cookies. Example: A cookie that saves your consent or objection is needed so that we know if we have your consent for certain actions on the website, they will also allow you to log in to the Customer Panel, place an order or contact us via chat.

Analytical and performance

They will make it possible to collect information on how to use the website. These files will allow us to count visits and traffic sources to our site, so we can measure and improve its performance, as well as find out which pages are the most and least popular, and understand how visitors navigate our site. They help us analyze website performance and collect synthetic information. Example: We can make heatmaps, so we know which content is readable and which is not, and this allows for better website design. Thanks to them, we can also see which blog entries were read more often and which less often, which allows us to develop more interesting content. The main tool we use is Google Analytics.


It is social platform cookies that will enable you to be associated with your social media accounts. You can share content from our website there. Social network files (from third parties, such as Facebook) collect information to provide personalized advertising content. For example: Ads on your social media are better suited to you and you reduce the chance of seeing excess ads for already purchased services or products.


These are files related to the operation of marketing automation systems and ad accountability. Thanks to them, we limit, for example, the number of views of a given advertisement. They also allow us to perform comparative tests, thanks to which we constantly improve the operation of our website. By testing multiple page layouts, it is easier to get one that provides the best readability for users. Communication also becomes more personalized. For example, we may give you an article on how to find a domain name when we see that you are looking for a domain and it is difficult for you to find a suitable name. We can also, for example, show you a hint about logging in, if we see several unsuccessful attempts in a row. Based on the information from these cookies and activity on other websites, your interest profile is built. We mainly use the Google and Facebook advertising network.