should be of high-quality |
While it is well known that letters can be
intercepted and phone lines can be tapped, it is not so
well known that even e-mails can be easily read. In fact
it is commonly believed that the login password provides
privacy and security.
This is not actually so!
Any employee of the Internet Service Provider (ISP) that
you you use, can tap into your e-mail at your end or
that of the recipient with the use of fairly basic
equipment. Tapping can also be done by anyone who links
up to the dozens of Internet routers through which your
The mail can even be accessed by someone at the phone
company's office or a hacker who taps in through them.
There are also a number of more
sophisticated methods and a wide range of equipment by
which all electronic communication can be intercepted.
These are used primarily by government agencies, but can
also be employed by business rivals and competitors.
Such agencies can also use specially designed
software that can automatically search all e-mails and
faxes passing through a particular phone network for
keywords, or analyze phone calls digitally. So even if
you are using unlisted numbers, or public call offices
and cyber cafés, your communication can be traced
and intercepted by picking up commonly used terms or
Each time you work with sensitive data, or wish to
communicate with someone else confidentially, well, you
should use encryption software (like ours) to protect
Ensure that all you stored information is also encrypted
so that it is safe from the eyes of snoopers,
competitors or uninvited investigators.
And when getting rid of old files or data, don't just
delete them, use the built in Shred function
in the program to be absolutely safe.
Please see Comparison Chart of
encryption software presented on this page