Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

No cookies to display.

The Biggest Risk to You and Your Company’s Privacy is Your Smartphone

Share Your Thoughts: Facebooktwitterlinkedin

65% of IT decision makers believe end-user negligence is the major risk to mobile security.*

52% say security practices on mobile devices have been sacrificed in order to improve employee productivity.*

*Source: Ponemon – “Security in the New Mobile Ecosystem” (Sponsored by Raytheon)

For Data Privacy Day 2015, Silent Circle’s had everyday people on the street read some of their apps’ permissions out loud and caught their reactions.

While it must be considered that many of the apps referenced need permissions for core functionality to work, it is not always true that broad permissions are required. Do you know what permissions you’re granting?

Watch the full video and learn more at http://bit.ly/privacyproject #privacyproject #DPD15  

Who are Silent Circle?

In 2011, Mike Janke, former U.S. Navy SEAL and security specialist, approached Phil Zimmermann, cryptography legend (Internet Hall of Fame inductee; creator of PGP and ZRTP) about a partnership to create the world’s first communications network built for privacy. Jon Callas, creator of Apple’s Whole Disk Encryption, joined as CTO and Silent Circle’s founding team was made.

What is Silent Circle?

An encrypted communications service with easy-to-use tools available to all who appreciate a little control over who has access to their conversations. Silent Circle says they have matured into the world’s most trusted solution for mobile privacy serving individuals, businesses, and governments in over 130 countries with a truly revolutionary ecosystem of software, services, and devices. Learn more about Silent Circle, headquartered in Switzerland with employees in eight countries – https://silentcircle.com/

Share Your Thoughts: Facebooktwitterlinkedin