AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Cyberghost dedicated ip token12/18/2023 ![]() What you do online is your business only. ![]() Not even we know what dedicated IP is assigned to you, so we can’t ever trace your activity back to your account. With our innovative token-based dedicated IP system, we ensure you get superior privacy. We know sometimes you need a static IP that only you can access. You can read the full report in your CyberGhost VPN account. We’re happy to announce that after an extensive review on our systems, Deloitte found that we abide by our strict No Logs policy. For this, Deloitte inspected our VPN server network, its configuration management, and our token-based dedicated IP system, and examined to which extent these match our privacy policy. We invited Deloitte, one of the Big Four global firms, to conduct an independent audit and review our No Logs policy. We don’t want to bore you with the nitty gritty technicalities of code writing, so we’ll focus on our more substantial achievements. Looking ahead at our mission of providing powerful security tools, we’ve been busy behind the scenes. We can actually see the sudden downturn starting August. This is something we haven’t seen since January 2020. Most notably, in August we didn’t receive any requests. The monthly breakdown look like this: JulyĬompared to our previous edition, police requests decreased by 55%. This edition, they account for 0.1% of requests. Police RequestsĪs usual, police requests make up the tiniest fraction of overall requests. We’ll be monitoring the situation further. Our team’s efforts led to a 28% decrease in malicious activity flags in September. We try to mitigate abuse on our servers usually by blocking offending ports and domains. One of the largest private providers of correctional healthcare in Georgia and Louisiana, CorrectHealth.North Dakota Workforce Safety & Insurance.Cybersecurity experts estimate that around 97 million accounts were breached this month. Cybercriminals were predominantly busy targeting various state institutions and large corporations. The number of cyberattacks increased globally since the Russian invasion into Ukraine, and August had a notable spike in cybersecurity incidents. We can notice a sixfold uptake in July, and a sudden increase in August.Īugust 2022 wasn’t a good month for cybersecurity. They make up 44.6% of all requests we received these past 3 months: JulyĬompared to 4,726 activity flags in our Q2 report, that’s a staggering 1535% increase. Distributed denial-of-service (DDoS) attacks.We receive malicious activity flags for different types of cyberattacks, including: Let’s go through each category one by one for more details. And in this Transparency Report we want to show you what steps we take to continuously secure your data. It’s why we built the tools to keep you and your data safe and private online. We don’t know anything about you or what you do on our servers, and it’s just how we like it. We abide by a strict No Logs policy, and follow Privacy-by-Design principles, which means our service is specifically configured to prevent storing user data. W e’re completely unable to comply with these requests. ![]() The vast majority of these requests often ask for some form of user data.
0 Comments
Read More
Leave a Reply. |