Blog

Stay informed with our latest publications.

How Spam Filtering Works

How Spam Filtering Works: A Comprehensive Guide

It is difficult to imagine contemporary emailing without spam. Whenever you leave traces of an email address, there is a chance to receive junk email after some time. In most cases, they are just annoying. However, they can contain malware, explicit content, and different types of false information.  Back in 2011, around 80% of e-mail […]

July 22, 2024

Data Loss Prevention

What is Data Loss Prevention (DLP)? Definition, Types & Tips

Imagine you’re sending out an important email containing sensitive company information. Just as you hit “send,” a weird feeling washes over you – did you remember to attach the right file? What if it lands in the wrong hands? Well, this scenario, and many others like it, underscore the critical need for robust Data Loss […]

June 13, 2024

How to Secure Your Mac

How to Secure Your Mac: 6 Ways to Make It

Apple computers and state-of-the-art technology go hand in hand. For both casual and advanced users, it seems that Macs have no faults. It’s true that their price is worth it for the most part. You pay a premium for premium features. On the other hand, such a mindset doesn’t necessarily translate into making the most […]

June 12, 2024

Gmail launch

The Top Email Security Software Solutions for 2024: Features and Comparisons

These days, email cyberattacks are stronger than ever. A wide range of businesses and organizations who rely on email communication daily should prioritize robust security measures. In this article, we’ll explore the essence of email protection software and overview the best solutions in 2024. Common Email Cyberattacks In today’s digital age, email security threats are […]

May 29, 2024

the concept of email safety

Understanding Secure Email Gateways: An Introduction for Beginners

Most of our work operations are online today. We transferred the majority of our business communication to digital platforms. Email is probably one of the most popular means. Just like any other virtual channel, it can be pretty vulnerable. There’s always a possibility of cyberattacks. That’s why proper protection is so necessary. You need to […]

April 8, 2024

email safety concept

Implementing Encrypted Email Services in Business Environments

There’s no doubt that our world is turning digital. The majority of companies today conduct their business operations online. Work, payments, communication – everything is virtual. Virtual assistant businesses are thriving globally as remote work is encouraged universally. Email remains the most popular instrument for professional communication. It’s followed closely by digital business card, revolutionizing […]

March 5, 2024

E-mail

Are Disposable E-mail Addresses Really Safe to Use? Uncovering the Risks and Benefits

In today’s digital world, we’re bombarded with e-mails. From important notifications to unwanted marketing messages, our inboxes can be overflowing. This is where disposable e-mail addresses come in. These temporary e-mail addresses, often generated by free online services, promise to shield you from spam, protect your privacy, and offer anonymity online. But are they truly […]

February 9, 2024

Effective Strategies for Phishing Protection: A Practical Guide for Businesses

We’re living in a century where fishing isn’t just about casting a line and waiting for a nibble. Ever got that email claiming you won the lottery in a country you’ve never been to? Or maybe that urgent message from your bank asking for all your sensitive info? Yeah, we’ve all been there. And let’s […]

February 2, 2024

8 Ways to Secure Email Communication for Cryptocurrency Transactions

Email serves as a fundamental means of communication in the cryptocurrency landscape. It is the conduit through which traders, investors, and stakeholders exchange crucial information regarding transactions, updates, and account details. However, without adequate security measures, these communications are vulnerable to exploitation by cybercriminals. So, secure email communication is imperative for establishing trust within the […]

November 30, 2023

Email Deliverability: Best Practices for SaaS Companies

In the digital age we live in today, there’s no shortage of media channels. And yet, emails do not die and remain to be the cornerstone of communication, especially for SaaS companies. According to Statista, the number of emails sent daily is predicted to increase from $306.4 billion to $376.4 billion in 2025, which shows […]

Your Guide to Android Permissions: When to Accept and When to Refuse App Permissions?

Does this message look familiar? Most apps out there will ask for access to some of the features on your phone the first time you open it. This can be location, camera, microphone, photos, phone calls, messages and more. Here’s the question: should you always allow Android app permissions? In this article, we’ll show you […]

The Educator’s Guide to Student Privacy: How to Protect Student Data?

The notion of what counts as “student data” has changed drastically in the last few years. While before student data referred mostly to the student’s name, address, age, demographics, what course they’ve taken and their final grades, with the spread of information technology, including computers and mobile devices and the students themselves generating huge amounts […]

Can Someone Track My Phone Even if I Have Location Tracking Off?

Most people today can’t live without a mobile phone in their pocket. Everywhere they go, they absolutely must carry it with them or they will miss the most important phone call of their life or someone will post something monumental on social media. The truth is that the world will keep spinning even if you […]

CTemplar Recognizes Protonmail’s OpenPGPjs Maintenance

Edward Snowden stated: “Encryption, is the single best hope for fighting surveillance of any kind. If all our data, including our communications, were enciphered in this fashion, from end to end…then no government—no entity conceivable under our current knowledge of physics, for that matter—would be able to understand them.” OpenPGPjs is a method of encrypting email […]

Our pricing explained

Why the Price? Providing an encrypted email service costs money. Some companies, like Gmail and Yahoo, offer free email because they profit from collecting and selling your personal information. We charge a subscription fee because we do not sell our users data and because it costs money to maintain the code and servers.  We have the […]

Android App Open Beta Available

We are pleased to announce that we have launched our Android mobile app for beta testing. The app is available for all Android users by visiting the Google Play store. You can also find it by clicking this link. Open Source Android Code – We are doing an audit of our Android code during open beta testing.  […]

CTemplar Whitepaper

You can download our whitepaper here! Latest revision on: April 4th of 2022 Name: CTemplar Whitepaper.pdf Size: 518487 bytes (506 KiB) SHA1: 1ac150c0377aa6f781dffa050486ad3b1264e88c SHA256: b31159c77f7ef7a952cfc678dc9a7279b89c49bb35b965199657130e20dda791 BLAKE2sp: ab00ad343d7bce07047ddb1224ffbb774f48e108baddfeb09409f4d6249971ec

Privacy as Seen Through Fourteen Eyes

The history of citizen surveillance boils down to one simple theory: The more eyes you have watching citizens both friend and foe, the easier it is for governments to maintain peace and order. The first two countries in the world to recognize and implement this method of collaborative surveillance were the U.S. and U.K., who […]

CTemplar’s 4 Wall Protection

4 Wall Protection was defined by the CTemplar team with the goal of helping people review their privacy needs. Imagine that your privacy is a four-walled fortress. If a wall is missing, then an enemy can quickly get into your fortress. Therefore it’s vital that you make sure you receive adequate protection in the places […]

Zero-censorship policy

We pledge to our community that we will not use censorship to hide negative press about our company.  Instead, we will publish negative or unedited articles about our company on this page with credit to the author/researcher.  If you do not see an article that you feel should be here please email us at [email protected] to have […]