The Private WiFi Blog Blog

Private Communications Corporation Unveils DataCompress for Android, Reduces Mobile Data Consumption by up to 50%

Private Communications Corporation (PCC), the leading provider of Internet security and mobile optimization utilities for consumers, today has officially launched its data compression product, DataCompress for Android. Android users across the world can now download the application from the Play Store to cut mobile data use by up to 50%*.

Introducing DataCompress: A Data Savings App for your Mobile Device

Is your phone a data hog? If so, we have some good news. The makers of PRIVATE WiFi, have a new product on the market to help users improve their Internet experience. With the launch of DataCompress, Android users can cut their mobile data use by up to 50%*. This new app let’s you get the right-sized content, fast! This means using less of your plan as you get more value out of it.

Cyber Security Training Just As Important at C-Level

The need for better online safety training to prevent data breaches is a hot topic right now. Coupled with stronger computer and network policies, companies want to prevent the hacking events that leave businesses susceptible to a data breach. While it’s no secret that employees in both the private sector and government service can unintentionally expose organizations to hackers, what is surprising is a report by Wombat Security that shows that 33% of CEOs fell for phishing attacks that led to network access. Why are they falling for this kind of internet activity?

E-filing: The Fastest and Safest Way to File Taxes?

E-filing your annual return to the IRS offers speed and convenience and when coupled with industry-approved software that can plug in the values for you, a lot of the headaches traditionally associated with doing your taxes are eliminated. However, there are some potential dangers that you should be aware of, such as insecure public WiFi networks and online tax fraud.

How Are You Celebrating Safer Internet Day 2015?

Safer Internet Day (SID), which falls on February 10th this year, helps promote safe and more responsible use of technology and mobile phones, especially for young children and teenagers.  This day of awareness and education gets more important every year because, for better or worse, the Internet is a part of our everyday lives.

Read on to get more involved.

Managing BYOD Security Threats: VPNs Mitigate The Risks

It’s clear that the era of BYOD is here to stay. Workers are no longer confined to an office desk and computer, and instead are able to do work from anywhere: home, their local coffee shop, and while taking public transportation. The proliferation of public wireless networks has made this possible, and while this has freed employees up to do work from nearly everywhere, it also has introduced many security challenges.

Identity Protection: 5 Tips to Stay Mobile Secure in 2015

Living a mobile lifestyle does not come without risk, especially where your identity is concerned. But staying mobile secure doesn’t have to be complicated. Consider this: 94.2% of identity victims say they are still highly engaged online and via their mobile devices despite having had their personally identifiable information stolen, according to a recent study from The Identity Theft Resource Center.

So how do we stay safe? Just follow these five tips!

Don’t Get Hacked At CES

It’s that time of year again – when more than 150,000 gadget geeks, techies and businesses from around the world descend on Las Vegas for the mother of all trade shows – the International Consumer Electronics Show. With over 3,200 exhibitors previewing and showcasing their high tech products, CES is the perfect place for tech enthusiasts to network. So you’d think it would be safe for attendees to connect their laptops and mobile devices to the event’s public WiFi hotspot.  But you’d be wrong. Like most big events, CES can be a hot spot for hackers.  If you’re going to be there, make sure you don’t become a target.

Don’t Give Your Data Away: Blur Your Passwords, Payments, and Privacy

Now is the time to make your online activity a blur. Why? Here are some startling reasons: In the last 18 month, over 157 million US credit card holders have been notified of a breach. Furthermore, the typical web surfer is tracked by 11 companies at each site they visit – resulting in over 2,500 unique tracking and data collection attempts weekly. This is the new reality of the Internet in 2014 – and as 2015 approaches, the treat level will only increase.

Holiday Shopping Goes Mobile: Be Cyber Secure [INFOGRAPHIC]

As the holiday shopping bustle approaches, don’t just think about buying the perfect gift and getting a great deal. For a happy and healthy season, remember that being cyber secure when you make your holiday purchases online is just as important!

This year PRIVATE WiFi has teamed up with the National Cyber Security Alliance to help consumers be safe online when using their mobile devices are they shop. Check out our infographic learn more about the the threats of holiday shopping on the go and follow our five tips for cyber secure shopping.

ITRC Victim Impact Survey Findings LIVE Event

On Wednesday, October 29, learn about the ITRC’s most recent survey report, “Identity Theft: The Aftermath.” A panel of experts will discuss the survey’s key findings, with a special emphasis on the emotional impact of identity theft on victims, and ways in which the industry as a whole can leverage this information to better serve victims and consumers.

Can’t make it to the event in Washington, DC, but want to be involved? Join in live on Twitter and follow along with the hashtag #IDTheftImpact. Keep reading for more details about this very important event.

WiFi Footprint: Personal VPNs Endorsed as WiFi Hotspots and Autoconnect Functionality Proliferate

“WiFi footprint” is a simple term for a complex issue: the exploding pace of WiFi hotspot creation is not abating and soon a roamable, global alternative network will become our reality.

In a world seemingly saturated in WiFi, the notion of autoconnecting to these networks might seem appealing. However, whether using a laptop or mobile device, security threats remain a constant.