• LinkedIn
  • Facebook
  • Twitter
  • Instagram
Blog | JoMo Mail
  • Home
  • Pricing And Signup
  • Blog
  • Contact Us
  • Admin
  • Webmail

Tips

News

What exactly is JoMoSecure?

JoMoSecure is one of our additional modules here at JoMo we created for our users, so we are here to explain how it works.

By JomoBlog, 4 years4 years ago
News Technical

Encryption | What is it, and why is it important?

We’ve mentioned encryption and the importance of it, numerous times in our blog, plus we use it ourselves in our email service. But why is it so important to online security? Let us first approach this with what it is. What is encryption and how does it work? Encryption is Read more…

By JomoBlog, 4 years4 years ago
Technical

What is a VPN? | Best, Free VPN’s for Safety

A VPN, or Virtual Private Network if we’re being technical, is an increasingly popular term heard online in recent years, but what is it, and what is the point in a VPN? Well, first. A VPN works by creating a private network between your device, and the VPN provider’s server, Read more…

By JomoBlog, 4 years4 years ago
Technical

GDPR – The Meaning and Principles.

Let’s talk about the GDPR, aka, the ‘General Data Protection Regulation’ The GDPR has been around since the 25th of May 2018, with its predecessor being the Data Protection Act 1998 (DPA 1998) and is pursued with the goal in mind to protect those online in the EU. The meaning Read more…

By JomoBlog, 4 years4 years ago
Technical

The Best, Free, Private Browsers.

When it comes to browsers, there is many to choose from; with Google Chrome, Safari, and Microsoft Edge being some of the most used and notable. (with Google Chrome taking up 49.6% of the market according to the DAP) But are they safe? The answer is, not particularly. There are browsers Read more…

By JomoBlog, 4 years4 years ago
Technical

Phishing 101 – A Guide to Online Protection

What is phishing? Definition of phishing: a scam by which an Internet user is duped into revealing personal or confidential information which the scammer can use illicitly. A simple definition, and a too often used technique by cybercriminals to steal and gain information from individuals and companies. One of the Read more…

By JomoBlog, 4 years4 years ago
Recent Posts
  • Two-Factor Authentication
  • Hardware sustainability in IT
  • JoMo Mail – Cloud Storage
  • Paying for Free – Why we’ve removed free accounts
  • No Such Thing As Free Lunch – Your Data & Big Tech
Archives
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • December 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • February 2020
  • January 2020
Categories
  • News
  • Technical
  • Website

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram