Category: Blog

Business-ready Secure, Private Communication for Businesses – Free Offer

March 26, 2020 – As businesses shift to remote working and the COVID-19 virus brings about severe changes to business operations, people are left trying to figure out a game plan. … Read More

Email Phishing Attacks, Explained

The LockDown Low Down – Simplifying Cybersecurity for Smart People who aren’t Cyber Experts Have you ever received an email that encouraged you to click a link, and you decided … Read More

Zero Trust: Worth the Hype?

One of the most buzzworthy infosec terms in recent years is Zero Trust. If they hand out buzzword bingo cards at the next security conference you attend, you can almost … Read More

5 things Manufacturing Companies Love about LockDown

One of the industries we serve is manufacturing. LockDown helps manufacturing companies protect and control confidential documents and sensitive communication that flow through their supply chains. Here are a few … Read More

Thank you early adopter beta users!

    About LockDown LockDown is pioneering a new standard for digital privacy, identity and data control. The first product available to the public, LockDown, is a secure communications app … Read More

LockDown Unveils its Patented Cybersecurity App for iPhone Users

Columbus, Ohio, June 28, 2019 – LockDown, a disruptive company that is pioneering a new standard for data control and digital ownership, today announced that its LockDown app is available … Read More

Q&A with Bret Adams, Agent to Entertainment and Sports Celebrities

Bret Adams is an accomplished lawyer practicing for nearly 35 years. He represents national celebrities, and has appeared on CNN, ESPN, CBS, ABC, FOX and NBC.   Having negotiated some … Read More

One Day in Times Square

By Rick McKenna February 8, 2019 Over the past 30 years, I’ve worked mostly in the advertising and marketing agency world, and of course being in New England, launching many … Read More

Password Paralysis

How LockDown is eliminating #passwordproblems Step 1. Create a Password. Your password is too weak, not long enough, needs more characters, has too many characters, you’ve already used that password, … Read More

Finally, I’m in Control

We’ve all been in situations where we need to send someone a file that contains personal or confidential information, but we find ourselves hesitating before clicking send. Thoughts such as … Read More