<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Sync.com Blog</title>
    <link>https://www.sync.com/blog</link>
    <description>The Sync.com official blog with great content focused on privacy, security, and file sharing.</description>
    <language>en</language>
    <pubDate>Wed, 21 May 2025 20:39:51 GMT</pubDate>
    <dc:date>2025-05-21T20:39:51Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>HIPAA Compliant File Sharing: Secure, Simple Solutions for Healthcare Data</title>
      <link>https://www.sync.com/blog/hipaa-compliant-file-sharing</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/hipaa-compliant-file-sharing" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/pexels-karolina-grabowska-8539423.jpg" alt="HIPAA compliant file sharing helping streamline collaboration and data accessibility between two lab technicians" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;HIPAA compliant file sharing is integral to modern healthcare practices today&amp;nbsp;as more organizations transition to include remote work. These file sharing solutions may stand alone, or be part of a more robust &lt;a href="https://www.sync.com/cloud-storage-for-healthcare-hipaa/"&gt;HIPAA compliant cloud storage suite&lt;/a&gt;. Regardless of the solution a&amp;nbsp;healthcare organization chooses to implement, the requirement to protect patient data is clear.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.cdc.gov/phlp/php/resources/health-insurance-portability-and-accountability-act-of-1996-hipaa.html"&gt;&lt;span&gt;HIPAA (Health Insurance Portability and Accountability Act)&lt;/span&gt;&lt;/a&gt; was established in 1996 to protect the sensitive health information for&amp;nbsp;all patients. This means any individual or organization handling personal patient information must adhere to a strict set of rules when accessing, disclosing&amp;nbsp;and sharing patient data.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/hipaa-compliant-file-sharing" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/pexels-karolina-grabowska-8539423.jpg" alt="HIPAA compliant file sharing helping streamline collaboration and data accessibility between two lab technicians" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;HIPAA compliant file sharing is integral to modern healthcare practices today&amp;nbsp;as more organizations transition to include remote work. These file sharing solutions may stand alone, or be part of a more robust &lt;a href="https://www.sync.com/cloud-storage-for-healthcare-hipaa/"&gt;HIPAA compliant cloud storage suite&lt;/a&gt;. Regardless of the solution a&amp;nbsp;healthcare organization chooses to implement, the requirement to protect patient data is clear.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.cdc.gov/phlp/php/resources/health-insurance-portability-and-accountability-act-of-1996-hipaa.html"&gt;&lt;span&gt;HIPAA (Health Insurance Portability and Accountability Act)&lt;/span&gt;&lt;/a&gt; was established in 1996 to protect the sensitive health information for&amp;nbsp;all patients. This means any individual or organization handling personal patient information must adhere to a strict set of rules when accessing, disclosing&amp;nbsp;and sharing patient data.&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fhipaa-compliant-file-sharing&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Wed, 21 May 2025 16:06:01 GMT</pubDate>
      <author>ktremblay@sync.com (Keegan Tremblay)</author>
      <guid>https://www.sync.com/blog/hipaa-compliant-file-sharing</guid>
      <dc:date>2025-05-21T16:06:01Z</dc:date>
    </item>
    <item>
      <title>Sync 5.0.16 Desktop Apps Available</title>
      <link>https://www.sync.com/blog/sync-5-0-16-desktop-apps-available</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/sync-5-0-16-desktop-apps-available" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/product@2x-Feb-27-2025-06-47-15-7839-PM.png" alt="Sync 5.0.16 Desktop Apps Available" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;We’ve just released&amp;nbsp;&lt;strong&gt;version 5.0.16&lt;/strong&gt;&amp;nbsp;of the Sync CloudFiles app for Windows. If you’re already running Sync, you can update now by&amp;nbsp;&lt;a href="https://www.sync.com/help/how-to-use-sync-cloudfiles/"&gt;downloading and installing&lt;/a&gt;&amp;nbsp;the app directly.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/sync-5-0-16-desktop-apps-available" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/product@2x-Feb-27-2025-06-47-15-7839-PM.png" alt="Sync 5.0.16 Desktop Apps Available" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;We’ve just released&amp;nbsp;&lt;strong&gt;version 5.0.16&lt;/strong&gt;&amp;nbsp;of the Sync CloudFiles app for Windows. If you’re already running Sync, you can update now by&amp;nbsp;&lt;a href="https://www.sync.com/help/how-to-use-sync-cloudfiles/"&gt;downloading and installing&lt;/a&gt;&amp;nbsp;the app directly.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fsync-5-0-16-desktop-apps-available&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Product</category>
      <category>Desktop</category>
      <category>Privacy</category>
      <pubDate>Mon, 15 Jul 2024 17:13:49 GMT</pubDate>
      <guid>https://www.sync.com/blog/sync-5-0-16-desktop-apps-available</guid>
      <dc:date>2024-07-15T17:13:49Z</dc:date>
      <dc:creator>Mehrad Mashayekhi</dc:creator>
    </item>
    <item>
      <title>SOC 2 Means Safety for Your Organization</title>
      <link>https://www.sync.com/blog/soc-2-means-safety-for-your-organization</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/soc-2-means-safety-for-your-organization" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/soc_blog@2x-1.jpg" alt="SOC 2 Means Safety for Your Organization" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h5&gt;&lt;strong&gt;Big News!&lt;/strong&gt;&lt;/h5&gt; 
&lt;p&gt;At Sync, our mission is to provide a safe space for the world to collaborate. Protecting your safety is at the heart of everything we do, and today we’re proud to announce that Sync has successfully completed a System and Organization Controls (SOC) 2 Type 1 audit.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/soc-2-means-safety-for-your-organization" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/soc_blog@2x-1.jpg" alt="SOC 2 Means Safety for Your Organization" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h5&gt;&lt;strong&gt;Big News!&lt;/strong&gt;&lt;/h5&gt; 
&lt;p&gt;At Sync, our mission is to provide a safe space for the world to collaborate. Protecting your safety is at the heart of everything we do, and today we’re proud to announce that Sync has successfully completed a System and Organization Controls (SOC) 2 Type 1 audit.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fsoc-2-means-safety-for-your-organization&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Product</category>
      <category>Privacy</category>
      <pubDate>Mon, 13 Dec 2021 18:31:37 GMT</pubDate>
      <guid>https://www.sync.com/blog/soc-2-means-safety-for-your-organization</guid>
      <dc:date>2021-12-13T18:31:37Z</dc:date>
      <dc:creator>Victoria Donovan</dc:creator>
    </item>
    <item>
      <title>Take Control of Your Data with Sync</title>
      <link>https://www.sync.com/blog/take-control-of-your-data-with-sync</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/take-control-of-your-data-with-sync" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/data@2x.png" alt="Data governance in the Cloud" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Do you know how valuable your company data is? From confidential client files to your most important projects to the brand new content your team is creating, today’s businesses are truly data driven.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/take-control-of-your-data-with-sync" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/data@2x.png" alt="Data governance in the Cloud" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Do you know how valuable your company data is? From confidential client files to your most important projects to the brand new content your team is creating, today’s businesses are truly data driven.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Ftake-control-of-your-data-with-sync&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Productivity</category>
      <category>Privacy</category>
      <pubDate>Tue, 26 Oct 2021 09:13:31 GMT</pubDate>
      <guid>https://www.sync.com/blog/take-control-of-your-data-with-sync</guid>
      <dc:date>2021-10-26T09:13:31Z</dc:date>
      <dc:creator>Victoria Donovan</dc:creator>
    </item>
    <item>
      <title>Protection Perfection: Keep Your Sync Account Extra Secure</title>
      <link>https://www.sync.com/blog/protection-perfection-keep-your-sync-account-extra-secure</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/protection-perfection-keep-your-sync-account-extra-secure" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/locks@2x.jpg" alt="Keep your Sync account extra secure" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Your data stored with Sync is safe and secure in the cloud, protected with strong encryption. But how do you protect yourself from the myriad of malicious threats, intentional or otherwise, that may be targeting you directly? From insidious hackers to sophisticated ransomware, the risk of threats is never zero. But fear not! Follow these tips to enhance the security of your computers, mobile devices, and Sync account to maximize your peace of mind.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/protection-perfection-keep-your-sync-account-extra-secure" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/locks@2x.jpg" alt="Keep your Sync account extra secure" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Your data stored with Sync is safe and secure in the cloud, protected with strong encryption. But how do you protect yourself from the myriad of malicious threats, intentional or otherwise, that may be targeting you directly? From insidious hackers to sophisticated ransomware, the risk of threats is never zero. But fear not! Follow these tips to enhance the security of your computers, mobile devices, and Sync account to maximize your peace of mind.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fprotection-perfection-keep-your-sync-account-extra-secure&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Product</category>
      <category>Privacy</category>
      <pubDate>Mon, 22 Mar 2021 10:24:16 GMT</pubDate>
      <guid>https://www.sync.com/blog/protection-perfection-keep-your-sync-account-extra-secure</guid>
      <dc:date>2021-03-22T10:24:16Z</dc:date>
      <dc:creator>Victoria Donovan</dc:creator>
    </item>
    <item>
      <title>Better Safe Than Sorry With Two-Factor Authentication</title>
      <link>https://www.sync.com/blog/better-safe-than-sorry-with-two-factor-authentication</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/better-safe-than-sorry-with-two-factor-authentication" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/securityalert@2x.jpg" alt="Sync Two Factor Authentication " class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Privacy and security matters to you, especially online. That’s why you create unique, unguessably strong passwords for every account you have, right? Privacy and security matters to us at Sync too, and that’s why Two-Factor Authentication (aka 2FA) is ready for you to take your account security and privacy to the next level. It’s a feature we really, really encourage you to use.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/better-safe-than-sorry-with-two-factor-authentication" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/securityalert@2x.jpg" alt="Sync Two Factor Authentication " class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Privacy and security matters to you, especially online. That’s why you create unique, unguessably strong passwords for every account you have, right? Privacy and security matters to us at Sync too, and that’s why Two-Factor Authentication (aka 2FA) is ready for you to take your account security and privacy to the next level. It’s a feature we really, really encourage you to use.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fbetter-safe-than-sorry-with-two-factor-authentication&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Product</category>
      <category>Privacy</category>
      <pubDate>Sun, 31 Jan 2021 06:35:24 GMT</pubDate>
      <guid>https://www.sync.com/blog/better-safe-than-sorry-with-two-factor-authentication</guid>
      <dc:date>2021-01-31T06:35:24Z</dc:date>
      <dc:creator>Victoria Donovan</dc:creator>
    </item>
    <item>
      <title>Your Privacy Matters</title>
      <link>https://www.sync.com/blog/your-privacy-matters</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/your-privacy-matters" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/privacymatters@2x.jpg" alt="Your privacy matters" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;So it turns out that data privacy protection may very well be the most important issue of the 21st century. Everything from your web browsing habits, to your email address, to the strength of your phone’s battery is now up for sale to the &lt;a href="https://9to5google.com/2018/07/16/location-data-privacy/"&gt;highest bidder&lt;/a&gt;.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/your-privacy-matters" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/privacymatters@2x.jpg" alt="Your privacy matters" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;So it turns out that data privacy protection may very well be the most important issue of the 21st century. Everything from your web browsing habits, to your email address, to the strength of your phone’s battery is now up for sale to the &lt;a href="https://9to5google.com/2018/07/16/location-data-privacy/"&gt;highest bidder&lt;/a&gt;.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fyour-privacy-matters&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Thu, 04 Oct 2018 19:53:35 GMT</pubDate>
      <guid>https://www.sync.com/blog/your-privacy-matters</guid>
      <dc:date>2018-10-04T19:53:35Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>GDPR Compliance Update</title>
      <link>https://www.sync.com/blog/gdpr-compliance-update</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/gdpr-compliance-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/gdpr@2x.jpg" alt="GDPR Compliance Update" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The EU’s General Data Protection Regulations (GDPR) take effect May 25. The GDPR&amp;nbsp;is a new set of data privacy laws that require businesses to prioritize the protection and privacy of personal data belonging to European Union (EU) residents.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/gdpr-compliance-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/gdpr@2x.jpg" alt="GDPR Compliance Update" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The EU’s General Data Protection Regulations (GDPR) take effect May 25. The GDPR&amp;nbsp;is a new set of data privacy laws that require businesses to prioritize the protection and privacy of personal data belonging to European Union (EU) residents.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fgdpr-compliance-update&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Product</category>
      <category>Privacy</category>
      <pubDate>Thu, 24 May 2018 14:53:34 GMT</pubDate>
      <guid>https://www.sync.com/blog/gdpr-compliance-update</guid>
      <dc:date>2018-05-24T14:53:34Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>Update on Meltdown and Spectre</title>
      <link>https://www.sync.com/blog/update-on-meltdown-and-spectre</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/update-on-meltdown-and-spectre" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/product@2x-Feb-27-2025-06-53-00-2620-PM.png" alt="Product update" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;This week a new class of vulnerabilities that may affect nearly every computer and device out there were &lt;a href="https://spectreattack.com/"&gt;disclosed&lt;/a&gt; to the public, and have garnered much attention from the media.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/update-on-meltdown-and-spectre" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/product@2x-Feb-27-2025-06-53-00-2620-PM.png" alt="Product update" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;This week a new class of vulnerabilities that may affect nearly every computer and device out there were &lt;a href="https://spectreattack.com/"&gt;disclosed&lt;/a&gt; to the public, and have garnered much attention from the media.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fupdate-on-meltdown-and-spectre&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Fri, 05 Jan 2018 13:19:33 GMT</pubDate>
      <guid>https://www.sync.com/blog/update-on-meltdown-and-spectre</guid>
      <dc:date>2018-01-05T13:19:33Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>Net Neutrality and the Future of the Internet</title>
      <link>https://www.sync.com/blog/net-neutrality-and-the-future-of-the-internet</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/net-neutrality-and-the-future-of-the-internet" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/wierd@2x.jpg" alt="Net neutrality" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Net neutrality is a hot topic right now, and for good reason. In a world so heavily dependent on the internet, many people view net neutrality as an essential liberty; similar to their right to free speech.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/net-neutrality-and-the-future-of-the-internet" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/wierd@2x.jpg" alt="Net neutrality" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Net neutrality is a hot topic right now, and for good reason. In a world so heavily dependent on the internet, many people view net neutrality as an essential liberty; similar to their right to free speech.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fnet-neutrality-and-the-future-of-the-internet&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Thu, 07 Dec 2017 19:04:08 GMT</pubDate>
      <guid>https://www.sync.com/blog/net-neutrality-and-the-future-of-the-internet</guid>
      <dc:date>2017-12-07T19:04:08Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>The GDPR: What it is and What it Means for Your Business</title>
      <link>https://www.sync.com/blog/the-gdpr-what-it-is-and-what-it-means-for-your-business</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/the-gdpr-what-it-is-and-what-it-means-for-your-business" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/gdpr@2x%20(1).jpg" alt="GDPR update" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The General Data Protection Regulation (GDPR), is a new set of data privacy laws that require businesses to prioritize the protection and privacy of personal data belonging to European Union (EU) residents.&lt;/p&gt; 
&lt;p&gt;Failure to comply with this new regulation by the May 25th, 2018 enforcement date could result in hefty fines. It’s important to note that even if&amp;nbsp;your company is based outside the EU, the GDPR may still apply… If your&amp;nbsp;company does any kind of business with other companies or customers residing in the EU, you’re obligated to comply or risk facing the penalties.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/the-gdpr-what-it-is-and-what-it-means-for-your-business" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/gdpr@2x%20(1).jpg" alt="GDPR update" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The General Data Protection Regulation (GDPR), is a new set of data privacy laws that require businesses to prioritize the protection and privacy of personal data belonging to European Union (EU) residents.&lt;/p&gt; 
&lt;p&gt;Failure to comply with this new regulation by the May 25th, 2018 enforcement date could result in hefty fines. It’s important to note that even if&amp;nbsp;your company is based outside the EU, the GDPR may still apply… If your&amp;nbsp;company does any kind of business with other companies or customers residing in the EU, you’re obligated to comply or risk facing the penalties.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fthe-gdpr-what-it-is-and-what-it-means-for-your-business&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Productivity</category>
      <category>Privacy</category>
      <pubDate>Thu, 23 Nov 2017 16:23:20 GMT</pubDate>
      <guid>https://www.sync.com/blog/the-gdpr-what-it-is-and-what-it-means-for-your-business</guid>
      <dc:date>2017-11-23T16:23:20Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>Don’t Let the Next WannaCrypt Ransomware Hold you Hostage</title>
      <link>https://www.sync.com/blog/dont-let-the-next-wannacrypt-ransomware-wannabe-hold-you-hostage</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/dont-let-the-next-wannacrypt-ransomware-wannabe-hold-you-hostage" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/keepcalm@2x.jpg" alt="Don't let the next WannaCrypt ransomware wannabe hold you hostage" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;While the President of the United States and his crack team of top homeland security advisors &lt;a href="https://www.bloomberg.com/politics/articles/2017-05-14/trump-has-called-two-meetings-on-global-ransomware-attack"&gt;convened&lt;/a&gt; to address the threat posed by a massive global cyber-attack “in progress”, and &lt;a href="https://www.theguardian.com/technology/2017/may/15/ransomware-attack-like-having-a-tomahawk-missile-stolen-says-microsoft-boss"&gt;hundreds of thousands&lt;/a&gt; of hospitals, schools and businesses around the world were assessing the damage already done, you were hopefully sitting back, with a nice cold pint, waiting for all this to blow over.&lt;/p&gt; 
&lt;p&gt;If not, here’s what you can do for next time.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/dont-let-the-next-wannacrypt-ransomware-wannabe-hold-you-hostage" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/keepcalm@2x.jpg" alt="Don't let the next WannaCrypt ransomware wannabe hold you hostage" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;While the President of the United States and his crack team of top homeland security advisors &lt;a href="https://www.bloomberg.com/politics/articles/2017-05-14/trump-has-called-two-meetings-on-global-ransomware-attack"&gt;convened&lt;/a&gt; to address the threat posed by a massive global cyber-attack “in progress”, and &lt;a href="https://www.theguardian.com/technology/2017/may/15/ransomware-attack-like-having-a-tomahawk-missile-stolen-says-microsoft-boss"&gt;hundreds of thousands&lt;/a&gt; of hospitals, schools and businesses around the world were assessing the damage already done, you were hopefully sitting back, with a nice cold pint, waiting for all this to blow over.&lt;/p&gt; 
&lt;p&gt;If not, here’s what you can do for next time.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fdont-let-the-next-wannacrypt-ransomware-wannabe-hold-you-hostage&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Mon, 15 May 2017 15:47:42 GMT</pubDate>
      <guid>https://www.sync.com/blog/dont-let-the-next-wannacrypt-ransomware-wannabe-hold-you-hostage</guid>
      <dc:date>2017-05-15T15:47:42Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>Sync.com: Data Privacy as a Platform</title>
      <link>https://www.sync.com/blog/sync-com-data-privacy-as-a-platform</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/sync-com-data-privacy-as-a-platform" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/product@2x-Feb-27-2025-06-53-00-2620-PM.png" alt="Sync.com: Data Privacy as a Platform" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;In her wildly popular &lt;a href="http://www.kpcb.com/internet-trends"&gt;2016 Internet Trends Report&lt;/a&gt;, Mary Meeker tells us that global data usage continues to surge, driven by the device connectivity of about 3 billion Internet users and the widespread adoption of mass data intelligence.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/sync-com-data-privacy-as-a-platform" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/product@2x-Feb-27-2025-06-53-00-2620-PM.png" alt="Sync.com: Data Privacy as a Platform" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;In her wildly popular &lt;a href="http://www.kpcb.com/internet-trends"&gt;2016 Internet Trends Report&lt;/a&gt;, Mary Meeker tells us that global data usage continues to surge, driven by the device connectivity of about 3 billion Internet users and the widespread adoption of mass data intelligence.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fsync-com-data-privacy-as-a-platform&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Product</category>
      <category>Privacy</category>
      <pubDate>Tue, 07 Jun 2016 18:41:22 GMT</pubDate>
      <guid>https://www.sync.com/blog/sync-com-data-privacy-as-a-platform</guid>
      <dc:date>2016-06-07T18:41:22Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>Have you Enabled 2-Factor Authentication?</title>
      <link>https://www.sync.com/blog/have-you-enabled-2-factor-authentication</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/have-you-enabled-2-factor-authentication" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/OLD_2fa@2x-1.jpg" alt="Have you Enabled 2-Factor Authentication?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Keeping your account safe is&amp;nbsp;priority number one&amp;nbsp;here at Sync.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/have-you-enabled-2-factor-authentication" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/OLD_2fa@2x-1.jpg" alt="Have you Enabled 2-Factor Authentication?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Keeping your account safe is&amp;nbsp;priority number one&amp;nbsp;here at Sync.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fhave-you-enabled-2-factor-authentication&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Product</category>
      <category>Privacy</category>
      <pubDate>Thu, 20 Aug 2015 14:57:32 GMT</pubDate>
      <guid>https://www.sync.com/blog/have-you-enabled-2-factor-authentication</guid>
      <dc:date>2015-08-20T14:57:32Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>Take Back your Privacy!</title>
      <link>https://www.sync.com/blog/take-back-your-privacy</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/take-back-your-privacy" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Sync-commercial.png" alt="Take Back your Privacy!" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Learn more about Sync and how we protect your privacy in our&amp;nbsp;2 minute video debut.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/take-back-your-privacy" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Sync-commercial.png" alt="Take Back your Privacy!" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Learn more about Sync and how we protect your privacy in our&amp;nbsp;2 minute video debut.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Ftake-back-your-privacy&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Tue, 04 Aug 2015 15:22:26 GMT</pubDate>
      <guid>https://www.sync.com/blog/take-back-your-privacy</guid>
      <dc:date>2015-08-04T15:22:26Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>Why We’ve Joined Over 200,000 Canadians in Saying No to Bill C-51</title>
      <link>https://www.sync.com/blog/why-weve-joined-over-200000-canadians-in-saying-no-to-bill-c-51</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/why-weve-joined-over-200000-canadians-in-saying-no-to-bill-c-51" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/bill-c-51-2.jpg" alt="Why We’ve Joined Over 200,000 Canadians in Saying No to Bill C-51" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Canadian parliament will be voting on Bill C-51 this week, legislation designed to get tough on terrorism.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/why-weve-joined-over-200000-canadians-in-saying-no-to-bill-c-51" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/bill-c-51-2.jpg" alt="Why We’ve Joined Over 200,000 Canadians in Saying No to Bill C-51" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Canadian parliament will be voting on Bill C-51 this week, legislation designed to get tough on terrorism.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fwhy-weve-joined-over-200000-canadians-in-saying-no-to-bill-c-51&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Tue, 05 May 2015 16:03:08 GMT</pubDate>
      <guid>https://www.sync.com/blog/why-weve-joined-over-200000-canadians-in-saying-no-to-bill-c-51</guid>
      <dc:date>2015-05-05T16:03:08Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>The Moment Privacy Got Real</title>
      <link>https://www.sync.com/blog/the-moment-my-privacy-got-real</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/the-moment-my-privacy-got-real" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Screen-Shot-2015-04-29-at-3.08.40-PM.png" alt="Google search" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;When Google announced that “you can &lt;a href="https://support.google.com/websearch/answer/6068625"&gt;download all of your saved search history&lt;/a&gt; to see a list of the terms you’ve searched for”, I must admit, I felt a hint of nervous trepidation at the thought of what I might discover. Just for an instant. Curiosity is a powerful thing.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/the-moment-my-privacy-got-real" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Screen-Shot-2015-04-29-at-3.08.40-PM.png" alt="Google search" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;When Google announced that “you can &lt;a href="https://support.google.com/websearch/answer/6068625"&gt;download all of your saved search history&lt;/a&gt; to see a list of the terms you’ve searched for”, I must admit, I felt a hint of nervous trepidation at the thought of what I might discover. Just for an instant. Curiosity is a powerful thing.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fthe-moment-my-privacy-got-real&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Fri, 01 May 2015 16:33:11 GMT</pubDate>
      <guid>https://www.sync.com/blog/the-moment-my-privacy-got-real</guid>
      <dc:date>2015-05-01T16:33:11Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>Data privacy day 2015</title>
      <link>https://www.sync.com/blog/data-privacy-day-2015</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/data-privacy-day-2015" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/privacy_matters_v2-1.jpg" alt="Data privacy day 2015" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Just in case you haven’t heard, January 28 marks &lt;a href="http://en.wikipedia.org/wiki/Data_Privacy_Day"&gt;Data Privacy Day&lt;/a&gt;, a global initiative designed to raise privacy awareness and promote data protection best practices for businesses, organizations and consumers.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/data-privacy-day-2015" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/privacy_matters_v2-1.jpg" alt="Data privacy day 2015" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Just in case you haven’t heard, January 28 marks &lt;a href="http://en.wikipedia.org/wiki/Data_Privacy_Day"&gt;Data Privacy Day&lt;/a&gt;, a global initiative designed to raise privacy awareness and promote data protection best practices for businesses, organizations and consumers.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fdata-privacy-day-2015&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Wed, 28 Jan 2015 21:07:31 GMT</pubDate>
      <guid>https://www.sync.com/blog/data-privacy-day-2015</guid>
      <dc:date>2015-01-28T21:07:31Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>A secure, Canadian Dropbox alternative</title>
      <link>https://www.sync.com/blog/a-secure-canadian-dropbox-alternative</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/a-secure-canadian-dropbox-alternative" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/check_logo-Feb-27-2025-06-48-49-3194-PM.png" alt="A secure, Canadian Dropbox alternative" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Here at Sync it’s no secret that we’re on a mission to offer a truly private and secure alternative to Dropbox. I mean, that’s why we built Sync in the first place. For businesses that store sensitive or confidential information in the cloud Dropbox should be&amp;nbsp;a non-starter. The reason being: they can read your files.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/a-secure-canadian-dropbox-alternative" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/check_logo-Feb-27-2025-06-48-49-3194-PM.png" alt="A secure, Canadian Dropbox alternative" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Here at Sync it’s no secret that we’re on a mission to offer a truly private and secure alternative to Dropbox. I mean, that’s why we built Sync in the first place. For businesses that store sensitive or confidential information in the cloud Dropbox should be&amp;nbsp;a non-starter. The reason being: they can read your files.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fa-secure-canadian-dropbox-alternative&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Thu, 22 Jan 2015 17:04:32 GMT</pubDate>
      <guid>https://www.sync.com/blog/a-secure-canadian-dropbox-alternative</guid>
      <dc:date>2015-01-22T17:04:32Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>Top 5 worst privacy policies you’ve probably agreed to</title>
      <link>https://www.sync.com/blog/top-5-worst-privacy-policies-youve-probably-agreed-to</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/top-5-worst-privacy-policies-youve-probably-agreed-to" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/privacy-watching-2.jpg" alt="Dropbox icloud onedrive linkedin privacy" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;1. Apple iCloud&lt;/h2&gt; 
&lt;p&gt;If you’ve got an iPhone, iPad or other Apple device you’ve probably unwittingly agreed to the &lt;a href="https://www.apple.com/legal/internet-services/icloud/en/terms.html"&gt;iCloud terms of service&lt;/a&gt; which appears to give Apple the right to access your data at any time:&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/top-5-worst-privacy-policies-youve-probably-agreed-to" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/privacy-watching-2.jpg" alt="Dropbox icloud onedrive linkedin privacy" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;1. Apple iCloud&lt;/h2&gt; 
&lt;p&gt;If you’ve got an iPhone, iPad or other Apple device you’ve probably unwittingly agreed to the &lt;a href="https://www.apple.com/legal/internet-services/icloud/en/terms.html"&gt;iCloud terms of service&lt;/a&gt; which appears to give Apple the right to access your data at any time:&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Ftop-5-worst-privacy-policies-youve-probably-agreed-to&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Fri, 03 Oct 2014 11:51:54 GMT</pubDate>
      <guid>https://www.sync.com/blog/top-5-worst-privacy-policies-youve-probably-agreed-to</guid>
      <dc:date>2014-10-03T11:51:54Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>Networks of the future</title>
      <link>https://www.sync.com/blog/networks-of-the-future</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/networks-of-the-future" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/hwpzEDd-1.jpg" alt="Networks of the future" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The very openness of the early internet fueled its growth worldwide. Packet-switched networks, borne of a Cold War era fear of nuclear devastation, were built to be easy to set up, and resilient to outages and failures.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/networks-of-the-future" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/hwpzEDd-1.jpg" alt="Networks of the future" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The very openness of the early internet fueled its growth worldwide. Packet-switched networks, borne of a Cold War era fear of nuclear devastation, were built to be easy to set up, and resilient to outages and failures.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fnetworks-of-the-future&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Tue, 26 Aug 2014 14:29:07 GMT</pubDate>
      <guid>https://www.sync.com/blog/networks-of-the-future</guid>
      <dc:date>2014-08-26T14:29:07Z</dc:date>
      <dc:creator>Thomas</dc:creator>
    </item>
    <item>
      <title>From soup to search warrants</title>
      <link>https://www.sync.com/blog/from-soup-to-search-warrants</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/from-soup-to-search-warrants" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/EPEIr4r-1.jpg" alt="From soup to search warrants" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;We talk a lot about how we store encrypted data on our servers, and you’re the only one with access to the key. To us, your data on our servers is a big jumbled block of ones and zeros.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/from-soup-to-search-warrants" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/EPEIr4r-1.jpg" alt="From soup to search warrants" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;We talk a lot about how we store encrypted data on our servers, and you’re the only one with access to the key. To us, your data on our servers is a big jumbled block of ones and zeros.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Ffrom-soup-to-search-warrants&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Fri, 08 Aug 2014 13:26:17 GMT</pubDate>
      <guid>https://www.sync.com/blog/from-soup-to-search-warrants</guid>
      <dc:date>2014-08-08T13:26:17Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>Canadian Data Privacy Law Part 2: The Public Sector</title>
      <link>https://www.sync.com/blog/canadian-data-privacy-law-part-2-the-public-sector</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/canadian-data-privacy-law-part-2-the-public-sector" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/public_sector-2.png" alt="Canadian Data Privacy Law Part 2: The Public Sector" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;If you’re part of a government department or agency, the way you handle information that you collect from citizens and foreigners is largely determined by the the Privacy Act. However, every province and territory also has its own public-sector legislation that applies to its own government institutions. The protections they offer are broadly similar to those of the Privacy Act, but the regional legislation defines a commissioner or ombudsman responsible for overseeing privacy legislation only in that province.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/canadian-data-privacy-law-part-2-the-public-sector" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/public_sector-2.png" alt="Canadian Data Privacy Law Part 2: The Public Sector" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;If you’re part of a government department or agency, the way you handle information that you collect from citizens and foreigners is largely determined by the the Privacy Act. However, every province and territory also has its own public-sector legislation that applies to its own government institutions. The protections they offer are broadly similar to those of the Privacy Act, but the regional legislation defines a commissioner or ombudsman responsible for overseeing privacy legislation only in that province.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fcanadian-data-privacy-law-part-2-the-public-sector&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Tue, 29 Jul 2014 18:56:05 GMT</pubDate>
      <guid>https://www.sync.com/blog/canadian-data-privacy-law-part-2-the-public-sector</guid>
      <dc:date>2014-07-29T18:56:05Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>Canadian Data Privacy Law Part 1: The Private Sector</title>
      <link>https://www.sync.com/blog/canadian-data-privacy-law-part-1-the-private-sector</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/canadian-data-privacy-law-part-1-the-private-sector" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/canada-private_sector-1.png" alt="Canadian data privacy laws" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;In Canada, finding cloud storage that meets both federal and provincial requirements — requirements for other countries notwithstanding — is a challenge. For both the public and the private sector, overlapping regulations can be confusing.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/canadian-data-privacy-law-part-1-the-private-sector" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/canada-private_sector-1.png" alt="Canadian data privacy laws" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;In Canada, finding cloud storage that meets both federal and provincial requirements — requirements for other countries notwithstanding — is a challenge. For both the public and the private sector, overlapping regulations can be confusing.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fcanadian-data-privacy-law-part-1-the-private-sector&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Wed, 23 Jul 2014 17:41:00 GMT</pubDate>
      <guid>https://www.sync.com/blog/canadian-data-privacy-law-part-1-the-private-sector</guid>
      <dc:date>2014-07-23T17:41:00Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>With Facebook, your data is what they want – and sell</title>
      <link>https://www.sync.com/blog/with-facebook-your-data-is-what-they-want-and-sell</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/with-facebook-your-data-is-what-they-want-and-sell" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/facerat-1.jpg" alt="With Facebook, your data is what they want – and sell" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/with-facebook-your-data-is-what-they-want-and-sell" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/facerat-1.jpg" alt="With Facebook, your data is what they want – and sell" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fwith-facebook-your-data-is-what-they-want-and-sell&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Tue, 08 Jul 2014 10:20:28 GMT</pubDate>
      <guid>https://www.sync.com/blog/with-facebook-your-data-is-what-they-want-and-sell</guid>
      <dc:date>2014-07-08T10:20:28Z</dc:date>
      <dc:creator>Thomas</dc:creator>
    </item>
    <item>
      <title>10 tips to keep your business data safe</title>
      <link>https://www.sync.com/blog/10-tips-to-keep-your-business-data-safe</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/10-tips-to-keep-your-business-data-safe" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/top-10-tips-1.png" alt="10 tips to keep your business data safe" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/10-tips-to-keep-your-business-data-safe" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/top-10-tips-1.png" alt="10 tips to keep your business data safe" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2F10-tips-to-keep-your-business-data-safe&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Fri, 04 Jul 2014 11:48:33 GMT</pubDate>
      <guid>https://www.sync.com/blog/10-tips-to-keep-your-business-data-safe</guid>
      <dc:date>2014-07-04T11:48:33Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>Freedom worth protecting</title>
      <link>https://www.sync.com/blog/freedom-worth-protecting</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/freedom-worth-protecting" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/large-1.jpg" alt="Freedom worth protecting" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/freedom-worth-protecting" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/large-1.jpg" alt="Freedom worth protecting" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Ffreedom-worth-protecting&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Mon, 30 Jun 2014 13:12:48 GMT</pubDate>
      <guid>https://www.sync.com/blog/freedom-worth-protecting</guid>
      <dc:date>2014-06-30T13:12:48Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>We’re making the Internet more secure by taking part in #ResetTheNet.</title>
      <link>https://www.sync.com/blog/resetthenetwithsync</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/resetthenetwithsync" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/product@2x-Feb-27-2025-06-53-00-2620-PM.png" alt="We’re making the Internet more secure by taking part in #ResetTheNet." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The internet is a resource that has benefited society like no other for the last 20 years. It has brought together distant family members, close friends, neighbors, and strangers. Staggering amounts of information are communicated across open networks every second.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/resetthenetwithsync" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/product@2x-Feb-27-2025-06-53-00-2620-PM.png" alt="We’re making the Internet more secure by taking part in #ResetTheNet." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The internet is a resource that has benefited society like no other for the last 20 years. It has brought together distant family members, close friends, neighbors, and strangers. Staggering amounts of information are communicated across open networks every second.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fresetthenetwithsync&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Thu, 05 Jun 2014 13:45:18 GMT</pubDate>
      <guid>https://www.sync.com/blog/resetthenetwithsync</guid>
      <dc:date>2014-06-05T13:45:18Z</dc:date>
      <dc:creator>Jason</dc:creator>
    </item>
    <item>
      <title>Encryption Works</title>
      <link>https://www.sync.com/blog/encryption-works</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/encryption-works" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/secure_badge.png" alt="Encryption Works" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;U.S. government whistleblower Edward Snowden made a splash on Monday, &lt;a title="Edward Snowden speaking at SXSW" href="http://www.washingtonpost.com/blogs/innovations/wp/2014/03/10/edward-snowden-theyre-setting-fire-to-the-future-of-the-internet/"&gt;speaking at SXSW via videoconference&lt;/a&gt; about a &lt;a href="http://blog.inside.com/blog/2014/3/10/edward-snowden-sxsw-full-transcription-and-video"&gt;broad range of topics&lt;/a&gt; related to privacy, data security, and encryption.&lt;/p&gt; 
&lt;p&gt;Snowden, along with panel moderators &lt;a href="https://twitter.com/benwizner"&gt;Ben Wizner&lt;/a&gt; and &lt;a href="https://twitter.com/csoghoian"&gt;Chris Soghoian&lt;/a&gt;, lamented the lack of options when it came to the general public and cloud services. Soghoian said that average users “have to choose between a service that is easy to use […] or a tool that is highly secure and impossible for the average person to use.”&lt;/p&gt; 
&lt;p&gt;This is perhaps where we politely disagree. The &lt;a title="Sync" href="https://Sync.com"&gt;Sync&lt;/a&gt; platform is designed with security at its very core. All the data transmitted to us is encrypted first — by your computer, phone, or tablet. The fact that computing power has grown so much over the last several years makes encryption — essentially a complicated math problem — not only fast and convenient, but very, very strong.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/encryption-works" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/secure_badge.png" alt="Encryption Works" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;U.S. government whistleblower Edward Snowden made a splash on Monday, &lt;a title="Edward Snowden speaking at SXSW" href="http://www.washingtonpost.com/blogs/innovations/wp/2014/03/10/edward-snowden-theyre-setting-fire-to-the-future-of-the-internet/"&gt;speaking at SXSW via videoconference&lt;/a&gt; about a &lt;a href="http://blog.inside.com/blog/2014/3/10/edward-snowden-sxsw-full-transcription-and-video"&gt;broad range of topics&lt;/a&gt; related to privacy, data security, and encryption.&lt;/p&gt; 
&lt;p&gt;Snowden, along with panel moderators &lt;a href="https://twitter.com/benwizner"&gt;Ben Wizner&lt;/a&gt; and &lt;a href="https://twitter.com/csoghoian"&gt;Chris Soghoian&lt;/a&gt;, lamented the lack of options when it came to the general public and cloud services. Soghoian said that average users “have to choose between a service that is easy to use […] or a tool that is highly secure and impossible for the average person to use.”&lt;/p&gt; 
&lt;p&gt;This is perhaps where we politely disagree. The &lt;a title="Sync" href="https://Sync.com"&gt;Sync&lt;/a&gt; platform is designed with security at its very core. All the data transmitted to us is encrypted first — by your computer, phone, or tablet. The fact that computing power has grown so much over the last several years makes encryption — essentially a complicated math problem — not only fast and convenient, but very, very strong.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fencryption-works&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Tue, 11 Mar 2014 02:19:11 GMT</pubDate>
      <guid>https://www.sync.com/blog/encryption-works</guid>
      <dc:date>2014-03-11T02:19:11Z</dc:date>
      <dc:creator>Thomas</dc:creator>
    </item>
    <item>
      <title>Why privacy matters when choosing a cloud storage provider</title>
      <link>https://www.sync.com/blog/why-privacy-matters-when-choosing-cloud-storage</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/why-privacy-matters-when-choosing-cloud-storage" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/privacy_matters_v2-300x300.jpg" alt="Why privacy matters when choosing a cloud storage provider" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/why-privacy-matters-when-choosing-cloud-storage" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/privacy_matters_v2-300x300.jpg" alt="Why privacy matters when choosing a cloud storage provider" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2Fwhy-privacy-matters-when-choosing-cloud-storage&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Tue, 16 Jul 2013 19:06:21 GMT</pubDate>
      <guid>https://www.sync.com/blog/why-privacy-matters-when-choosing-cloud-storage</guid>
      <dc:date>2013-07-16T19:06:21Z</dc:date>
      <dc:creator>Thomas</dc:creator>
    </item>
    <item>
      <title>Freedom and Liberty and the 4th Amendment</title>
      <link>https://www.sync.com/blog/4thamendment</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/4thamendment" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/check_logo-Feb-27-2025-06-48-49-3194-PM.png" alt="Freedom and Liberty and the 4th Amendment" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Happy 4th of July!&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.sync.com/blog/4thamendment" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.sync.com/hubfs/Imported_Blog_Media/check_logo-Feb-27-2025-06-48-49-3194-PM.png" alt="Freedom and Liberty and the 4th Amendment" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Happy 4th of July!&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=47231785&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.sync.com%2Fblog%2F4thamendment&amp;amp;bu=https%253A%252F%252Fwww.sync.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Thu, 04 Jul 2013 19:34:40 GMT</pubDate>
      <guid>https://www.sync.com/blog/4thamendment</guid>
      <dc:date>2013-07-04T19:34:40Z</dc:date>
      <dc:creator>Thomas</dc:creator>
    </item>
  </channel>
</rss>
