Using a DVD archive in 2022? They have a short life expectancy…

projectfusion

DVD Archive – This article was originally published in 2014, but has since been updated in 2023 to reflect technological changes since then. If you’re still using a CD or DVD archive for important files, did you know they have an expected life span of 2-5 years? It is still hugely popular to store important […]

Pre-planning a corporate virtual data room

Pre-planning a corporate virtual data room Great article above, with some great advice, my favourites: When constructing a VDR, it is often best to disclose more rather than disclose less. Allowing unfettered access to one or more potential buyers can cripple a deal if a party decides to walk during the due diligence phase. Having […]

Finally – easy permissions for data room deal management

We knew we had to make data room folder permissions easier, so we’ve crafted a 1 page interface that lets you see all your data room permissions in one place, and change them. You can manage groups, and see exactly what they can view, down to the file level, on one screen. Here’s an example:

Data freedom – CMIS

When choosing cloud services that will be hosting your data, it’s important to think about access to your content, and how you can get it. In the context of a document or management system content will be files and folders, and also things like comments and meta data. When  you have uploaded thousand or millions […]

2 step authentication – stop hackers, bad leavers and leaks!

Projectfusion will be offering 2 step authentication from August 14th. It’s simple for users, just requiring them to enter a token sent to their email address. This offers great protection from risks like hackers,  3rd party leavers and deliberate leaks. Like all good things it appears simple, however a lot of thought has gone into […]

ICO report highlighting the 8 most common security vulnerabilities

What are the top 8 security vulnerabilities? The Information Commissioner’s Office (ICO) has published a new security report highlighting eight of the most common IT security vulnerabilities that have resulted in organisations failing to keep people’s information secure. No real surprises here, the top eight computer security vulnerabilities covered in the ICO’s report comprise: a failure to […]