Using a DVD archive in 2022? They have a short life expectancy…

DVD Archive – This article was originally published in 2014, but has since been updated in 2023 to reflect technological changes since then. If you’re still using a CD or DVD archive for important files, did you know they have an expected life span of 2-5 years? It is still hugely popular to store important […]
Pre-planning a corporate virtual data room
Pre-planning a corporate virtual data room Great article above, with some great advice, my favourites: When constructing a VDR, it is often best to disclose more rather than disclose less. Allowing unfettered access to one or more potential buyers can cripple a deal if a party decides to walk during the due diligence phase. Having […]
We would go so far to say, if it doesn’t have 2 factor authentication, don’t use it..
We would go so far to say, if it doesn’t have 2 factor authentication, don’t use it.. 2 factor authentication is a no longer an option, it’s a requirement. Agree. Two particularly interesting points in this article:
Finally – easy permissions for data room deal management
We knew we had to make data room folder permissions easier, so we’ve crafted a 1 page interface that lets you see all your data room permissions in one place, and change them. You can manage groups, and see exactly what they can view, down to the file level, on one screen. Here’s an example:
Data freedom – CMIS
When choosing cloud services that will be hosting your data, it’s important to think about access to your content, and how you can get it. In the context of a document or management system content will be files and folders, and also things like comments and meta data. When you have uploaded thousand or millions […]
2 step authentication – stop hackers, bad leavers and leaks!
Projectfusion will be offering 2 step authentication from August 14th. It’s simple for users, just requiring them to enter a token sent to their email address. This offers great protection from risks like hackers, 3rd party leavers and deliberate leaks. Like all good things it appears simple, however a lot of thought has gone into […]
3rd party leaver protection – securing your extranet and virtual data room
During a recent risk review we came up with a widespread risk: the 3rd party leaver.
If you share files with any external parties you need to think about this. It’s a big risk common to all services that let you share files with external people.
German government terminates Verizon contract over NSA snooping fears
“There are indications that Verizon is legally required to provide certain things to the NSA, and that’s one of the reasons the co-operation with Verizon won’t continue,” said German interior ministry spokesman Tobias Plate.
ICO report highlighting the 8 most common security vulnerabilities
What are the top 8 security vulnerabilities? The Information Commissioner’s Office (ICO) has published a new security report highlighting eight of the most common IT security vulnerabilities that have resulted in organisations failing to keep people’s information secure. No real surprises here, the top eight computer security vulnerabilities covered in the ICO’s report comprise: a failure to […]