Enhancing Data Security with Our New Excel Watermark Feature

Empowering Excel with Watermark Security Our Excel watermark feature acts as an additional layer of security on top of our collaboration tools, enhancing your document editing by making it even more secure. Here’s how it works: Securing the Complete Excel View: Our watermark feature automatically applies watermarks to your spreadsheets. These watermarks are designed to […]

Protecting Innovation: The Growing Threat of Chinese Espionage in the UK

The world is constantly evolving, with technological advancements shaping the way we live and work. Recent news has highlighted the increasing threat of Chinese espionage to the UK, with over 20,000 people covertly approached by Chinese spies online. In this blog post, we will delve into this alarming development and explore the risks & implications […]

Prevent data leaks with our document protection technology

cybersecurity

In today’s digital era, the need for secure document protection techn has never been more critical. Protecting sensitive information in electronic documents is crucial. Projectfusion’s document protection technology, including on-screen watermarks and advanced security features, ensures unparalleled security. Join us to explore how our secure viewer brings peace of mind and confidentiality to your document […]

Data Hygiene Best Practices

Why is Data Hygiene Important? With much of our lives now taking place in the digital real, data hygiene is as important as ever in maintaining a secure digital presence. We recommended that you regularly review and organise your personal data to ensure that it is accurate, up-to-date, and secure. One of the most important […]

Datarooms, Privacy, Storage & Compliance in simple terms

Part 1) Storage of files When you host data with anyone (Microsoft, your Dataroom, file transfer), the files go sit on a bunch of servers, and it’s important to know where those servers are. Most providers are cloud first, and will literally store stuff everywhere. For your data there will be the storage servers, the […]

The Pocket Cybersecurity Handbook for Small Businesses

cybersecurity

You may have heard more and more about ‘cybersecurity this’ & ‘cybersecurity that’ recently, thinking that it might be something only large mega-corporations have a problem with. Granted, they often feature in many a news article as being the victims of a hack – being extorted by the perpetrators for huge sums of cash. You […]

Log4Shell Log4j 2 – not affecting our service!

log4j

We have not been affected by the Log4Shell (log4j) exploit. We’ve scanned all servers, confirmed that whilst lots of attempts to use the exploit, none had been successful. We’ve removed the vulnerable class from the log4j package, updated some configuration, and rebuilt our services. To find out more see here.

7 ways to improve your firms security without spending (much) money!

legalex security ai

We recently attended the LegalEx conference at London’s wonderful ExCel centre. Our founder, Angus Bradley, held an insightful talk demonstrating 7 ways to improve your firms security without spending (much) money. Some of the key takeaways from the session were: learning about the process errors that can kill your business, as well as the methods […]

Cybersecurity Roundup Q1 2021

cybersecurity UK

Here’s a look at the UK Cybersecurity landscape for Q1 2021. We’ll take a look at how businesses are being targeted, as well as the top security incidents in the quarter just gone. There were 351 security incidents (that were discovered) in Q1 2021, which resulted in 3,222,491,299 breached records! That’s a 50% increase in […]

Prevent Data Leaks with View-Only Permissions

“John’s business sale is going well, with 4 companies showing strong interest in the data room. Little known to John, one of the companies, a competitor, is happily downloading details of all of John’s senior staff, including contracts and packages.”     “Jane is working on a big transaction, and sees that the firm is […]

Protect your deal with Multi-Factor Authentication

Data rooms hold super sensitive data. Unauthorised access could be disastrous. Strong cybersecurity means less worrying over people seeing something they shouldn’t, or sending things to people who shouldn’t see them… Enter MFA What is it? MFA (Multi Factor Authentication) aka 2FA (2 Factor Authentication) – (computer geeks do love their acronyms!) works by adding […]

Simple steps to protect you and your team from phishing

phishing

Here’s a simple process to protecting your firm. We’ve all seen them. Those pain in the arse emails that range from outright blatant to almost genuine in appearance. Over 50% of recipients get hacked because of them. The cost of a phishing attack can be huge, not just in monetary value either. In 2017, law […]

What next now Microsoft has ended Windows 7 support?

windows 7

Today is the day that millions of Windows 7 users worldwide will stop receiving support from Microsoft. Microsoft is going to stop supporting Windows 7 from today (January 14th) in order to focus on newer technologies. For the last 12 months, Microsoft has been warning users that it will stop support for Windows 7 including […]

US government can still break your encryption without a court order

us government encryption

US Section 702 spying rules get deadline extension until April – and we expect it will continue after that, however it’s being challenged today by the House Freedom Caucus. For now, for Europeans, and anyone concerened about privacy, it’s just easier to keep your data in data centres with companies that do not have any US […]

GDPR – 7 Key elements you must have in your supplier contracts

gdpr

If you’re using a supplier to host *any* EU citizens personal data (including log entries, emails, documents, HR records, backups) then when GDPR starts in May 2018 you need to have a written contract with them that includes: subject matter and duration of processing type of personal data and categories of subjects. And that the […]

ISO27001 – don’t believe it until you’ve seen the certificate

iso27001

So often you see ‘ISO27001‘ bandied around on websites. If you’re planning on actually using a supplier you should always ask to see the certificate – and you should also check it every 12 months or so. We were in the early stages of looking at a new supplier – so I always ask for […]

I’ve been goated! Gamification and security

Gamification or fun security – I’ve just been goated We try and keep security simple, and even fun. In our office if you leave your screen unlocked for even a couple of seconds you get goated. Someone sticks a great big picture of a goat on your screen. Then adds a point to your tally.

 […]

Wannacry ransomware – update

1000hrs Monday 15th May 2017 In case you haven’t heard, a new exploit called WannaCry has been spreading across the internet since Friday. It’s ransomware that encrypts files and asks for money to recover them. As this time no-one knows if paying the ransom will actually recover your files. Impact on Projectfusion There is no […]

Do you consider cyber security in your supplier selection process?

Your organisation’s security doesn’t only depend on your own organisations efforts. Despite the most robust security measures, your organisations security is only as strong as the weakest link in your supplier chain. You should always search for suppliers that have had their security audited by a third party. ISO27001 is the international standard that demonstrates […]

3 tips to avoid a data breach

Click here to read the original article Here at Projectfusion, we implement all of these measures for you so your data remains safe and even the smallest company can have first class security in place. If you’d like a copy of our security white paper, click here or for some informal advice about ISO27001, see […]

Why we're still apple first for mobile – Shanghai surprise as cheap Android devices ‘phone home’ to China

Full story -> https://nakedsecurity.sophos.com/2016/11/16/shanghai-surprise-as-cheap-android-devices-phone-home-to-china/ This is we are still focused on apple first for our mobile strategy – a strategy which has to allow download on uncontrolled or untrusted devices, which could well be devices like these. With apple we have a good idea that the hardware and operating system can be trusted. We can […]

The risk of the multi-tenanted cloud

Last month you may have read about the Dropbox hack which lead to the leak of 68 million users email addresses and passwords. At Projectfusion, with our policy of providing each client with their own private cloud, these breaches simply could not happen. We believe that the security and performance benefits of single tenant hosting […]

iStorage USBs and why we use them

If you don’t know already here at Projectfusion we’re all about security. Our infrastructure, processes and personnel are fully ISO27001 compliant. So what happens when we send you data and rely on couriers to do their job correctly? Will your data be safe until it reaches your hands? Don’t worry, the answer is always a […]

Even better security and compliance

We’ve just released new updates and fixes for Projectfusion, focused on security, security, security! PDF Security and a new addition Our first improvement affects the Consumer PDF role, allowing you to disable the “Download PDF” button. You can re-enable it at anytime via More > Application (admin account only). Also we added a new button […]

ISO27001 – template – Applicable legislation for a UK SAAS Cloud company

One small but important aspect of an ISMS* is applicable legislation and regulation. When first starting our ISMS I struggled to come up with this list, so have posted it to give someone else a starting point and save them some time. This is a good starting point for UK cloud businesses on their way to ISO27001 […]

CIA boss has his personal email account hacked…

The hacker, has posted what is purported to be the CIA director’s contacts list, as well as call logs of Deputy National Security Advisor Avril Haines, amongst other information. This information was stored in an AOL account… More at Graham Cluleys site

Europe has killed the Safe Harbor agreement.

The European Court of Justice (ECJ) today ruled that the self-certified protections promised by Safe Harbor weren’t worthy of Europe’s ideal of privacy “as a human right”. The court declared the data-transfer agreement immediately invalid. The rules hugely affects Cloud services, where the majority of US firms rely on safe harbor to move information. Personal data […]

Useful UK Security acronyms and terminology

Security has it’s own set of acronyms and terms. Here’s a great list you will find useful for your ISO 27001 and other security work, Security and IT – Common acronyms: Accept (related to risks) These are risks you have decided as an organistion to accept. So you may choose to accept that as a […]

ISO 27001: Choosing an advisory partner – costs & options

When we started the road to ISO 27001 it was hugely daunting, a lot of unfamiliar terms and typical tech speak lingo made it all sound horribly complicated and difficult. We decided early on to hire a consultancy firm to help us prepare, and received quotes from £2,000 to £40,000 for the same job (help […]

ISO 27001 beginners guide – 5 key steps

Many businesses are now preparing or considering getting ISO27001 accredited, and it’s something you really should consider implementing if you host any kind of remotely sensitive information. This is the first in a short series of posts  – an ISO 27001 and Information Security beginners guide. What is ISO 27001 certification An ISO 27001 certification means […]