13-11-2018

What hosting guarantees should you expect from your file sharing solution?

When thinking about the security of your data, you need to think about how it is hosted. Where will your…

Read the article

infographics-encryption-oodrive

23-10-2018

Infographics – End-to-end encryption by Oodrive

End-to-end encryption by Oodrive Companies process highly confidential data. Today, digital has become widely popularized in organizations that are increasingly using the cloud to exchange documents. We must then manage all aspects related to data security. End-to-end encryption is a perfect solution. Indeed, it makes information readable only by the sender and the recipient. No one else can decipher them,…

Read the article

online-backup-security

16-10-2018

Six questions about online backup

Data is the oil of the 21st century. Without it, businesses just couldn’t function anymore. That’s why your organization needs to guarantee data security, and make sure that you can recover quickly and completely, in case the worst does happen. So what’s the solution? Online backup, supported by backup software, is absolutely vital to your business. Find out everything you…

Read the article

25-09-2018

Infographics – End-to-end encryption

End-to-end encryption Companies process highly confidential data. Today, digital has become widely popularized in organizations that are increasingly using the cloud to exchange documents. We must then manage all aspects related to data security. End-to-end encryption is a perfect solution. Indeed, it makes information readable only by the sender and the recipient. No one else can decipher them, whether it…

Read the article

it-security-vacation

09-08-2018

IT security: stay secure on vacation

Summer is here, and so is vacation time. Employees everywhere will be leaving the office and their colleagues behind – heading for the coast, the mountains, the countryside, with family or friends. But switching off is often easier said than done. In fact, many staff give in to temptation and find themselves checking their emails, even if they’re lying on…

Read the article

ransomhack-data-breaches-gdpr

05-07-2018

Ransomhack: how are hackers using the GDPR against businesses?

The new EU General Data Protection Regulation (GDPR) lays down some strict penalties for non-compliance. The fines of up to 20 million euros or 4% of a company’s annual revenue for breaching the legislation are a real incentive for companies to make sure they’re compliant. But this has also given hackers a new idea: a ransomhack. Ransomware is a form…

Read the article

google-https-ssl-certificate

05-06-2018

HTTPS: Google puts unsecured websites ahead of their responsibilities

HTTPS. Hypertext Transfer Protocol Secure. For several years now, Google has been dedicated to increasing the use of HTTPS technology to make the web more secure. By the end of 2018, sites that fail to adopt HTTPS will be marked as ‘unsecure’ by the US tech giant. Initially, HTTPS was largely used by banks to ensure online translations were secure.…

Read the article

09-05-2018

Shadow IT: will GDPR bridge the gap between perception and reality?

In early 2017, a study revealed that 39% of company cloud services were ordered without the IT department’s permission. A report published the following year by French IT security experts association CESIN and Symantec showed that trend toward shadow IT only continues to grow. There is also a wide gap between perception and reality when it comes to shadow IT…

Read the article

More result

Oodrive, the trusted partner for sensitive data management

Learn more Contact us