Beruflich Dokumente
Kultur Dokumente
Around the
china-hacked-eight-major-computer-services-firms-in-years-long-attack-idUSKCN1TR1D4
implants-iphones-google-says
World so far
https://7news.com.au/lifestyle/personal-finance/westpac-customers-urged-to-remain-vigilant-after-hackers-accessed-c-417666
https://www.nytimes.com/2019/07/29/business/capital-one-data-breach-hacked.html
https://www.elcontribuyente.mx/2019/07/por-recortes-datos-personales-en-manos-del-sat-e-imss-podrian-estar-desprotegidos/
Services
https://www.irishtimes.com/business/technology/google-accused-of-secretly-feeding-
Public Sector
personal-data-to-advertisers-1.4007629
Finance and
Insurance
https://www.techradar.com/news/wikipedia-taken-down-after-major-ddos-attack
Where does
Risk begin? 1. Information is stored on our
2. Asphishing,
a user we are at risk of receiving
devices and shared without any malware, ransomware, via
precautions or security. Mail, Office files, PDF, ZIP and RAR
files and Images.
(Hospitality)
1. SMEs with less than 250 2. 47% of SME 3. 60% of respondents said 4. 74% of those who
employees, 67% of small representatives have that a neglected employee have participated in
and medium enterprises no knowledge and or external worker was the the survey say they
have experienced a cyber do not know how to cause of a gap. do not have
attack. And 58%, a data protect their A 37% who put the focus of adequate staff or
gap. companies. the cause on an external budget.
hacker.
Information
Theft Cases https://threatpost.com/unicef-leaks-personal-data-of-8000-users-via-email-blunder/148270/
(Self-Employed)
1. The collaborators
whose function is to be
2. If the appointment is
made at a midpoint, it 3. With the closing of
projects, businesses or
4. The most common way to
lose sensitive information is
with the client, usually may be in at-risk places, sales. The documentation by physical theft of
bring with them where you should always is digitized and stored in devices, leaving our
electronic devices to be alert to anyone else. the devices. customers' information
perform their functions. exposed.
Current
situation of
small and smartcompany.com.au/finance/fraud/cyber-crime-stay-ahead/
medium-sized
enterprises
3. Credit cards, passports, visas, personal 4. Without proper controls, the theft of
sensitive data can be done within
identification numbers, number of flights,
etc. were leaked. the same organization or suffer an
external attack.
How does
Provides a place for companies to store and manage documents in an ultra-
DigitalSafe
secure way.
protect?
Protects the privacy of information with proprietary technology, the highest level
encryption and Swiss privacy laws.
DigitalSafe stores the DigitalSafe encrypts the DigitalSafe complies with ISO DigitalSafe is a 100%
information in an information so you can share it certifications that allow the cloud service, at an
encrypted way, so that it inside and outside the secure storage of bank data, affordable cost, that
can be managed from organization, setting access contracts, sensitive does not require an IT
any device with Internet permissions per employee. information, personal data, etc. department for its
access. of any company. implementation.
Unlimited Notes: Notes are files or folders that can be created from DigitalSafe to
custom store information.
Protection Sending notes with PIN: A password for each file, allowing you to control who views
Features
the shared data from 4 to 22 digits.
Encrypted backup: In transit and at rest the information is protected under the
strictest security standards and our proprietary code.
Unlimited file share size: Share attachments with no size limit with SecureShare.
Creation of groups: Allows the control of the information Owner - Administrator -
User, with access permissions to each file or folder.
Monitoring: The history of each file allows you to check views, downloads and access
points (IPs). To control the activity on each file and document.
Password Manager: We store passwords with display encryption and create
encrypted passwords for any type of access.
Encrypted emails: You can use the digitalsafe.com domain or your business email
from any service provider to encrypt emails inside and outside your business.
Proprietary technology we call VirtualVaults to prevent unauthorized access, modification, or
destruction of data.
We are the only ones that protect each user individually, in a virtual vault with double layer
Competitive encryption for the information and for the user's account.
Advantage
bajo el ticker con símbolo SWISF bajo el ticker con símbolo SWIS
company/globex-data-ltd
@globexdata
@globexdataltd