Sie sind auf Seite 1von 12

The most significant problems for companies that store and/or share their

Business files in an unsecured environmentare:


Challenges
for Potential
Customers
Filtrations of sensitive information from companies

Cyber-attacks that violate information security

Use of unsafe tools for information transfer

Restrictions with accessing data from various


locations

Not having visibility and control of files that are sent


with sensitive information
Data Leakage
and Hackings https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-
https://www.reuters.com/article/us-china-cyber-cloudhopper-companies-exc/exclusive-

Around the
china-hacked-eight-major-computer-services-firms-in-years-long-attack-idUSKCN1TR1D4
implants-iphones-google-says

World so far

https://7news.com.au/lifestyle/personal-finance/westpac-customers-urged-to-remain-vigilant-after-hackers-accessed-c-417666

https://www.nytimes.com/2019/07/29/business/capital-one-data-breach-hacked.html

https://www.elcontribuyente.mx/2019/07/por-recortes-datos-personales-en-manos-del-sat-e-imss-podrian-estar-desprotegidos/

Services

https://www.irishtimes.com/business/technology/google-accused-of-secretly-feeding-
Public Sector
personal-data-to-advertisers-1.4007629

Finance and
Insurance
https://www.techradar.com/news/wikipedia-taken-down-after-major-ddos-attack
Where does
Risk begin? 1. Information is stored on our
2. Asphishing,
a user we are at risk of receiving
devices and shared without any malware, ransomware, via
precautions or security. Mail, Office files, PDF, ZIP and RAR
files and Images.

3. We transmit the information with


our collaborators, clients,
4. With all the risks and without
protection or encryption at any level,
suppliers, without knowing if it the information can be anchored and
was intercepted or arrived at its of course stolen.
destination.
Information
Theft Cases https://www.nytimes.com/2018/11/30/business/marriott-data-breach.html

(Hospitality)

1. Hotels share information between


collaborators, other areas, including
2. Companies do not always have
secure access points or do not
sending guests information, centralize the safekeeping of
reservations and advertising. sensitive customer data.

3. Credit cards, passports, visas, 4. Without proper controls, the theft of


sensitive data can be done within
personal identification numbers,
number of flights, etc. were leaked. the same organization or suffer an
external attack.
Information
Theft Cases
(SMEs) https://smallbiztrends.com/2019/05/2019-small-business-cyber-attack-statistics.html

1. SMEs with less than 250 2. 47% of SME 3. 60% of respondents said 4. 74% of those who
employees, 67% of small representatives have that a neglected employee have participated in
and medium enterprises no knowledge and or external worker was the the survey say they
have experienced a cyber do not know how to cause of a gap. do not have
attack. And 58%, a data protect their A 37% who put the focus of adequate staff or
gap. companies. the cause on an external budget.
hacker.
Information
Theft Cases https://threatpost.com/unicef-leaks-personal-data-of-8000-users-via-email-blunder/148270/

(Self-Employed)

1. The collaborators
whose function is to be
2. If the appointment is
made at a midpoint, it 3. With the closing of
projects, businesses or
4. The most common way to
lose sensitive information is
with the client, usually may be in at-risk places, sales. The documentation by physical theft of
bring with them where you should always is digitized and stored in devices, leaving our
electronic devices to be alert to anyone else. the devices. customers' information
perform their functions. exposed.
Current
situation of
small and smartcompany.com.au/finance/fraud/cyber-crime-stay-ahead/

medium-sized
enterprises

1. Constant threats for 78% of the


companies; at least once a year they
2. 70% of companies do not have an
action plan or security strategy
have been attacked. against cyberattack losses.

3. Credit cards, passports, visas, personal 4. Without proper controls, the theft of
sensitive data can be done within
identification numbers, number of flights,
etc. were leaked. the same organization or suffer an
external attack.
How does
Provides a place for companies to store and manage documents in an ultra-
DigitalSafe
secure way.
protect?
Protects the privacy of information with proprietary technology, the highest level
encryption and Swiss privacy laws.

DigitalSafe stores the DigitalSafe encrypts the DigitalSafe complies with ISO DigitalSafe is a 100%
information in an information so you can share it certifications that allow the cloud service, at an
encrypted way, so that it inside and outside the secure storage of bank data, affordable cost, that
can be managed from organization, setting access contracts, sensitive does not require an IT
any device with Internet permissions per employee. information, personal data, etc. department for its
access. of any company. implementation.
Unlimited Notes: Notes are files or folders that can be created from DigitalSafe to
custom store information.
Protection Sending notes with PIN: A password for each file, allowing you to control who views
Features
the shared data from 4 to 22 digits.
Encrypted backup: In transit and at rest the information is protected under the
strictest security standards and our proprietary code.
Unlimited file share size: Share attachments with no size limit with SecureShare.
Creation of groups: Allows the control of the information Owner - Administrator -
User, with access permissions to each file or folder.
Monitoring: The history of each file allows you to check views, downloads and access
points (IPs). To control the activity on each file and document.
Password Manager: We store passwords with display encryption and create
encrypted passwords for any type of access.
Encrypted emails: You can use the digitalsafe.com domain or your business email
from any service provider to encrypt emails inside and outside your business.
Proprietary technology we call VirtualVaults to prevent unauthorized access, modification, or
destruction of data.

We are the only ones that protect each user individually, in a virtual vault with double layer
Competitive encryption for the information and for the user's account.
Advantage

• Proprietary multiple vaults encryption layers


eliminating mass data loss and cyber penetration
of mass database. Encrypted data is decrypted in
Server Environment Server Environment multiple layers per account and per user. This
process takes more computing power than the
competition.
• SecureSend allows you to have greater control
and security over the emails you send. Messages
never leave our secure server systems
are encrypted with proprietary multi-level
encryption.
• No data is sent over the wire. All data exchange
happens only in our secure server environment
without being exposed outside.
• On App levels for iOS and Android, we do not
store or cache anything on the API for Apps. No
information resides on mobile devices.
www.digitalsafe.com

bajo el ticker con símbolo SWISF bajo el ticker con símbolo SWIS
company/globex-data-ltd

@globexdata

@globexdataltd

Das könnte Ihnen auch gefallen