Deltagon Blog

Take a look at our blog on security of e-communications and e-services. You can also order up-to-date publications straight to your email.

Subscribe

Blog

Share and store your information securely – CollabRoom workspace meets the needs of the digital era

“Every company and organisation has information that needs to be processed in an especially secure manner. It is..

collabRoom Cyber Security Data protection secure forms Blog sensitive information

Blog

Data is a valuable asset – make sure you secure it properly!

“In Finland we have still not fully understood the fact that data is extremely valuable, which is also why it must be..

GDPR Cyber Security Data protection email security Blog sensitive information

Blog

Email encryption and cloud services – 5 tips for secure information management

“When you move your business to the cloud, it is important to ensure your information security. The information security..

GDPR Cyber Security email encryption email messaging email security Blog sensitive information

Blog

Working from home – How to sign and share documents digitally and securely?

“How is it going with your remote working?” That’s the question that comes to my mind while I am looking at the document..

Blog electronic signature digital signatur

Blog

Safer e-mail with just a few clicks

E-mail is the most used medium of electronic communication in the world, but its information security is terrible...

email messaging secure e-mail Blog data security internal email traffic

Blog

How to make it easier and faster to sign a contract?

The details of a huge deal are finally agreed upon and the contract only need the official signature. However, the..

Blog electronic signature digital signature

Blog

Signature to image file or Excel?

Want to get approval for a complex calculation, chart, graphic, floor plan or similar? After official approval by the..

secure workspace Blog electronic signature digital signature

Blog

Store and share critical information digitally and securely

Does your organization handle business critical information? Do you wish you had a place to digitally store that..

critical information Information security secure workspace Blog

Blog

Using smartphones in confidential business - security threat or opportunity?

Smartphones are nowadays used by virtually everyone from schoolchildren to senior citizens, and the phones are full of..

confidential information Information security Blog

Blog

10 reasons to encrypt your company’s emails

Appropriate handling of confidential information and focusing on information security is more relevant than ever and one..

confidential information email encryption Information security Blog data leak

CTA -banneri

Lorem ipsum dolor sit amet, consectueter adipiscing elit. Sed posure interdum sem. Quisque ligula eros ullamcorper quis, lacinia quis faicilis sed sapien. Mauris varius diam vitae arcu. Sed arcu lectus auctor vitae,

Contact us

Do you have any questions? Do you want more information or a more detailed presentation? Please leave your contact information and we’ll get back to you.