Deltagon Blog

Take a look at our blog on security of e-communications and e-services. You can also order up-to-date publications straight to your email.

Subscribe to the blog

Blog

Effective solutions do not always have to be complicated - Case Partner Portal

As every month more and more of Deltagon's revenue comes through the partner channel, it became relevant for us to..

Information sharing Blog partner program

Blog

How do I make sure personal data is not sent by email without being protected?

E-mail is an easy and fast basic communication tool that everyone can use. If there is no internal company guidance or no..

personal data secure e-mail email DLP Blog

Blog

Digital services enable a more relaxing holiday

The CEO is spending a remote day at the summer cottage and you need a signature today for an important trade agreement?..

Blog electronic signature digital signature

Blog

Data Protection in Subject Access Requests (SAR)

The EU’s General Data Protection Regulation (GDPR) has brought numerous rights to the data subject in regard to the..

GDPR General Data Protection Regulation data protection personal data Blog

Blog

How do I verify who fills out a form?

Does your company collect data using forms? If the form is not personally returned, do you have the means to verify who..

Electronic forms electronic services Blog strong identification

Blog

File sharing – by email or in a data sharing service?

Various files are constantly distributed in electronic format. A surprising number of them contains information that..

file sharing Information security Information sharing secure e-mail Blog

Blog

GDPR elevates the information society into a new era

We are approaching the last moments before the EU's General Data Protection Regulation (GDPR) will be applied on 25th of..

GDPR General Data Protection Regulation Articles data protection data protection regulation personal data Blog

Blog

Encrypting your internal e-mail traffic – what is it about?

E-mail should not be used for the exchange of confidential data such as personal information without encryption. But why..

email messaging secure e-mail Blog data security internal email traffic

Blog

Internal approval process – electronically and securely

An employee sends a bill for monthly expenses. A manager must accept the invoice, after which it will be paid. The..

Information security Blog approval process

Blog

Secure data transfer – what to consider

In group communications such as project groups, there is often a need to distribute information and files electronically...

confidential information Blog data security data transfer

CTA -banneri

Lorem ipsum dolor sit amet, consectueter adipiscing elit. Sed posure interdum sem. Quisque ligula eros ullamcorper quis, lacinia quis faicilis sed sapien. Mauris varius diam vitae arcu. Sed arcu lectus auctor vitae,

Contact us

Do you have any questions? Do you want more information or a more detailed presentation? Please leave your contact information and we’ll get back to you.