Deltagon Blog

Take a look at our blog on security of e-communications and e-services. You can also order up-to-date publications straight to your email.



Share and store your information securely – CollabRoom workspace meets the needs of the digital era

“Every company and organisation has information that needs to be processed in an especially secure manner. It is..

collabRoom Cyber Security Data protection secure forms Blog sensitive information


Data is a valuable asset – make sure you secure it properly!

“In Finland we have still not fully understood the fact that data is extremely valuable, which is also why it must be..

GDPR Cyber Security Data protection email security Blog sensitive information


A secure workspace – increased interest among companies

Recently there has been an increased interest for a secure workspace. Our customers find that they gain value from..

confidential files Data protection file sharing Information security Information sharing secure workspace


3 steps: How to prepare in advance to the EU Data Protection reform of 2018

The reform gives companies and organizations a good opportunity to check and put their own data security processes into..

GDPR General Data Protection Regulation Articles data protection Data protection Data Protection reform Information security personal data personal data register personal information Blog


Data protection package making progress in EU

The EU Parliament and Council negotiators have come to an agreement on the new data protection package that aims to..

EU data protection Data protection News


Basics of information security in email – getting to know the terminology

As communication has become electronic also information security and data protection are more talked about. What then is..

Information Security availability confidentiality data protection Data protection Information security integrity Security of e-mail Blog


Challenges of group messaging and file sharing

Communication between groups has become more and more electronic and independent of the location. However, group..

email Data protection file sharing group messaging Information sharing Blog


Responsibility for information security belongs to management - ensure a strong chain so that employee will not be the weakest link

”Confidential information cannot be sent by email”, instructs the information security policy of one company its..

Information Security Data protection Information security Blog


Four steps to identify critical information

Do you know what kind of confidential information moves between your company and the outside world? If not, I recommend..

Information Security confidential information critical information data protection Data protection Information security Blog


Good information security practices – Take this into account!

Probably every computer user is familiar with the words information security, and each one of us has some kind of..

data protection Data protection e-mail security electronic information security Information security information security guideline information security practice security of electronic communication Security of e-mail Blog

CTA -banneri

Lorem ipsum dolor sit amet, consectueter adipiscing elit. Sed posure interdum sem. Quisque ligula eros ullamcorper quis, lacinia quis faicilis sed sapien. Mauris varius diam vitae arcu. Sed arcu lectus auctor vitae,

Contact us

Do you have any questions? Do you want more information or a more detailed presentation? Please leave your contact information and we’ll get back to you.