Deltagon Blog

Take a look at our blog on security of e-communications and e-services. You can also order up-to-date publications straight to your email.

Subscribe

Blog

Using smartphones in confidential business - security threat or opportunity?

Smartphones are nowadays used by virtually everyone from schoolchildren to senior citizens, and the phones are full of..

Blog confidential information Information security

Blog

10 reasons to encrypt your company’s emails

Appropriate handling of confidential information and focusing on information security is more relevant than ever and one..

Blog email encryption confidential information data leak Information security

Blog

Effective information security is simple and easy

In principle, every business has something unique and worth protecting. Ultimately, all business is based on knowledge...

confidential information Information Security Information security Blog electronic communication

Blog

File sharing – by email or in a data sharing service?

Various files are constantly distributed in electronic format. A surprising number of them contains information that..

Blog file sharing Information sharing Information security secure e-mail

Blog

Internal approval process – electronically and securely

An employee sends a bill for monthly expenses. A manager must accept the invoice, after which it will be paid. The..

Blog Information security approval process

Blog

What is meant by email DLP?

We at Deltagon often talk about how e-mail DLP can help prevent data leaks and follow the fulfillment of information..

Articles Blog email encryption data leak Information security information security policy email DLP

Blog

How to improve business with information security

Companies want to stay ahead of their competitors but to be at the fore front means constant business development, such..

Articles Blog confidential data email Information security email DLP digital signature electronic signature

Blog

Save time and money with digital signature – make life easy

Have you ever thought that the signing process can take days or even weeks in worst cases? Documents are sent between..

electronic signature Blog digital signature Information security

Blog

What should a company take into account when considering investing in security solutions?

Many managers agree that security solutions are necessary and that the protection of electronic communication is..

Information security Blog security critical information investment security solution

Blog

Simplicity improves email security

If e-mail encryption is found to be too difficult users many times look for an easier way to do the task. E-mail security..

Articles email encryption Information security Blog email e-mail security confidential data

CTA -banneri

Lorem ipsum dolor sit amet, consectueter adipiscing elit. Sed posure interdum sem. Quisque ligula eros ullamcorper quis, lacinia quis faicilis sed sapien. Mauris varius diam vitae arcu. Sed arcu lectus auctor vitae,

Contact us

Do you have any questions? Do you want more information or a more detailed presentation? Please leave your contact information and we’ll get back to you.