Virtual Data Room Blog

EthosData virtual dataroom on Spectre and Meltdown security vulnerabilities: what you need to do

05-Jan-2018 16:09:00 / by David Diez posted in Data Security

0 Comments

Google researchers reported recently two major security flaws, Meltdown and Spectre, that could affect almost all computers, phones and servers and these vulnerabilities affect device’s microprocessors.

Read More

Ways Of Sharing Documents Online in 2021 - #6 is better than DropBox!

11-May-2017 09:00:00 / by Anubhav Singh posted in ethosdata, virtual data room, Data Security

0 Comments

Sharing documents online is second nature to most of us. We need to share documents to demonstrate the work we have done, to get comments and feedback, to enable us to collaborate with our colleagues, partners, and consultants, and sometimes to get our boss to sign, scan and send us back the document so that we can record another successful sale.

Whatever the purpose, I am sure that you want to know what is the best way of sharing your documents online.

I will go through all the major options available to you to share files online:

Read More

Still Using FTP? 3 Reasons to Change to a Virtual Data Room

26-Mar-2017 09:00:00 / by Kamal Raj posted in M&A, Data Room, virtual data room, Data Security

0 Comments

If you’re still using FTP or other consumer storage and transfer solutions for your business requirements, here are 3 reasons to switch to an secure modern solution such as a virtual data room. Remember when you discovered FTP (file transfer protocol) and you thought it was so advanced to be able to upload your data to cyber space? In the good old days before online security became a critical issue, FTP was the answer to transferring information, particularly large files. The problem is, FTP is 40 years old now, and that’s ancient in terms of information technology. 

Read More

Security Update (Logjam flaw) - EthosData Virtual Dataroom

03-Jun-2015 15:07:34 / by Francisco Lorca posted in Dataroom Security, Data Security

0 Comments

Several weeks ago it was discovered that a new vulnerability, which allows a downgrade attack against the TLS protocol itself called Logjam, which exploits EXPORT cryptography.

This vulnerability does not affect EthosData´s virtual data room. Our servers infrastructure and encryption communication does not allow to downgrade attacks as it have a strong 2048-bit encription key exchange parameters (Diffie-Hellman key exchange).

A group from INRIA, Microsoft Research, Johns Hopkins, the University of Michigan, and the University of Pennsylvania published a deep analysis of the Diffie-Hellman algorithm as used in TLS and other protocols. 

Read More

Six Dataroom Tips to fight Social Engineering

04-Nov-2013 13:22:00 / by Harsh Batra posted in virtual data room, Data Security, security

0 Comments


So, as we discussed, social engineering is usually the weakest link in document and IT security.

Our virtual dataroom clients frequently ask us for advice or best practices to fight social engineering.  Here are the top 6 we tell them:

1.Protect Your Passwords

This sounds like a no-brainer, but it’s not as straightforward as it sounds. People regularly give out passwords without realizing it, for reasons such as receiving a text message from the “boss” saying he has forgotten his password and can’t access his information while in an important meeting. Make it a rule for no-one to disclose a password ever, under any circumstances whatsoever. If a password is mislaid, follow secure protocols for resetting it and creating a new one.

Read More

Social engineering, the weakest link

29-Oct-2013 16:11:00 / by Harsh Batra posted in Data Room, Data Security, security

0 Comments

Social engineering is probably the biggest threat for your confidential information.  We as dataroom providers spend a very significant amount of time making sure that our professionals are well versed in the tricks that can take down the most secure systems.   

Read More

Policies into practice, a Virtual Dataroom perspective (part III)

18-Oct-2013 12:05:00 / by Kamal Raj posted in Data Room, virtual data room, Data Security, security

0 Comments


In the third of our posts about a robust security policy from a Virtual Data Room provider's perspective, let’s take a look at how you actually implement the policy.  As in other posts in these series, we are sharing with you some of the learning/policies, that we have implemented in EthosData to manage our Dataroom business.

The hardest part of the process is often rolling it out to your organization and getting employees’ buy-in and commitment to comply with it. The best intentioned projects can fall flat when it comes to the implementation phases, so you need to plan this step carefully to ensure its success.

Read More

Common Mistakes in security policies, Data room perspective (II)

16-Oct-2013 12:57:00 / by Kamal Raj posted in Data Room, virtual data room, Data Security

0 Comments

Recently we wrote about the importance of implementing basic security policies from a virtual data room perspective. We highlighted how to assess the risk and take a systematic approach to the things a robust data security plan needs to cover. All your efforts are worthless, however, if you don’t follow through by tracking compliance with the policy, keeping it updated as new risks present themselves and educating your employees on how best to use the policies they have.

Read More

Basic security policies, a virtual data room perspective(I)

30-Sep-2013 15:20:00 / by Kamal Raj posted in virtual data room, Data Security, security

0 Comments

Security of your critical business data is paramount no matter if you are running a high profile transaction through a Virtual Data Room or just running your normal business transaction on a daily basis. Companies, regardless of size, rely on critical business data in order to succeed and flourish.

Read More

Virtual Data Rooms: Safeguarding Sensitive information from APT

02-Sep-2013 10:29:00 / by Kamal Raj posted in virtual data room, Data Security, security

0 Comments

Its Monday ! Here we are again to stress on the importance of Security and how a  Virtual Data Room can protect and minimize potential threats to your confidential documents. The same ingenuity that brought us the technology of the information age brought us cybercrime – a new class of criminal activity that takes place entirely online. It includes security breaches, compromised intellectual property, identity theft and fraud. Business is particularly vulnerable to the Advanced Persistent Threat (APT) category of cybercrime.

What would the damage to your company be of such an attack? Safeguard  your sensitive information by understanding how APTs work and how to  protect yourself against them.

Read More