When navigating the world of virtual data rooms and cloud storage solutions, we recommend avoiding four specific technologies.

What are they and why should I avoid them?

  1. Java plugins. In addition to needing constant updates, the Java plugin is a security risk, having allegedly caused over 50% of browser security breaches in 2012.*
  2. .NET Old .NET technology does not have CSRF capabilities, which means that malicious parties could request information from a site while posing as the site itself.
  3. Flash. Flash is pervasive on the web, but often encounters problems with load time and updates. Flash is commonly used to deliver parts of the user interface that were hard to render otherwise, but more secure HTML-based alternatives now exist. Flash can also crash or freeze a browser, in addition to not being compatible on the iPad or iPhone.
  4. Silverlight. Silverlight needs constant updates- if not updated, the software is vulnerable to malware such as Exploit Kit**.

It’s important to note that the aforementioned technologies present security problems namely in the necessity of updating. If a web product relies on any of these technologies, you and your colleagues will have to download and keep the technology updated. Additionally, the web product’s engineering team must also ensure that they update everything to reflect a new version of the plugin, which can result in unplanned downtime.

CapLinked does not use any plugins or third-party software whatsoever. When you share files on CapLinked neither you or the parties you share with have to worry about the updating or security risk associated with any of the aforementioned technologies.

Security is a top priority for CapLinked. CapLinked uses 256 bit SSL, audited for cross-site XXS scripting and CSRF vulnerabilities. We have also received SSAE16 certification and are HIPAA and SOC compliant.

To learn more about CapLinked’s ease-of-use and security, visit our product tour or our security page.

*Source: http://lifehacker.com/5988800/what-is-java-is-it-insecure-and-should-i-use-it
**Source: http://www.pcworld.com/article/2063841/cybercriminals-target-silverlight-users-with-new-exploit-kit.html