Contact Sales

Sales: (888) 764-5741

Support: (888) 756-2713

Follow us:

FacebookLinkedinTwitterGoogle+
CapLinkedCapLinked
CapLinked
Secure document sharing and virtual data rooms
  • Features
    • Overview
    • CapLinked API
    • Concierge
    • Digital Rights Management
    • EZ Q&A
    • Integrations
    • Security
  • Customers
  • Use Cases
    • Secure Document Sharing
    • Document Management
    • Due Diligence Data Room
    • Enterprise
    • Financing
    • FTP Alternative
    • Legal Compliance
    • Virtual Data Rooms
    • Bankruptcy and Restructuring
    • Audits
    • Asset Sales & Purchases
  • Resources
    • About Us
    • CapLinked Blog
    • Research
    • Support
  • Pricing
  • Start Free Trial
  • Sign In
  • Features
    • Overview
    • CapLinked API
    • Concierge
    • Digital Rights Management
    • EZ Q&A
    • Integrations
    • Security
  • Customers
  • Use Cases
    • Secure Document Sharing
    • Document Management
    • Due Diligence Data Room
    • Enterprise
    • Financing
    • FTP Alternative
    • Legal Compliance
    • Virtual Data Rooms
    • Bankruptcy and Restructuring
    • Audits
    • Asset Sales & Purchases
  • Resources
    • About Us
    • CapLinked Blog
    • Research
    • Support
  • Pricing
  • Start Free Trial
  • Sign In

Category Archives: Security

You are here:
  1. Home
  2. Category "Security"

Is Peer-to-Peer File Sharing Safe?

How Safe Is Peer-to-Peer File Sharing?

Peer-to-peer file sharing has gotten a bad reputation due to its use in illegal sharing of copyrighted material. However, there is a legitimate use for P2P file sharing, as companies involved in dealings need to transfer large amounts of data securely.

May 17, 2022Security, UncategorizedBy Chris Capelle

SSAE 16 and SOC 2 Security

SSAE 16 and SOC 2 Security for Sensitive Documents, Transactions and Beyond

Security is important when leveraging third-party services, and it’s important to know that your vendors are compliant with industry standards including SSAE 16 and SOC 2 security measures.

May 12, 2022SecurityBy Jake Wengroff

PCI DSS Requirements: What You Should Know

What You Should Know about PCI DSS Requirements and Compliance

Fraud and hacks run rampant in the credit card industry, so knowing what the PCI DSS requirements are and how to implement them are vital for your business to remain secure and keep its good reputation intact.

May 5, 2022Security, Virtual Data RoomsBy Chris Capelle

Importance of Corporate Data Contingency Plans

Why Your Company Needs an Established Data Contingency Plan

A data disaster can happen to anybody — even your company. Having a data contingency plan in place and knowing what to do in the event of a natural or man-made event is key to your company’s overall health.

April 26, 2022SecurityBy Chris Capelle

What Is Data Governance?

Data Governance 101: Framework for Businesses

A data governance program defines who within an organization has the authority and control over data assets and how those data assets may be used. It encompasses the people, processes and technologies required to manage and protect data assets.

April 14, 2022SecurityBy Jake Wengroff

Virtual Data Protection: Can VDRs Be Hacked?

Virtual Data Protection: Can VDRs Be Hacked?

Virtual data rooms (VDRs) are secure online locations that offer virtual data protection for sensitive contents, but it’s important to know what protections are available and how they work.

April 12, 2022Security, Virtual Data RoomsBy Chris Capelle

Upgrade From a Corporate Record Book to a VDR

Are You Still Using a Physical Corporate Record Book? Here’s Why You Should Update to a VDR

For years, the corporate record book was the standard method for archiving a company’s documentation, but this method has several disadvantages that are remedied by using a virtual data room (VDR).

February 1, 2022SecurityBy Chris Capelle

information security lifecycle steps

What Are the Steps of the Information Security Life Cycle?

The steps of the information security life cycle provide proven, replicable processes for your organization’s IT team to protect network, systems and data. Read on to increase your knowledge.

January 13, 2022SecurityBy Dawn Allcot

security theater

How To Tell the Difference Between Digital “Security Theater” and Real Network Security

“Security theater” is the practice of implementing only superficial security measures, and cybersecurity programs are not exempt from it. Here’s how it can jeopardize your company.

December 21, 2021SecurityBy Jake Wengroff

information security program

How to Create an Information Security Program for M&A Deals

M&A deals involve the sharing of extremely sensitive documents and data, so how can companies set themselves up to close deals without compromising security? Learn more here.

December 16, 2021Deal Making, SecurityBy Jake Wengroff
12345
Next page
/* */