Common mistakes you should avoid when collaborating online

On the surface, collaborating in a team should be a simple affair, if you are open to new ideas and willing to solve problems as a team, collaboration goes smoothly.  Naturally, complications can always appear and collaborating becomes a more complicated effort. Here are common mistakes teams make when collaborating online. Read more

corporate-documents-safe

What could happen when your corporate files are not protected?

Every day we have to deal with sensitive documents. Many of us handle these documents by storing them in multiple places and others use complex passwords to keep their documents secure. Some, carefully choose a secure cloud solution that values their privacy. Read more

google-analyzing-content-corporate-documents-vboxxcloud

Google is analyzing the content of corporate documents

During Halloween, Google informed Google G Suite users the company had pushed an update flagging incorrectly a small percentage of Google Docs as abusive, blocking access to documents. While the issue has been fixed, Google’s latest suite update reminded us that many cloud providers access file data indiscriminately. Read more

Over the years we’ve integrated many tools into vBoxxCloud that help you be more productive.

5 things you didn’t know you can do with vBoxxCloud

Over the years we’ve integrated many tools into vBoxxCloud that help you be more productive. Did you know you can create an unlimited number of external users and share content securely? Read more

Governments requesting more personal data from Facebook

Facebook personal data requests have been increasing since 2013. Governments worldwide have been increasingly requesting user data,according to Facebook’s Government Requests Report. Read more

How to protect yourself from the KRACK Wi-Fi vulnerability?

How to protect yourself from the KRACK vulnerability?

On Monday we have received some bad news regarding Wi-Fi network security. Wi-Fi networks are at risk of being hacked based on a recently discovered vulnerability (Key Reinstallation Attacks).  Read more