- All categories you are currently on the blog page with all categories and articles
- Security przejdź do strony artykułów z kategorii Security
- Case study przejdź do strony artykułów z kategorii Case study
- Good practices przejdź do strony artykułów z kategorii Good practices
- Mergers and acquisitions przejdź do strony artykułów z kategorii Mergers and acquisitions
- Energy przejdź do strony artykułów z kategorii Energy
- Real Estate przejdź do strony artykułów z kategorii Real Estate
- Due Diligence przejdź do strony artykułów z kategorii Due Diligence
- Virtual Data Room przejdź do strony artykułów z kategorii Virtual Data Room
- FORDATA Team przejdź do strony artykułów z kategorii FORDATA Team
- Reports przejdź do strony artykułów z kategorii Reports
- Expert's View przejdź do strony artykułów z kategorii Expert's View
- All categories przejdź do strony głównej strony bloga
- Security przejdź do strony artykułów z kategorii Security
- Case study przejdź do strony artykułów z kategorii Case study
- Good practices przejdź do strony artykułów z kategorii Good practices
- Mergers and acquisitions przejdź do strony artykułów z kategorii Mergers and acquisitions
- Energy przejdź do strony artykułów z kategorii Energy
- Real Estate przejdź do strony artykułów z kategorii Real Estate
- Due Diligence przejdź do strony artykułów z kategorii Due Diligence
- Virtual Data Room przejdź do strony artykułów z kategorii Virtual Data Room
- FORDATA Team przejdź do strony artykułów z kategorii FORDATA Team
- Reports przejdź do strony artykułów z kategorii Reports
- Expert's View przejdź do strony artykułów z kategorii Expert's View
-
27 . 02 . 2020
Good practicesHow to black out text in a PDF document correctly?
Document redaction has many faces - it may turn out that overwriting of the text in our document, which at first glance looks...
-
03 . 02 . 2020
SecuritySafe cloud and the user - a marriage of convenience
According to a report on cloud computing prepared by McAfee, up to 87% of the companies surveyed believe that...
-
31 . 10 . 2019
SecurityRules of Safety Policy in FORDATA VDR
The FORDATA team is aware that even well-secured infrastructure has no chance against any infection resulting from human error.
-
18 . 10 . 2019
SecurityDropbox security - what should your business know?
Dropbox makes collaboration and sharing of documents easier but is the platform secure enough for our company to process confidential information with it? What to...
-
14 . 08 . 2019
Good practicesFake software aggregators – how to identify them?
Fake software aggregators and Virtual Data Room industry. See how developers try to deceive their customers with fake software comparison websites.
-
31 . 07 . 2019
SecurityCloud Data Storage And File Security
The internet has become a common thing in companies’ lives. The enormity of dedicated services, fast transfers and increasing mobility...
-
01 . Fake software aggregators – how to identify them?
Fake software aggregators and Virtual Data Room industry. See how developers try to deceive their customers with fake software comparison websites.14.08.2019
-
02 . CEE countries stay firm as global economy bears down
In the face of economic downturn all around, also in Europe, countries in the CEE region are expected to keep growing, especially...16.12.2019
-
03 . The role of the CFO in mergers and acquisitions – has it changed?
Financial directors have faced the big challenge of managing company's funds in the uncertain reality caused by the coronavirus ...22.03.2021
-
04 . Safe cloud and the user – a marriage of convenience
According to a report on cloud computing prepared by McAfee, up to 87% of the companies surveyed believe that...03.02.2020