What you need to pay attention to so that you protect your data from access by third parties
Using Nextcloud’s open source software is convenient, but the software has cryptographic vulnerabilities and other shortcomings.
What to look out for when using Nextcloud can be found in this whitepaper, including:
What cryptographic vulnerabilities exist within the standard encryption module.
How to protect against data loss and data compromise
How to shield chosen confidences and integrity protection guarantees from third parties
You will receive guidance on how to assess and counteract potential risk to your organization.
// download
Click here for the whitepaper
If you wish to submit a form via HubSpot forms, we require your consent to load this service. You can revoke your consent at any time with future effect via “Edit cookies” in the footer.
You are currently viewing a placeholder content from YouTube. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.