Category archives: Information Security

RSS feed of Information Security

How do Virtual Data Rooms Comply with the ISO/IEC 27000 Information Systems Management Standard?

Last update on .

How do Virtual Data Rooms Comply with the ISO/IEC 27000 Information Systems Management Standard?
Corporate information, being a key company asset, is exposed to high risks caused by the intensity of business operations, competition and multilateral communications. This makes data security a critical concern for corporations and creates the need of comprehensive information security management to deal with planning, optimizing, controlling and protecting corporate information contents and flows. As ...

Continue reading

EC Proposed Directive on the Protection of Business Secrets

Last update on .

EC Proposed Directive on the Protection of Business Secrets

To provide a harmonized legal framework that will help protect businesses from unauthorized use of trade secrets in the EU, in January 2014, the European Commission adopted a proposal for a new Directive on the Protection of Business Secrets. The EC acknowledges the potential of data room solutions to help meet the requirements in the ...

Continue reading

How to Recognize and Avoid Securities Investment Fraud?

Last update on .

How to Recognize and Avoid Securities Investment Fraud?

Providing relevant information that will help our customers to better protect themselves from investment-related risks is one of Merar’s priority tasks. In our blog archive you can find plenty of articles on the scam threads entrepreneurs are facing when looking for funding. Since investors who seek opportunities are also objects of scam attacks and ...

Continue reading

Higher Security Standards: Merar Has Improved Its Payment Verification Process

Last update on .

Merar implements triple security protectionMerar is introducing a triple validation procedure to protect its online community from credit card fraud and online scam.

Sadly, communication and business-making through the Internet is continuously being hampered by the rising wave of online fraud. The field of investment seeking, where money and sensitive information are on the table, is particularly vulnerable. Yet ...

Continue reading