The THEDATASAFE Blog

News & Expertise

Since 2014, THEDATASAFE has been reporting on data protection and significant events in Cloud services — to keep you informed and protected.

Topics: ✦ New Services Security & Privacy Cloud Evolutions Regulations
Collaboration — simultaneous editing of Excel, Word and PowerPoint in Switzerland
✦ New · Available Now
New Services · April 2026

Collaboration: co-edit Excel & Word files, hosted in Switzerland

THEDATASAFE launches its Collaboration module: open and simultaneously edit Excel, Word and PowerPoint files as a team — like Google Docs, but hosted in Swiss Romand and end-to-end encrypted.

No more sending attachments via email or managing version conflicts. Thanks to our seamless integration, multiple team members can work on the same document directly from their browser with version history, comments, and real-time activity notifications.

Your professional documents remain sovereign, beyond the reach of the US Cloud Act. A granular permissions system allows you to control exactly who can view, comment, or edit each file within your organization.

Read full article
New Services · THEDATASAFE
Sovereign Calendar — encrypted 100% Swiss professional agenda
✦ New · Available Now
New Services · April 2026

Sovereign Calendar: your 100% Swiss professional agenda

Stop entrusting your professional appointments to Google Calendar or Microsoft Outlook, hosted in the US and subject to the Cloud Act. THEDATASAFE launches its Sovereign Calendar: an encrypted professional agenda hosted in Swiss Romand.

Our solution synchronizes your events directly across all your desktop and mobile devices (iOS, Android, Windows, Mac) using the standardized CalDAV protocol. Create dozens of shared calendars to coordinate teams, and send email invitations securely.

Synchronized with your client files, your critical deadlines remain under your exclusive control. You retain your usual workflow while benefiting from our ISO 27001-certified security bubble, protected by strict Swiss data protection legislation (nFADP).

Read full article
New Services · THEDATASAFE
Sovereign Contacts — professional address book free from Big Tech
✦ New · Available Now
New Services · April 2026

Sovereign Contacts: your business address book free from Big Tech

Google Contacts, iCloud, Microsoft 365 — your professional contacts are exploited by these foreign platforms to feed their analytics systems. THEDATASAFE now offers a sovereign address book hosted in Switzerland.

With 2-way CardDAV synchronization, your professional address book follows your team members on their smartphones. If you add a contact from your phone app, it is instantly saved to THEDATASAFE's Swiss servers without ever crossing the Big Tech ecosystem.

Share your contact lists, manage access rights, and regain full control over your business relationships in perfect compliance with the new Swiss Federal Act on Data Protection (nFADP) for your business.

Read full article
New Services · THEDATASAFE
The Digital Challenges of Wealth Management
Cloud & Technology

The Digital Challenges of Wealth Management

Since the late 90s, we have witnessed the advent of a new digital business model. Finance has been heavily impacted by the digital revolution, and this phenomenon now affects wealth management.

The recent and rapid proliferation of digital-oriented startups dedicated to wealth management demonstrates the digitization of this sector.

Added value in productivity and customer service
Digital technologies undoubtedly allow wealth management companies to gain speed (faster processing of tedious tasks), rigor, and credibility. This shift primarily focuses on two aspects: productivity (processes) and client service.

At the process level, procedures are simplified, standardized, and accessible. The client, on the other hand, is more informed and empowered, developing a relationship of trust. "Fintech" digital solutions assist the advisor with significant added value.

The Web Client & Social Networks
With the development of networking, the digital turn must nevertheless be taken. To be successful, the digital transition of wealth management must inspire trust and refocus on the human element. This is what solutions like THEDATASAFE offer in a guided and simplified manner. Do not hesitate to consult us.

Read full article
Technology & Mgmt · THEDATASAFE
Financial Institutions and Cloud Computing
Security & Privacy

Financial Institutions and Cloud Computing: a Question of Trust

On the one hand, Cloud Computing allows companies to access numerous services while freeing themselves from server management. On the other hand, financial bodies are subject to strict control.

How can financial organizations use the Cloud safely?

The Private Cloud and Information System Security
The "Private Cloud" is defined as a transformation of the internal infrastructure. This private mode could be more suited to the requirements of banks. The major question is that of security: availability, integrity, data confidentiality, and management of IT traces. Because it is more profitable to apply security measures on a large scale, the Cloud brings a multiplicity of storage locations and the centralization of audits.

Risk Analysis
Cloud computing responds positively to risk analysis. With THEDATASAFE's Cloud service: the financial institution is able to respond to regulators, data is encrypted, hosted transparently, and subject to strict security measures.

OCIM allows fiduciary, investment or banking institutions to formalize a Cloud solution that integrates their regulatory obligations.

Read full article
Secure Cloud · THEDATASAFE
A Few Common Security Mistakes
Security & Protection

A Few Common Security Mistakes

Most of the ‘minor’ mistakes about your online security are done daily due to a lack of precaution rather than a major flaw in your security systems.

Yet, they are easy to prevent:

  • Do not share your location: This is a much more sensitive and private info than it seems. It indicates that you are not at home.
  • Do not communicate your personal data: Whether this is your social security number, your passport number... Refuse to indulge in this implied rule.
  • Do not set your social media profile as public: By making your posts public, you open a window for everyone on your private life.
  • Vacation: Wait until you are back home to publish your photos. Burglars know how to deduce you are not home.
  • Out of Office message: Give just the minimum of information.
  • Phishing: Beware of the fake e-mails asking for your banking information. Never send your bank info by e-mail or chat.
Read full article
Online Security · THEDATASAFE
A Strong Password
Security & Protection

A Strong Password

A strong password gets its strength by length, complexity, unpredictability and the variety of symbols it contains. Forget '0000' or 'password'.

While '0ZéroNul2-2!' or 'Pa$5w0rd!' are already better.

Forget the words which appear in the dictionary, they are systematically scanned by hackers (at the speed of 300,000 words per minute). Forget your date of birth or historical events and other numbers-only passwords. Not complex enough.

A strong password must contain a variation of complexity.

Other examples. 'Mom' is a bad password. But 'MAM4' is a little stronger. 'M4mA<3' will be optimal. Another example. 'Allblacks' is low, 'a11Blacks' is medium and 'A11Black $' is a strong password.

Insert numbers and special characters, make some spelling mistakes, outsmart the robots with these tips: 'b4mbEe!', 'Ch4rLo77E_', '$H0K0l&te' …

Read full article
Best Practices · THEDATASAFE
Password Managers
Technology & Privacy

Password Managers: the Zero Knowledge Approach

Password managers are softwares or applications that allow you to store your passwords in a single protected portfolio. The obvious question is: what about security?

Many SMEs think: "I have a cloud password manager, so I'm safe." But the ETH Zurich report reminds us that crypto is only one part of the system. Architecture, synchronization, metadata, and server-side behavior also matter. The “zero-knowledge” of cloud password managers is not an absolute guarantee.

Our OCIM Approach: Pragmatic Zero Knowledge
At OCIM, our recommendation is simple:
• keep an encrypted vault locally (KeePassXC)
• decryption only on your devices
• synchronized on "security-first" storage (THEDATASAFE)
• local support (Swiss Romand), configuration, and disaster recovery.

A single password to protect dozens is the number 1 drawback in theory, but storing dozens of complex passwords manually is impossible. Most password managers also automatically fill your web forms, saving time, or generate complex passwords.

If you are an SME and want a realistic solution without relying on "magic" promises: let's talk.

Read full article
Privacy · THEDATASAFE