Vault 2.1 - Release Notes

WebApp Version:
Desktop Client Version:
Outlook Plug-in Version:

New Features

  • Customise Your Email Templates

    Organisation administrator can now customise the emails distributed to new standard accounts and new guest accounts, including the utilisation of shortcodes.

  • Configure Backups from the Desktop Client
    Users are now able to create their own backups, by right-clicking any folder on their desktop.

  • Pause Sync on Agents

    Ability to pause/resume sync on the desktop client.
  • Outlook Plugin Improvements:
    - Ability to attach local files,
    - Intelligent tool that will automatically convert files that are dragged and dropped into an email composition,

    - Attachment Policy tab to configure additional settings.

Enhancements and Bug Fixes


  • Improved pattern matching for Office and AutoCAD files.
  • Fixed issue when file was moved or modified while in the process of upload. Agent will now abort the transfer and start uploading again in a few seconds.
  • Fixed delay when Excel files were modified.


  • Auto-locking is supported for doc, .docx, .xls, .xlsx, .odt, .ods if the documents are opened with Libre/Open office.
  • Fixed issue where agent would incorrectly report that file sync was in process.
  • Agent will now periodically check for changes in machine name and report information to the web portal and server.
  • Improved detection for when agent would go into error states to help eliminate false positives.
  • Fixed high CPU issue for agent GUI.
  • Added ability to copy excluded files to clipboard from agent preferences.


  • Fixed issue where deep directory structure would cause the agent to crash.
  • Improved how OSX agent would handle multiple registered users on one machine.


  • Fixed issue where web would report a 403 – Forbidden message when attempting to deactivate from admin dashboard.
  • Users can now control their own machine subscriptions when invited to a Team Share.
  • Fixed issue where view count would incorrectly increase.


  • Added ability to remove Team Share or Backup root through API
  • POST /1/management/root/delete/
  • Id: The root ID for the Team Share or Backup
  • remove_files: True or False to remove folder from machine (will only remove folder if removing a Team Share)
  • Fixed issue where /person/update would require the mobile_phone value.

Organisation Policies

  • Now allow the policy ‘let organisation admins browse remote files?’ to be disabled, while ‘Backup Creation?’ policy is enabled. This will allow end users to use the backup feature but prevent organisation admins for using it.

Dashboard and Web App

  • Added support for email servers that authenticate without a username and password.
  • Tighter security including prevention of brute force attacks.
  • View excluded files from the dashboard Machine page.
  • Added ‘Get Logs’ button on Machines page that will collect logs and system information from an agent. 
  • Under a root’s Activity log, ‘Show Activity by’ drop down is now sorted by last name.
  • We provide a SMS delivery service instead of email-to-SMS gateway. Selecting a mobile carrier is no longer needed when setting up a mobile device for alerts.
  • Fixed issue where Dashboard ‘Recent Activity’ would display wrong time.
  • Fixed issue when searching files, Folders would display a modified time.
  • Fixed issue where Autotask and Connectwise alerts were not created.
  • Updated library for dashboard gadget.


  • Admins can create a report to list Team Share members and member subscriptions. Report is available when selecting the ‘Now’ time range.
  • Fixed issue with folders beginning with a tilde (~).
  • nimboxuk

    posted 21 October, 2014
    by nimboxuk

Guardian (CloudCare) Update, 8 October 2014.

Version 3.2, Hotfix-02.

Key features for this hotfix are:

  • Bug fixes
  • Client enhancement

New Client
There will be a new client version release which will include the below AntiVirus fixes and Remote IT improvements/fixes.

Fixed Bugs - Client

  • Resolved: Generation of false ‘Virus scan overdue’ alerts daily on machines that have successfully completed AV scans.
  • Resolved: Port conflicts between the Remote IT service and the TestNav platform.
  • Resolved: issue preventing the installation file (.exe) to fail when installing on a Windows Server 2003.
  • The following program executables have been added to the Content Filtering allowed list:
        - Iris Accounting Software
        - LiveLink
        - Advantage 3
        - SCT Device Updater
        - Mozy
        - Window SBS 2011 Launchpad
        - Carbonite
        - Lync
        - Mako
        - Maximizer
        - GotoAssist
  • Resolved: Connectivity issues between Windows 2008 servers and Remote IT service (v3.0).
  • Count down to automatic reboot following a client upgrade has been extended to 15 minutes. End users also have option to cancel the reboot. However, installs are not completed until reboot is carried out, which can leave the devices vulnerable. Therefore we highly recommend that a reboot is carried out as soon as possible.**

    Image below shows the new messaging:

    ** In order to minimise the impact of client upgrades, contact us to ensure the update schedule is most appropriate for your end users.
  • nimboxuk

    posted 08 October, 2014
    by nimboxuk

Transparency Report: 1 August 2014

Number of Law Enforcement Requests for Information: 0

Number of Users affected: 0

Note: To learn more about our transparency policies, and about the types of data that we can protect, visit our Law and Compliance pages.

  • nimboxuk

    posted 01 August, 2014
    by nimboxuk

Snoopers charter, take two.

The Data Retention and Investigation Powers Bill, supported almost unanimously in pre-publication by the big three political parties, has just been passed into law, marking the saddest day for civil liberties in recent history.

Frustratingly, despite it being widely-touted as an ‘emergency law’ that is going to protect us all from the terrorists and demons, there is actually no emergency. Or haste.

The Bill is designed to legalise UK Government spying — mass spying, on mostly innocent members of the public — that was effectively outlawed by the European Court of Justice when it ruled in April that it was neither proportionate nor warranted for the Government to spy on its citizens in such a manor.

In fact, the Court even goes so far as to say “…the directive interferes in a particularly serious manner with the fundamental rights to respect for private life and to the protection of personal data.”

Given that the Court’s decision was made public two months ago, I’m struggling to see why our Government had to wait this long before declaring an emergency, unless, perhaps, they didn’t want it to be debated properly.

Does the Bill legalise the powers that were stripped by the ECJ? Yes. Does it extend them? Yes. Have we all been lied to? Yes.

The Bill doesn’t just ensure that current powers are legalised, it actually extends them.

Of the five clauses in the Bill, two directly refer to RIPA (Regulation of Investigatory Powers Act 2000). The second and third clauses extend the powers granted by RIPA to cover non-UK companies, and to expand what the Bill calls ‘telecommunication services’, to include ‘internet based services’ and ‘any remote storage.’

The head of media practice at Preiskel and Co, David Allen Green, told The Independent that assurances given to Parliament that the Bill is only legalising currently-held powers are nonsense.

"They’re trying to make out this is clarificatory – but if you read through the Bill these are substantial amendments," "…They are creating things legally that weren’t there before."

And with the only protection of your online freedoms coming in the form of a transparency report and oversight board, much like the one that knew nothing about GCHQ mass spying, we have everything to fear.

What this means for you.

Clearly, non-UK companies that provide internet-based services cover just about everything that we do online. Gmail, Outlook, Microsoft 365, Sales Force, Facebook, iCloud, Dropbox. You get the idea.

It’s important that you realise the spying is ‘not just metadata’. It’s content. Your photos. Your emails. Your intellectual property. And it’s all fair play.

And the best part of it all, Edward Snowden said that “the NSA could have written this draft”. He’s right.

If you would like to know more about how you can protect your online freedoms, visit or call 08454757574

  • nimboxuk

    posted 17 July, 2014
    by nimboxuk

Transparency Report: 1 May 2014

Number of Law Enforcement Requests for Information: 0

Number of Users affected: 0

Note: To learn more about our transparency policies, and about the types of data that we can protect, visit our Law and Compliance pages.

  • nimboxuk

    posted 01 May, 2014
    by nimboxuk

Urgent Security Notice

What is it?

On 7 April 2014 a major security vulnerability, known as “Heartbleed”, was publicly disclosed. It affects the technology that powers encryption for a majority of internet services (about two-thirds).

Although Nimbox employs this technology, the newer versions we use are unaffected. We have no evidence of any breach and, like most service providers, took immediate action to mitigate any future breach, including re-issuing the encryption keys across our network.

What does this mean for you?

The little padlock icon (HTTPS) you trust to keep passwords, emails, bank details and internet browsing safe from interception, could actually be making some of that private information accessible to those who know about, and can exploit the vulnerability.

What should you do?

First of all, your Nimbox files are safe.

We do recommend, however, that you take the time to change your passwords, everywhere, including Nimbox if you use the same password elsewhere — starting with your high-security services such as online banking and email.

You’ll be hearing more about this vulnerability in the news over the next few days but, as always, it’s better to take action now.

Again, your Nimbox files have always been secure, and we’ll continue to work hard to protect your data.



  • nimboxuk

    posted 09 April, 2014
    by nimboxuk

  • 1 note for this post

Crowd Sprawl: an oft-overlooked threat to your data

The ‘bring your own device’ (BYOD) is trend is sweeping offices around the world, showing no signs of slowing down. As BYOD is employee driven, companies must adapt quickly to this technology.

Since the BYOD phenomenon began, employees have been taking advantage of the Cloud and the benefits of being able to share and access data more efficiently on both their personal and work devices. To date it is estimated that 89%[1] of IT departments enable BYOD in some form.

Cloud sprawl, is a term used to describe how organisational data is distributed across different cloud service applications.

Vanson Bourne recently completed a survey of 200 IT directors managing organisations with over 1,000 employees. The study found that 67%[2] of those questioned were concerned about cloud sprawl, mainly because of the speed and ease of cloud deployment and the fact that employees can purchase these services without the involvement of the IT department. The survey also deduced that 54% of organisations have no idea how many cloud services their employees currently use.

Consequently with cloud sprawl, the business risks both the privacy of, and control over its intellectual property, as it is scattered across multiple platforms throughout the world.

Each piece of data, wherever it is physically stored, would then be bound by not only the terms and conditions of the supplier, but also by the laws of the country in which the data is held. For example, if the data uploaded to the cloud from UK territory was stored in America – or was affiliated with an American supplier – then it would be subject to U.S. laws and regulations, increasing the risk of interception or disclosure.

It is almost impossible for businesses to stop employees from uploading documents to the cloud, and even if this is achieved, think of what it would do to company morale and productivity when documents are harder to access and collaborate on.

It is clear that the cloud and its benefits are here to stay, and in order to prevent data leakage, organisations need to develop an internal strategy to manage cloud sprawl. Utilising a personalised cloud solution is one way of utilising the benefits of the cloud, whilst also ensuring that data is efficiently organised and easily located.

Talk to us today for more advice on how to embrace BYOD in your workplace!

  • nimboxuk

    posted 24 February, 2014
    by nimboxuk

Today, Is The Day We Fight Back.

As an organisation that believes in privacy as a right, we’re excited to be taking part in the global day of action against mass surveillance, The Day We Fight Back (

We urge you, as part of the global online community, to protect the internet and its foundations on a platform of freedom.

Stand with us. Stand united.


  • nimboxuk

    posted 11 February, 2014
    by nimboxuk

  • 4 notes for this post

A handy guide to online privacy…

  • If you don’t keep it, they can’t get it — destroy unnecessary records,
  • If you do keep it, protect it with file encryption and strong passwords — if you don’t know how, use a service like Cloud Drive,
  • Encrypt your Internet communications to prevent interception,
  • Use anonymising tools like Tor when you’re online,
  • Always delete your providers’ copies of emails and voicemails as soon as you can access them,
  • Only pass data to people and organisations which you trust,
  • Never download or accept files from unknown sources.

Note: ‘They’ refers to bad guys, whom ever they may be.

  • nimboxuk

    posted 08 January, 2014
    by nimboxuk

Report: NSA Intercepting Laptops Ordered Online, Installing Spyware


Building one’s own desktop never looked so attractive.

  • nimboxuk

    posted 05 January, 2014
    by nimboxuk

  • Reblogged from hipsterlibertarian
  • 233 notes for this post