Tag: Data security
February 12, 2024 |
Data Security Explained: Challenges and Solutions
Data is the most valuable asset for any organization, regardless of size or sector. Loss or corruption of financial reports, business plans and intellectual property can bring even a global enterprise to a standstill. Moreover, a wide range of compliance regulations mandate the organization...
January 30, 2024 |
Three Easy Ways to Maintain Data Security and Compliance in NetSuite
Information is an organization's most valuable asset — and with over 94% of US-based organizations using cloud-based systems, one data breach can have serious consequences for a growing business. Maintaining the integrity and security of your data should be high on your priority list...
January 30, 2024 |
Why Data Security Starts with Salesforce
Customers want digital experiences that make their lives easier and wallets lighter. However, they have a complicated relationship with their personal data. They don’t trust most companies, but they also won’t stop sharing information with them.
Salesforce’s 2020 State of the...
January 30, 2024 |
Salesforce Security and Compliance: Best Practices and Automated Tools
Salesforce is an incredibly powerful system that nearly every department in an organization relies on. But as the platform evolves and businesses grow, complexity grows along with it — and without effective controls for managing that complexity, businesses can expose themselves to...
January 16, 2024 |
Safer Data Migration With Salesforce Audit Fields
In the last decade, companies have made a huge switch from legacy, on-premise servers to cloud-based applications. This shift has had lots of benefits — increased flexibility, lower costs to scale, etc. — but it's also required a massive migration of data to the...
December 9, 2022 |
The Modern Data Repository: Understanding Your Options
Today, organizations have a variety of options for storing the data they generate, collect and use. Options for data repositories include:
Relational database
Data warehouse
Data lake
Data mart
Operational data store
Choosing the best option for a given business situation...
October 21, 2022 |
How To Secure Default IIS Site & Enable Windows Authentication
By default, when you create a new Internet Information Services (IIS) website, it’s open to everyone with anonymous access enabled — anyone can access and view the data being hosted by that site. Obviously, this is a security concern for most organizations. Indeed, I’m often asked by clients...
April 5, 2022 |
CIS Control 9: Email and Web Browser Protections
The Center for Internet Security (CIS) publishes Critical Security Controls that help organization improve cybersecurity. CIS Control 9 covers protections for email and web browsers.
Attackers target email and web browsers with several types of attacks. Some of the most popular are social...
April 5, 2022 |
CIS Control 16: Application Software Security
Modern IT environments typically include a wide range of applications: software developed in house, hosted software platforms, open-source tools and purchased solutions. Because these applications access sensitive systems, data and other IT assets, cybercriminals are eager to exploit them during...
April 5, 2022 |
CIS Control 2: Inventory and Control of Software Assets
Modern organizations depend upon a dizzying array of software: operating systems, word processing applications, HR and financial tools, backup and recovery solutions, database systems, and much, much more. These software assets are often vital for critical business operations — but they also pose...