logo
February 12, 2024 | Craig Riddell

Data Security Explained: Challenges and Solutions

Data is the most valuable asset for any organization, regardless of size or sector. Loss or corruption of financial reports, business plans and intellectual property can bring even a global enterprise to a standstill. Moreover, a wide range of compliance regulations mandate the organization...
January 30, 2024 | Paul Staz

Three Easy Ways to Maintain Data Security and Compliance in NetSuite

Information is an organization's most valuable asset — and with over 94% of US-based organizations using cloud-based systems, one data breach can have serious consequences for a growing business. Maintaining the integrity and security of your data should be high on your priority list...
January 30, 2024 | Paul Staz

Why Data Security Starts with Salesforce

Customers want digital experiences that make their lives easier and wallets lighter. However, they have a complicated relationship with their personal data. They don’t trust most companies, but they also won’t stop sharing information with them.  Salesforce’s 2020 State of the...
January 30, 2024 | Paul Staz

Salesforce Security and Compliance: Best Practices and Automated Tools

Salesforce is an incredibly powerful system that nearly every department in an organization relies on. But as the platform evolves and businesses grow, complexity grows along with it — and without effective controls for managing that complexity, businesses can expose themselves to...
January 16, 2024 | Paul Staz

Safer Data Migration With Salesforce Audit Fields

In the last decade, companies have made a huge switch from legacy, on-premise servers to cloud-based applications. This shift has had lots of benefits — increased flexibility, lower costs to scale, etc. — but it's also required a massive migration of data to the...
December 9, 2022 | Joe Dibley

The Modern Data Repository: Understanding Your Options

Today, organizations have a variety of options for storing the data they generate, collect and use. Options for data repositories include: Relational database Data warehouse Data lake Data mart Operational data store Choosing the best option for a given business situation...
October 21, 2022 | Joe Dibley

How To Secure Default IIS Site & Enable Windows Authentication

By default, when you create a new Internet Information Services (IIS) website, it’s open to everyone with anonymous access enabled — anyone can access and view the data being hosted by that site. Obviously, this is a security concern for most organizations. Indeed, I’m often asked by clients...
April 5, 2022 | Dirk Schrader

CIS Control 9: Email and Web Browser Protections

The Center for Internet Security (CIS) publishes Critical Security Controls that help organization improve cybersecurity. CIS Control 9 covers protections for email and web browsers. Attackers target email and web browsers with several types of attacks. Some of the most popular are social...
April 5, 2022 | Dirk Schrader

CIS Control 16: Application Software Security

Modern IT environments typically include a wide range of applications: software developed in house, hosted software platforms, open-source tools and purchased solutions. Because these applications access sensitive systems, data and other IT assets, cybercriminals are eager to exploit them during...
April 5, 2022 | Dirk Schrader

CIS Control 2: Inventory and Control of Software Assets

Modern organizations depend upon a dizzying array of software: operating systems, word processing applications, HR and financial tools, backup and recovery solutions, database systems, and much, much more. These software assets are often vital for critical business operations — but they also pose...
Show more articles
...