What You Need to Know about Data Governance from Chief Data Officers 

by Tori Thurmond / February 22nd, 2023

Data is a hot topic right now. It seems like everywhere we turn, there’s a data breach or new data privacy law rolling out, and it can be hard to keep track of everything. At the 2022 Information Systems Audit and Control Association (ISACA) Chicago conference, a group of Chief Data Officers gathered to talk about data priorities and what the future of data will look like. Before we dive…

How to Operationalize Your Data Protection Program 

by Tori Thurmond / February 15th, 2023

Data is the most valuable aspect of your organization, and if you want your organization to succeed, you have to protect it. However, building a data protection program can be an intimidating process, especially if you’re starting from the beginning.   The cost and damages of data breaches are multiplying daily as well as the amount of data your organization possesses. Old data may not seem relevant, but when a hacker…

6 Terms You Need to Know To Improve  Your Threat Management 

by Tori Thurmond / February 13th, 2023

We’ve all seen the jumble of letters that make up the world of cybersecurity. But do you know what they all mean? These technical terms can be overwhelming, so we want to make sure you understand what you need to know about threat management, or how your organization manages and mitigates threats that may negatively affect your security posture.    At the 2022 Information Systems Audit and Control Association (ISACA) conference in…

Data Security 101: Make Sure You Know Where Your Data Is and How It’s Working for You

by Randy Bartels / February 1st, 2023

Data is the key to your operation. Make sure you’re keeping it safe. Whether it’s the data you receive from your customers, information you use to run your business, or the source code for your applications, data is at the very heart of any organization. Securing that data is job #1 for any information security program.  A good place to start is understanding where the data is, who uses it,…

How to Write a Cloud Security Policy for Your Business

by Hannah Grace Holladay / November 21st, 2022

The major cloud computing platforms are more secure than the average on-premises infrastructure deployment. But “more secure” isn’t the same as “sufficiently secure.” Cloud security is a shared responsibility: cloud vendors provide the foundations, but it’s up to cloud customers to build secure systems. That’s unlikely to happen without a well-documented, comprehensive, and enforced cloud security policy (CSP). A cloud security policy sets security parameters for managers and employees, and…